Analysis
-
max time kernel
156s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
d7c759a720ea9776afd55f8ac1e71810_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
d7c759a720ea9776afd55f8ac1e71810_NeikiAnalytics.exe
-
Size
702KB
-
MD5
d7c759a720ea9776afd55f8ac1e71810
-
SHA1
0f2d2a2c381f20822560f5656af03feac98d6933
-
SHA256
d7844df9a6a0de05eff29645bc8543e19576f48e2883c2a5accfa649aff7cf59
-
SHA512
6334469712c74dc680db32a436a3f203e2661344e95b19dd3c87f29e1beb6fe353c3b1ef01815d4c00ddda182f651d62e82bb297b6d2825ab7c2f0157efa3418
-
SSDEEP
12288:3SYFz/TPMTmkJR4Do07Y86gw5CtCjX+NLuFhNpBeZT3X:PFjgSkQ/7Gb8NLEbeZ
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 3356 alg.exe 3612 elevation_service.exe 368 elevation_service.exe 4352 maintenanceservice.exe 5080 OSE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\a40e6748b3e2edcd.bin alg.exe File opened for modification C:\Windows\System32\alg.exe d7c759a720ea9776afd55f8ac1e71810_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe alg.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe alg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1972 d7c759a720ea9776afd55f8ac1e71810_NeikiAnalytics.exe Token: SeDebugPrivilege 3356 alg.exe Token: SeDebugPrivilege 3356 alg.exe Token: SeDebugPrivilege 3356 alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7c759a720ea9776afd55f8ac1e71810_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d7c759a720ea9776afd55f8ac1e71810_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3612
-
C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"1⤵
- Executes dropped EXE
PID:368
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4352
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:5080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3948 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:1020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD522130183007491b9337267160c02f49b
SHA1aeab5fb2fa34b259810dd8f67310cfcd549c5aa5
SHA25663aaf8ef1e7fffb5e0f8b2ba63086bb188e0dee53ee35b3c5508b1baa677bbbb
SHA51244eeb34e94ffeedb6d4818b3b5e9eaa8cab028d057a183e9a3c4d20d532c5dee0a481037483c459b4fadb916c3374fc9178fe982b3b713b38a26703f5e22c0c4
-
Filesize
781KB
MD5c4d468cb99161eb7c6ef1c8ce151b36c
SHA1eb532a469a781f3027e7a228a92a2c185be5af59
SHA25613866d79e848c2d6459fd9f9ad2b7e83c6494b57737edfa5caef239c81ed68e9
SHA5126d913221d465f576c369d50e93abe8a916af0c5469cd0338cf95af35a7cb8ea17c9f756c2f545db5ca628ba857b38b1af33e1fa05dacf671ed2c54f2fb447142
-
Filesize
805KB
MD56c94a07cd938a55bae6a1da42e1dc4c8
SHA15634819de96e0121718ad826c154c45e8c6e8633
SHA25692ca8ecca43aad466b0ea911335cc3f291e0c4ce8b085fcb3759dae038b9413b
SHA5124ec2e90ca2fc50d0d18f516d11256e7ca1062b4b27b098e4c774999067e61948873a03c81f1050b498d611b925eda9e3ae6ca99d35f59ee60793780cf0dce8b2
-
Filesize
2.1MB
MD5fee5c9a0d769d16fe49088514f4a5a50
SHA1d7eaf3600a1905c3d19b8d10e1510142d1143c35
SHA256cb553096a926f6943a01f29d3592dd580b718cf3f81daf5dc2cf4fec78f294f7
SHA512caa8f015a96e5a76143de03236f5f4ddfe57491e797583f3adc40a4998aab06cb690e80d7aef408780946346a9e6f92b95d7d6384d1f3409e383bb536cc40624
-
Filesize
661KB
MD56d58789f5ec984eac0c3272c10885442
SHA1fc8a26a061e9bae10c5dc613945d85a993c06921
SHA256f8986863f8432abcda67cca9cbc4d88ab2058ac15b19614e6931b4e72a2fbb1c
SHA51229ed96a03304adbee6324068647cba6b468e4467fbc62f44af2cd6281c38651c05aaac7b2591b1d8c07e40aaed21a09b3aabd02396e2bc4f035d0487ea807111