Analysis

  • max time kernel
    156s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 15:04

General

  • Target

    d7c759a720ea9776afd55f8ac1e71810_NeikiAnalytics.exe

  • Size

    702KB

  • MD5

    d7c759a720ea9776afd55f8ac1e71810

  • SHA1

    0f2d2a2c381f20822560f5656af03feac98d6933

  • SHA256

    d7844df9a6a0de05eff29645bc8543e19576f48e2883c2a5accfa649aff7cf59

  • SHA512

    6334469712c74dc680db32a436a3f203e2661344e95b19dd3c87f29e1beb6fe353c3b1ef01815d4c00ddda182f651d62e82bb297b6d2825ab7c2f0157efa3418

  • SSDEEP

    12288:3SYFz/TPMTmkJR4Do07Y86gw5CtCjX+NLuFhNpBeZT3X:PFjgSkQ/7Gb8NLEbeZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7c759a720ea9776afd55f8ac1e71810_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\d7c759a720ea9776afd55f8ac1e71810_NeikiAnalytics.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1972
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3356
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:3612
  • C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:368
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:4352
  • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    PID:5080
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3948 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1020

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe

      Filesize

      2.2MB

      MD5

      22130183007491b9337267160c02f49b

      SHA1

      aeab5fb2fa34b259810dd8f67310cfcd549c5aa5

      SHA256

      63aaf8ef1e7fffb5e0f8b2ba63086bb188e0dee53ee35b3c5508b1baa677bbbb

      SHA512

      44eeb34e94ffeedb6d4818b3b5e9eaa8cab028d057a183e9a3c4d20d532c5dee0a481037483c459b4fadb916c3374fc9178fe982b3b713b38a26703f5e22c0c4

    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

      Filesize

      781KB

      MD5

      c4d468cb99161eb7c6ef1c8ce151b36c

      SHA1

      eb532a469a781f3027e7a228a92a2c185be5af59

      SHA256

      13866d79e848c2d6459fd9f9ad2b7e83c6494b57737edfa5caef239c81ed68e9

      SHA512

      6d913221d465f576c369d50e93abe8a916af0c5469cd0338cf95af35a7cb8ea17c9f756c2f545db5ca628ba857b38b1af33e1fa05dacf671ed2c54f2fb447142

    • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

      Filesize

      805KB

      MD5

      6c94a07cd938a55bae6a1da42e1dc4c8

      SHA1

      5634819de96e0121718ad826c154c45e8c6e8633

      SHA256

      92ca8ecca43aad466b0ea911335cc3f291e0c4ce8b085fcb3759dae038b9413b

      SHA512

      4ec2e90ca2fc50d0d18f516d11256e7ca1062b4b27b098e4c774999067e61948873a03c81f1050b498d611b925eda9e3ae6ca99d35f59ee60793780cf0dce8b2

    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

      Filesize

      2.1MB

      MD5

      fee5c9a0d769d16fe49088514f4a5a50

      SHA1

      d7eaf3600a1905c3d19b8d10e1510142d1143c35

      SHA256

      cb553096a926f6943a01f29d3592dd580b718cf3f81daf5dc2cf4fec78f294f7

      SHA512

      caa8f015a96e5a76143de03236f5f4ddfe57491e797583f3adc40a4998aab06cb690e80d7aef408780946346a9e6f92b95d7d6384d1f3409e383bb536cc40624

    • C:\Windows\System32\alg.exe

      Filesize

      661KB

      MD5

      6d58789f5ec984eac0c3272c10885442

      SHA1

      fc8a26a061e9bae10c5dc613945d85a993c06921

      SHA256

      f8986863f8432abcda67cca9cbc4d88ab2058ac15b19614e6931b4e72a2fbb1c

      SHA512

      29ed96a03304adbee6324068647cba6b468e4467fbc62f44af2cd6281c38651c05aaac7b2591b1d8c07e40aaed21a09b3aabd02396e2bc4f035d0487ea807111

    • memory/368-40-0x0000000140000000-0x0000000140245000-memory.dmp

      Filesize

      2.3MB

    • memory/368-161-0x0000000140000000-0x0000000140245000-memory.dmp

      Filesize

      2.3MB

    • memory/368-41-0x0000000000990000-0x00000000009F0000-memory.dmp

      Filesize

      384KB

    • memory/368-47-0x0000000000990000-0x00000000009F0000-memory.dmp

      Filesize

      384KB

    • memory/1972-0-0x0000000000400000-0x00000000004B6000-memory.dmp

      Filesize

      728KB

    • memory/1972-1-0x0000000002320000-0x0000000002386000-memory.dmp

      Filesize

      408KB

    • memory/1972-13-0x0000000000400000-0x00000000004B6000-memory.dmp

      Filesize

      728KB

    • memory/1972-6-0x0000000002320000-0x0000000002386000-memory.dmp

      Filesize

      408KB

    • memory/1972-7-0x0000000002320000-0x0000000002386000-memory.dmp

      Filesize

      408KB

    • memory/3356-15-0x0000000140000000-0x00000001400AA000-memory.dmp

      Filesize

      680KB

    • memory/3356-120-0x0000000140000000-0x00000001400AA000-memory.dmp

      Filesize

      680KB

    • memory/3356-16-0x0000000000780000-0x00000000007E0000-memory.dmp

      Filesize

      384KB

    • memory/3356-24-0x0000000000780000-0x00000000007E0000-memory.dmp

      Filesize

      384KB

    • memory/3612-37-0x0000000000440000-0x00000000004A0000-memory.dmp

      Filesize

      384KB

    • memory/3612-29-0x0000000000440000-0x00000000004A0000-memory.dmp

      Filesize

      384KB

    • memory/3612-28-0x0000000140000000-0x0000000140237000-memory.dmp

      Filesize

      2.2MB

    • memory/3612-146-0x0000000140000000-0x0000000140237000-memory.dmp

      Filesize

      2.2MB

    • memory/4352-51-0x0000000000CD0000-0x0000000000D30000-memory.dmp

      Filesize

      384KB

    • memory/4352-62-0x0000000000CD0000-0x0000000000D30000-memory.dmp

      Filesize

      384KB

    • memory/4352-65-0x0000000140000000-0x00000001400CA000-memory.dmp

      Filesize

      808KB

    • memory/4352-59-0x0000000140000000-0x00000001400CA000-memory.dmp

      Filesize

      808KB

    • memory/4352-60-0x0000000000CD0000-0x0000000000D30000-memory.dmp

      Filesize

      384KB

    • memory/5080-67-0x0000000140000000-0x00000001400CF000-memory.dmp

      Filesize

      828KB

    • memory/5080-74-0x0000000000500000-0x0000000000560000-memory.dmp

      Filesize

      384KB

    • memory/5080-68-0x0000000000500000-0x0000000000560000-memory.dmp

      Filesize

      384KB

    • memory/5080-162-0x0000000140000000-0x00000001400CF000-memory.dmp

      Filesize

      828KB