Analysis
-
max time kernel
154s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 18:43
Static task
static1
Behavioral task
behavioral1
Sample
121e83653cde87a952f3ed7a70a28e20_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
121e83653cde87a952f3ed7a70a28e20_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
121e83653cde87a952f3ed7a70a28e20
-
SHA1
3d8c4d4df93a8e6d7f7529c8c471bb64bc4c382f
-
SHA256
f789f2f4e3cdd0f1b6cf7e756187039fbcac9ce53fc2b5f0c8686a758cda8694
-
SHA512
d87ba0784e7b0e1c17b86d4f99820cfdb7e90637454edc9b5d6316c1c04cca127f5843f70c2fd4e2ceca28711b475c5109e1dacfb81cedceab54129d3dffa44f
-
SSDEEP
12288:ifqp/SInr8vv2BDeT+bVYHTb3FRk/rMNxaXqqlPbJKTGv5DYFXOBnXREHa:2c/i328ab4F+rM/aXq6bJfBUam6
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4828 alg.exe 4804 DiagnosticsHub.StandardCollector.Service.exe 2672 fxssvc.exe 3340 elevation_service.exe 1304 elevation_service.exe 1496 OSE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\45c34a87b3e2edcd.bin alg.exe File opened for modification C:\Windows\system32\fxssvc.exe 121e83653cde87a952f3ed7a70a28e20_NeikiAnalytics.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\System32\alg.exe 121e83653cde87a952f3ed7a70a28e20_NeikiAnalytics.exe File opened for modification C:\Windows\system32\AppVClient.exe 121e83653cde87a952f3ed7a70a28e20_NeikiAnalytics.exe File opened for modification C:\Windows\system32\dllhost.exe 121e83653cde87a952f3ed7a70a28e20_NeikiAnalytics.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 121e83653cde87a952f3ed7a70a28e20_NeikiAnalytics.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaws.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{1342F81A-D5C5-42B4-A5E8-933F7759DA30}\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_156609\java.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 121e83653cde87a952f3ed7a70a28e20_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_156609\javaw.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe alg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 121e83653cde87a952f3ed7a70a28e20_NeikiAnalytics.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 672 Process not Found 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4108 121e83653cde87a952f3ed7a70a28e20_NeikiAnalytics.exe Token: SeAuditPrivilege 2672 fxssvc.exe Token: SeDebugPrivilege 4828 alg.exe Token: SeDebugPrivilege 4828 alg.exe Token: SeDebugPrivilege 4828 alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\121e83653cde87a952f3ed7a70a28e20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\121e83653cde87a952f3ed7a70a28e20_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:4804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1852
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3340
-
C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1304
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4192 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:81⤵PID:4128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD572bf69cef508f9c5401110fc95bb518d
SHA172e117b885d74380b4a0f698db1fc666688ada43
SHA256fb1474cfa04f8a0c841bf446e3f4a78d6639fcf9a2a4ecd1d1a9e0e3bfdb91c0
SHA5129a5d1fdbfc9e38a9a42d3a1eebb4db508879c96cf96c2fb24dbb3419df61337b9d57d4b4be8d9ad5547ae42bb32622d0078f1333df50506c39547f1c9fbc4913
-
Filesize
1.5MB
MD507a18d30923dc501892bc0f53ad317e0
SHA11517541c7dc1f2cb44dbb17a4a74ed044f559ce5
SHA25688bfb538dc74d6c601117796c7c75e6ce916fe98fa031549a5b67725d018fb41
SHA51299229730fe505ee77203893e49f20edd6e608e76fe853fb1fa7113df6478fea3e5b1bf02e772e57e1e98d2df5dd2996b333129342444a9f219ccb4d299729ac5
-
Filesize
1.5MB
MD5d3897d58f4e6aaa20762108b2e53a999
SHA1f8205520967adf696c1442beefd4f2880e92c4be
SHA256402f9c00ae723195ae78dbc8e7384e0f60b7c18b2899e9da2668e532ca7b4832
SHA512bdfe8580e9f672501e88270a3c1384298cbb21be8883d2e4ed6dcb5297f89c174433575646ddd8f6cb17488751a7e17445a84f861f2f1590ae02b1a73a79ad39
-
Filesize
2.1MB
MD512e1dd514b6bfecc93f14a1ac32b9eec
SHA1f83e1dd7ff3c4a3b529cb943182a8f0f8cfe117a
SHA2562eef6bed7f6bd6e1df39d2f5e451f0259329f1bafca54f8f48b5b1c1b8990f7f
SHA5123303a0ede814f877765969f97361a1cf5ead2ed233ab7f851de2c830e4bef31f9343aae0b1f41dfe5078dbd87b26f835f0693e7f52d86c77f16f92a06dd7edfa
-
Filesize
1.3MB
MD5b4f737d3073c71951103a5f89feddfc6
SHA1d0c7d1bcb2c8158c7a9c6a15b8998307e74ee659
SHA256610f0b2c178415781db829e7b852ca74767e700ce4db844cd2b4459cfe590f32
SHA512de5d44b7180bfe3f53f6671a6a1dbf95afdf1b9b8b7fdf967f6691591e4ca20caeff3296b98a559e55756d5618bf6dbfcd7bdf19333ef81030b15a3396f1b6c8
-
Filesize
1.2MB
MD5c3b2b920b0e19040edf3b6691136a5f5
SHA1065ced437ec6ec1f8d59f3128abbcf36d52b8424
SHA25616b0494595d9df56aac115cdee8f03dc31abb91b148def1208ab674232c1ed22
SHA51260783967cca543bf312ab1db4dc166d5b3c550f6377c69ca85e2a4e2e8f06fffa5f5caa279a54ce9ce06285a36483148829e13dcb426c1780955c0588d0c51f5
-
Filesize
1.3MB
MD565e16b89447d498759141d82b3729298
SHA17ceb527897789b7bbd979f4d667820fa4d246a58
SHA256bc4f15ae5dc938e8b967f4fd889a53a1e7d33d7d8df930919e4f1c2935d105ee
SHA5124bda3d2c296e34fd7803c1e2ead4b8ac7d2ba075e868b95ea9f0f6d91f71f4427cc6de3ec1e3f16b9833f5fc6a6bcc49b04c3513a3d830f22f9354257bdbd0d8
-
Filesize
1.3MB
MD55d2fea24125341a92211950dd3b0dcf8
SHA11936e3c6616f80609bfabea593c102085d8f5ae3
SHA25663e0a0c6dc7b9cb09b4df0785c7622969edf0d0c911cf09c03af967017b9e5da
SHA512e63ea7c9461ceace7ea126fdd516ecf4aa77519d17020e75905ba10da6baa8049d9f36b87afb81e06bd55fb911cf872da5fb502abae7498ee5ff2b831d71cf2f