Analysis

  • max time kernel
    146s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 06:36

General

  • Target

    c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe

  • Size

    667KB

  • MD5

    c31e0327620e1f1bef058ea0b95c1950

  • SHA1

    86d033fad448fd4f351d5cface6b66e109a5af0a

  • SHA256

    a49e1b12a4126ffe290e6cbf11045e2fa734a0a73c0a7759d9d24ae035e02ace

  • SHA512

    ee37fff37bfe102639a9a587f41cbc01c77951da35258bd22c70d44a4e1d8b0ec9792b858af2f0e2a7cec6b5bb3b14ad044376b69d429adbfe3222616644f1b9

  • SSDEEP

    12288:Zv1nWdQP1EDhZPxNNtoqOFBqkYHFLgufmmV/MkgPAyHv0Z:Z9ndEVf/tpOLlcgJmtSHU

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Program Files (x86)\Microsoft Build\Isass.exe
      "C:\Program Files (x86)\Microsoft Build\Isass.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2232
    • C:\Users\Admin\AppData\Local\Temp\QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Users\Admin\AppData\Local\Temp\QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe
        "C:\Users\Admin\AppData\Local\Temp\QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe" -burn.unelevated BurnPipe.{2171B37A-B984-48E7-AA53-BDB764262992} {7FCC8A4E-D6E7-4AD7-A3A2-B2985B5297DE} 2540
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\.ba1\logo.png

    Filesize

    1KB

    MD5

    d6bd210f227442b3362493d046cea233

    SHA1

    ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

    SHA256

    335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

    SHA512

    464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

  • \Program Files (x86)\Microsoft Build\Isass.exe

    Filesize

    213KB

    MD5

    dbd17a1e3feb7fda6636f516a2428fac

    SHA1

    a271f56161aefc736d300e1e7f6483137223d85e

    SHA256

    748ba2fb0cfec41b31bf732940d9209fd1a888bcb3af1800060e429a5062ded6

    SHA512

    8e45d4279de6061aa8177d80a985daab2b52973752699c5b1f0e615d25c76a8340fff0633fa51c24d24c73f0f4495ce6ca61fe1501f6b325008b8ca97037be85

  • \Users\Admin\AppData\Local\Temp\QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe

    Filesize

    445KB

    MD5

    1191ba2a9908ee79c0220221233e850a

    SHA1

    f2acd26b864b38821ba3637f8f701b8ba19c434f

    SHA256

    4670e1ecb4b136d81148401cd71737ccf1376c772fa513a3e176b8ce8b8f982d

    SHA512

    da61b9baa2f2aedc5ecb1d664368afffe080f76e5d167494cea9f8e72a03a8c2484c24a36d4042a6fd8602ab1adc946546a83fc6a4968dfaa8955e3e3a4c2e50

  • \Users\Admin\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\.ba1\wixstdba.dll

    Filesize

    126KB

    MD5

    d7bf29763354eda154aad637017b5483

    SHA1

    dfa7d296bfeecde738ef4708aaabfebec6bc1e48

    SHA256

    7f5f8fcfd84132579f07e395e65b44e1b031fe01a299bce0e3dd590131c5cb93

    SHA512

    1c76175732fe68b9b12cb46077daa21e086041adbd65401717a9a1b5f3c516e03c35a90897c22c7281647d6af4a1a5ffb3fbd5706ea376d8f6e574d27396019c

  • memory/2232-43-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-46-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-17-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-79-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-74-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-73-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-41-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-42-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-72-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-44-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-45-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-18-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2232-55-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-60-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-61-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-62-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2232-69-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2616-10-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2616-11-0x00000000044F0000-0x0000000005797000-memory.dmp

    Filesize

    18.7MB

  • memory/2616-19-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2616-24-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB