Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 06:36
Static task
static1
Behavioral task
behavioral1
Sample
c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe
-
Size
667KB
-
MD5
c31e0327620e1f1bef058ea0b95c1950
-
SHA1
86d033fad448fd4f351d5cface6b66e109a5af0a
-
SHA256
a49e1b12a4126ffe290e6cbf11045e2fa734a0a73c0a7759d9d24ae035e02ace
-
SHA512
ee37fff37bfe102639a9a587f41cbc01c77951da35258bd22c70d44a4e1d8b0ec9792b858af2f0e2a7cec6b5bb3b14ad044376b69d429adbfe3222616644f1b9
-
SSDEEP
12288:Zv1nWdQP1EDhZPxNNtoqOFBqkYHFLgufmmV/MkgPAyHv0Z:Z9ndEVf/tpOLlcgJmtSHU
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2232 Isass.exe 2540 QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 2568 QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe -
Loads dropped DLL 6 IoCs
pid Process 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 2540 QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 2568 QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 2232 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Build\Isass.exe c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 2232 Isass.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2232 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 28 PID 2616 wrote to memory of 2232 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 28 PID 2616 wrote to memory of 2232 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 28 PID 2616 wrote to memory of 2232 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 28 PID 2616 wrote to memory of 2540 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 29 PID 2616 wrote to memory of 2540 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 29 PID 2616 wrote to memory of 2540 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 29 PID 2616 wrote to memory of 2540 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 29 PID 2616 wrote to memory of 2540 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 29 PID 2616 wrote to memory of 2540 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 29 PID 2616 wrote to memory of 2540 2616 c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 29 PID 2540 wrote to memory of 2568 2540 QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 30 PID 2540 wrote to memory of 2568 2540 QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 30 PID 2540 wrote to memory of 2568 2540 QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 30 PID 2540 wrote to memory of 2568 2540 QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 30 PID 2540 wrote to memory of 2568 2540 QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 30 PID 2540 wrote to memory of 2568 2540 QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 30 PID 2540 wrote to memory of 2568 2540 QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Microsoft Build\Isass.exe"C:\Program Files (x86)\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\QK_c31e0327620e1f1bef058ea0b95c1950_NeikiAnalytics.exe" -burn.unelevated BurnPipe.{2171B37A-B984-48E7-AA53-BDB764262992} {7FCC8A4E-D6E7-4AD7-A3A2-B2985B5297DE} 25403⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
213KB
MD5dbd17a1e3feb7fda6636f516a2428fac
SHA1a271f56161aefc736d300e1e7f6483137223d85e
SHA256748ba2fb0cfec41b31bf732940d9209fd1a888bcb3af1800060e429a5062ded6
SHA5128e45d4279de6061aa8177d80a985daab2b52973752699c5b1f0e615d25c76a8340fff0633fa51c24d24c73f0f4495ce6ca61fe1501f6b325008b8ca97037be85
-
Filesize
445KB
MD51191ba2a9908ee79c0220221233e850a
SHA1f2acd26b864b38821ba3637f8f701b8ba19c434f
SHA2564670e1ecb4b136d81148401cd71737ccf1376c772fa513a3e176b8ce8b8f982d
SHA512da61b9baa2f2aedc5ecb1d664368afffe080f76e5d167494cea9f8e72a03a8c2484c24a36d4042a6fd8602ab1adc946546a83fc6a4968dfaa8955e3e3a4c2e50
-
Filesize
126KB
MD5d7bf29763354eda154aad637017b5483
SHA1dfa7d296bfeecde738ef4708aaabfebec6bc1e48
SHA2567f5f8fcfd84132579f07e395e65b44e1b031fe01a299bce0e3dd590131c5cb93
SHA5121c76175732fe68b9b12cb46077daa21e086041adbd65401717a9a1b5f3c516e03c35a90897c22c7281647d6af4a1a5ffb3fbd5706ea376d8f6e574d27396019c