Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 09:11
Static task
static1
Behavioral task
behavioral1
Sample
e6dacae0e7502d01c54ea385fd53ecc0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e6dacae0e7502d01c54ea385fd53ecc0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
e6dacae0e7502d01c54ea385fd53ecc0_NeikiAnalytics.exe
-
Size
81KB
-
MD5
e6dacae0e7502d01c54ea385fd53ecc0
-
SHA1
d8e440daa28f885b433e7dc48bf4a1a781b029b5
-
SHA256
5c533b483657f894ef4c0f4bfdb295a8697e9e9e6f1b7dd6a0540e2ec5f5b713
-
SHA512
49f3b00ed1878833ea8df0dbeff77bfd829590798cde57683cdae3513f33f207958b50b0d312730cd3e8951b1c60d0ffa7921baa865e7b636f0f2f50b555dc8e
-
SSDEEP
768:JNK2cNW0QbRsWjcd+6yBFLqJ4Z8qx70RM8/O/B2Z9tRQ4:pcNjQlsWjcd+xzl7SMQQ4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1724 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" e6dacae0e7502d01c54ea385fd53ecc0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe e6dacae0e7502d01c54ea385fd53ecc0_NeikiAnalytics.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2844 e6dacae0e7502d01c54ea385fd53ecc0_NeikiAnalytics.exe Token: SeDebugPrivilege 1724 CTS.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1724 2844 e6dacae0e7502d01c54ea385fd53ecc0_NeikiAnalytics.exe 28 PID 2844 wrote to memory of 1724 2844 e6dacae0e7502d01c54ea385fd53ecc0_NeikiAnalytics.exe 28 PID 2844 wrote to memory of 1724 2844 e6dacae0e7502d01c54ea385fd53ecc0_NeikiAnalytics.exe 28 PID 2844 wrote to memory of 1724 2844 e6dacae0e7502d01c54ea385fd53ecc0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6dacae0e7502d01c54ea385fd53ecc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e6dacae0e7502d01c54ea385fd53ecc0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD507a74f287c422dfad2182cea220ee6a3
SHA123778715933ba6e5bcea8af9ec32c457f19eedd0
SHA25626a3e4c25826bdda43e3824c396dfa1ae4d788883ba074253f0283e9ce6c8219
SHA51254a0baf977fc2cd01231f5b4cbbec43a94c033bbfeba1deb59fb60fb5b28351fc114e1fb22a5d61616a559df3b4b548c58a9458e2a6e0c7b55ae3d69a3fd2685
-
Filesize
80KB
MD5ec704028ad7125c2fa52e04dc68c0ca3
SHA12a63f27d0138696c9c27a9ea2534e8f2ca11ddc4
SHA2565f77a5d7c9eac3b004820646dece450e315a6e3ed320dc183ae68d59cd2318bf
SHA512a008a08c980583b8698431ca44fa45d5565fdc5316dc3e58c47ae523e7a7a776162979b0c79f9c64f0b71e0d98fb49102679378354f76c270d0c99207c15d160