Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe
-
Size
904KB
-
MD5
e8b2d328bb6cc3f37cf13c74428de960
-
SHA1
8037d0f3a63d0b8d53d107a691d7643a7107de84
-
SHA256
607aea4a37d9249900c473ffb13d16eb688b95c10ca2ab9cd192c729fe0488d1
-
SHA512
253af489077e73777c1bb878d230c0f8e558f4e644c347d7c9efeb309e54f68a8cf99684875c1b209dd056319122ce51bbf5b580056b1e936fba5aafb9f68731
-
SSDEEP
12288:9n8yN0Mr8ti6aVArIygU40vy3W/ceKSHMsiFyY6XNm0FrSNPUZ6RwQv:FPutiz0fDjymk4HM5yJmaiP0Qv
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2124 Isass.exe 3024 Isass.exe 2696 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 3032 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe -
Loads dropped DLL 10 IoCs
pid Process 2484 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 2484 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 2484 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 2484 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 3024 Isass.exe 2696 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 3032 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 2124 Isass.exe 2124 Isass.exe 2124 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2484 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 2124 Isass.exe 3024 Isass.exe 3024 Isass.exe 3024 Isass.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2124 2484 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 28 PID 2484 wrote to memory of 2124 2484 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 28 PID 2484 wrote to memory of 2124 2484 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 28 PID 2484 wrote to memory of 2124 2484 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 28 PID 2484 wrote to memory of 3024 2484 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 29 PID 2484 wrote to memory of 3024 2484 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 29 PID 2484 wrote to memory of 3024 2484 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 29 PID 2484 wrote to memory of 3024 2484 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 29 PID 3024 wrote to memory of 2696 3024 Isass.exe 30 PID 3024 wrote to memory of 2696 3024 Isass.exe 30 PID 3024 wrote to memory of 2696 3024 Isass.exe 30 PID 3024 wrote to memory of 2696 3024 Isass.exe 30 PID 3024 wrote to memory of 2696 3024 Isass.exe 30 PID 3024 wrote to memory of 2696 3024 Isass.exe 30 PID 3024 wrote to memory of 2696 3024 Isass.exe 30 PID 2696 wrote to memory of 3032 2696 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 31 PID 2696 wrote to memory of 3032 2696 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 31 PID 2696 wrote to memory of 3032 2696 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 31 PID 2696 wrote to memory of 3032 2696 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 31 PID 2696 wrote to memory of 3032 2696 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 31 PID 2696 wrote to memory of 3032 2696 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 31 PID 2696 wrote to memory of 3032 2696 e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\Temp\{83E7CFB6-6781-416E-AF6D-605C1CAA1A7C}\.cr\e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe"C:\Windows\Temp\{83E7CFB6-6781-416E-AF6D-605C1CAA1A7C}\.cr\e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\e8b2d328bb6cc3f37cf13c74428de960_NeikiAnalytics.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1884⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
635KB
MD5b73be38096eddc4d427fbbfdd8cf15bd
SHA1534f605fd43cc7089e448e5fa1b1a2d56de14779
SHA256ab1164dcaf6c7d7d4905881f332a7b6f854be46e36b860c44d9eedc96ab6607a
SHA5125af779926d344bc7c4140725f90cddad5eb778f5ca4856d5a31a6084424964d205638815eab4454e0ea34ea56fafca19fadd1eb2779dc6b7f277e4e4ce4b1603
-
Filesize
211KB
MD59dabf3f974aa5b00955e2f005c4fd798
SHA1d160ec1b6ce83c79dc28e36cbae969e2b19c2440
SHA256ec83b2ba1279671f41343938d2664287b693c43ff2b4e02ad5858473fe6070eb
SHA512b493b2d23b38cdc1cacc053b952609846f313a82f6c5d51b911bea7902553475d491853ca5dcf9606a06a5c2b4ba6ae7d203babbe80a6280380d711dc77e0769
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2