Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-05-2024 15:49

General

  • Target

    e607131b6bfab6589fa8693f00e20220_NeikiAnalytics.exe

  • Size

    176KB

  • MD5

    e607131b6bfab6589fa8693f00e20220

  • SHA1

    b98d925a6ea462b4a61c695b30f11201bc9ba97a

  • SHA256

    aed0737533d9a5c2c9fac503b037132c223b3f3719f22604ba58261301c60b4c

  • SHA512

    7039e55b1ed540f7848753bcc7e2c2604b51d4aecf0f1a504df6ac13a0cdf71a9fdaac58b8a324f139bf7ba3e58a16f60891a1d8848c49228b261aad5ed41489

  • SSDEEP

    3072:sr85CSV2PIu4ogGrTNYcjeuU6LMMfb/8a:k9SygyTNMgtfb/h

Malware Config

Signatures

  • Detect Neshta payload 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e607131b6bfab6589fa8693f00e20220_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\e607131b6bfab6589fa8693f00e20220_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Users\Admin\AppData\Local\Temp\3582-490\e607131b6bfab6589fa8693f00e20220_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\e607131b6bfab6589fa8693f00e20220_NeikiAnalytics.exe"
      2⤵
      • Executes dropped EXE
      PID:1940

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE
    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\3582-490\e607131b6bfab6589fa8693f00e20220_NeikiAnalytics.exe
    Filesize

    135KB

    MD5

    b78e1089acbc29248020e5c8c161b27d

    SHA1

    0bd449ea1054bfcb562333cb0520d5a41fa2e3bf

    SHA256

    135779c529d3e3ddbd26308fcc2fa5cd7de5911113354e945492adffaee97160

    SHA512

    8e102d739404a0292c55f4a7f7fb65d8458424c84e8275e2abc58f1b61f2c3de7678f3aa1e09da467e132102fe70b9b6fd74a63659dd68b6e9022f32f8d0f323

  • memory/1940-8-0x00007FF79EB10000-0x00007FF79EB37000-memory.dmp
    Filesize

    156KB

  • memory/5064-94-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/5064-95-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/5064-97-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB