Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-05-2024 13:23

General

  • Target

    c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe

  • Size

    2.9MB

  • MD5

    c8c6b960a64cb319bf37b53591955960

  • SHA1

    f04f1d843a9a8b4244ebb7d4a8bd04fdcd03872d

  • SHA256

    5cf77cb93ee5c6fda6b575b6c14d60cb52dc6a69e17d23d989c088f4a098b0e8

  • SHA512

    31110e87110406b1ca88cfafbf4c00d7c7a767393008a66b4f2748df387474af576bc7eb04adc4ac12c11f7b0e33150c16d7a60c12ff7a5592106d1ed11769fb

  • SSDEEP

    49152:UHszeWDxWaQYU9xnOunPr423fny4CMqH05hKSX0PzdVYQ+Wnbf8enNlDUjZxEhso:UHSpVU9bPr42XRqUfXCzHYQBbf8iNtSw

Malware Config

Signatures

  • Detect Neshta payload 15 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\3582-490\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Windows\Temp\{87EA7342-8523-4B75-B62B-5532398F6C3A}\.cr\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe
        "C:\Windows\Temp\{87EA7342-8523-4B75-B62B-5532398F6C3A}\.cr\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\3582-490\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe" -burn.filehandle.attached=548 -burn.filehandle.self=536
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4176
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3940 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:316

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Event Triggered Execution

    1
    T1546

    Change Default File Association

    1
    T1546.001

    Privilege Escalation

    Event Triggered Execution

    1
    T1546

    Change Default File Association

    1
    T1546.001

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe
      Filesize

      2.4MB

      MD5

      8ffc3bdf4a1903d9e28b99d1643fc9c7

      SHA1

      919ba8594db0ae245a8abd80f9f3698826fc6fe5

      SHA256

      8268d3fefe8ca96a25a73690d14bacf644170ab5e9e70d2f8eeb350a4c83f9f6

      SHA512

      0b94ead97374d74eaee87e7614ddd3911d2cf66d4c49abbfd06b02c03e5dd56fd00993b4947e8a4bcd9d891fa39cab18cc6b61efc7d0812e91eb3aea9cd1a427

    • C:\Users\Admin\AppData\Local\Temp\3582-490\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe
      Filesize

      2.9MB

      MD5

      fe7b3a28d0d7b2812d117f822d938e65

      SHA1

      a19dcfb8ed6627f1b0f9e54a7c64e4014e523b7a

      SHA256

      d4a1891cd83e19fbb3d908f6db3bfd516f65e06108fbe0c45fb7fc52f132d3b4

      SHA512

      ae7ac7d11bcb3108ca8ba9b47b0d90630c1fc6a5fdb3de4d26ea988e1645fb805bfeaf0dad5c8edd0d0928e299051375a6d073f504e503778bfd39e9b078f8a3

    • C:\Windows\Temp\{31A24D23-3D1D-4D37-A5A8-6E46396249C3}\.ba\Bootstrapper.dll
      Filesize

      197KB

      MD5

      cbd90fb2b484f33d2878d8d81794de37

      SHA1

      ac153d36b1ffb15e933509b0cc5a38deee12bbd9

      SHA256

      df40c2e9c90ad31f1130d37e2dbe896369c5df5737010432464fc853e5ea2f30

      SHA512

      ef5d647916362a81107bce5ac7ffd1e20d75308f96437f8134a89895866d4579ceaea88f0d59590c9a6de6f8d27efef861f088637e8d0ad6fe95df6287a4b829

    • C:\Windows\Temp\{31A24D23-3D1D-4D37-A5A8-6E46396249C3}\.ba\BootstrapperCore.config
      Filesize

      1KB

      MD5

      5a502123a2adb3c114dbe6c5d37f9f61

      SHA1

      c0d90ce929ec8c626dc1db431edc0b70b7edee6a

      SHA256

      2527c708b6cab167e0c7c9a281f1aad6e8d952bc7ab0cc5731d6decca181cd5f

      SHA512

      3a182f3d51e31257487e409b882c89d5c115623f0db905fa0d557cb1a010810b25046c11929b0827624fbe7f4dd0bde32869eff1a3ecd2462cde05d990552bde

    • C:\Windows\Temp\{31A24D23-3D1D-4D37-A5A8-6E46396249C3}\.ba\BootstrapperCore.dll
      Filesize

      87KB

      MD5

      b0d10a2a622a322788780e7a3cbb85f3

      SHA1

      04d90b16fa7b47a545c1133d5c0ca9e490f54633

      SHA256

      f2c2b3ce2df70a3206f3111391ffc7b791b32505fa97aef22c0c2dbf6f3b0426

      SHA512

      62b0aa09234067e67969c5f785736d92cd7907f1f680a07f6b44a1caf43bfeb2df96f29034016f3345c4580c6c9bc1b04bea932d06e53621da4fcf7b8c0a489f

    • C:\Windows\Temp\{31A24D23-3D1D-4D37-A5A8-6E46396249C3}\.ba\Chipset.Bootstrapper.dll
      Filesize

      10KB

      MD5

      b20303841a71e1754adf296496633a71

      SHA1

      226507f26be011ee2de5248161c24a93c997961e

      SHA256

      ba072d1caf155a26d186063260f8d27126549805bfd9e8e0d537d343e24cbbcb

      SHA512

      f6a73fb032eb0192e3c41cf573fafef1326f48d0eb156c4726be6ef1f3569ccbbe3d8560cee3a5046f23d92c8d329b8adffd01a63bf6e6c2b8e1334ac19a6666

    • C:\Windows\Temp\{31A24D23-3D1D-4D37-A5A8-6E46396249C3}\.ba\CommandLineUtility.dll
      Filesize

      46KB

      MD5

      325b410c9d84003f5037cedf07bb97fe

      SHA1

      9a93f6cf8bcd15e0aa12c96109836e57b6d9267a

      SHA256

      4b2330966345bb6fc6382e81a4ff1e7eab43a3ec642dedb8f2add7e0b03c6e41

      SHA512

      d2359b7ca0ac32a22324b38d1b5325a045f4a1fa380761741349e86f6007c8850fa25f18ae9cfdbbeaf592412766b961be9491a64b478657e2d0a3ea9d5a7457

    • C:\Windows\Temp\{31A24D23-3D1D-4D37-A5A8-6E46396249C3}\.ba\Intel.Tools.dll
      Filesize

      18KB

      MD5

      36700b8cb3f725c0b266786200c86dde

      SHA1

      9734c9f8b193c77797a4c8785ac5cfac84befa52

      SHA256

      52e7dab135e97b048c81bb943f9f231244588c1e8c0ccfb7a32b75a106e35f62

      SHA512

      ecfe58c0fd34f738a61aec34eb938c557a59adce4e4344d1ad52ed0a7348b582c3d15b7dbeaaf9182e097d3a66c1535ac2029cbb4df91f992f9e169bc1aac2f9

    • C:\Windows\Temp\{31A24D23-3D1D-4D37-A5A8-6E46396249C3}\.ba\mbahost.dll
      Filesize

      119KB

      MD5

      c59832217903ce88793a6c40888e3cae

      SHA1

      6d9facabf41dcf53281897764d467696780623b8

      SHA256

      9dfa1bc5d2ab4c652304976978749141b8c312784b05cb577f338a0aa91330db

      SHA512

      1b1f4cb2e3fa57cb481e28a967b19a6fefa74f3c77a3f3214a6b09e11ceb20ae428d036929f000710b4eb24a2c57d5d7dfe39661d5a1f48ee69a02d83381d1a9

    • C:\Windows\Temp\{87EA7342-8523-4B75-B62B-5532398F6C3A}\.cr\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe
      Filesize

      2.1MB

      MD5

      329c83c19c24414bc4197e8edb59be73

      SHA1

      c87a0c70d4aa94d1785b1a10fa31c0f33dcae8a9

      SHA256

      f77c93d43d8ed763e19a8398c6fd8c5725bed806186be69d0723d9de1255a211

      SHA512

      640b042b0f6b3c8756756f6e8faf15ba33c0b3a4e125f7866080a167a2216f8aee435402613d9298501093a30e4f807b30a80584ac323291fd09eff5a12da150

    • memory/2024-270-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2024-266-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2024-269-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2024-268-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2024-271-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2024-267-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2024-272-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2024-123-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2024-265-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2024-108-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2024-263-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2024-144-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2024-247-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2024-165-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/4176-124-0x0000000072980000-0x0000000073130000-memory.dmp
      Filesize

      7.7MB

    • memory/4176-149-0x0000000007B90000-0x0000000007C22000-memory.dmp
      Filesize

      584KB

    • memory/4176-148-0x0000000072980000-0x0000000073130000-memory.dmp
      Filesize

      7.7MB

    • memory/4176-162-0x0000000072980000-0x0000000073130000-memory.dmp
      Filesize

      7.7MB

    • memory/4176-147-0x0000000072980000-0x0000000073130000-memory.dmp
      Filesize

      7.7MB

    • memory/4176-166-0x0000000072980000-0x0000000073130000-memory.dmp
      Filesize

      7.7MB

    • memory/4176-169-0x0000000007F90000-0x0000000007FC8000-memory.dmp
      Filesize

      224KB

    • memory/4176-171-0x0000000007D00000-0x0000000007D0E000-memory.dmp
      Filesize

      56KB

    • memory/4176-217-0x0000000072980000-0x0000000073130000-memory.dmp
      Filesize

      7.7MB

    • memory/4176-146-0x000000007298E000-0x000000007298F000-memory.dmp
      Filesize

      4KB

    • memory/4176-143-0x0000000007010000-0x0000000007022000-memory.dmp
      Filesize

      72KB

    • memory/4176-264-0x0000000072980000-0x0000000073130000-memory.dmp
      Filesize

      7.7MB

    • memory/4176-139-0x0000000007440000-0x00000000079E4000-memory.dmp
      Filesize

      5.6MB

    • memory/4176-138-0x0000000006CD0000-0x0000000006CDC000-memory.dmp
      Filesize

      48KB

    • memory/4176-134-0x0000000006D10000-0x0000000006D48000-memory.dmp
      Filesize

      224KB

    • memory/4176-130-0x0000000006CC0000-0x0000000006CC8000-memory.dmp
      Filesize

      32KB

    • memory/4176-121-0x00000000068A0000-0x00000000068B8000-memory.dmp
      Filesize

      96KB

    • memory/4176-117-0x0000000072980000-0x0000000073130000-memory.dmp
      Filesize

      7.7MB

    • memory/4176-115-0x0000000072980000-0x0000000073130000-memory.dmp
      Filesize

      7.7MB

    • memory/4176-114-0x000000007298E000-0x000000007298F000-memory.dmp
      Filesize

      4KB