Analysis

  • max time kernel
    142s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 00:03

General

  • Target

    666a2e0d5a9862b82ded948752e00a00_NeikiAnalytics.exe

  • Size

    646KB

  • MD5

    666a2e0d5a9862b82ded948752e00a00

  • SHA1

    7edbe6eb6b08f17ec639cff2d4bd331d2271c6d9

  • SHA256

    fbe49b5dde48d97da7ad101a93b7c8fda48c68faa4dfb8f23368c6af57724a8b

  • SHA512

    2da7f32f5d71e8384926bd240e992d9f44866a1d66d68d4afd20ea917c28f457c37a1484b8ef4bf5ba54d05a2f7bce9a3299a550e9e61b83fdc36d048390ac5b

  • SSDEEP

    12288:4bYJ/YGyx0FXuASzv2DqGzEuHWYJ/YGyx0FXuASev2Dq+PNoS8z:4UiGyKFe7CDqu51iGyKFe7VDq+PNoNz

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\666a2e0d5a9862b82ded948752e00a00_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\666a2e0d5a9862b82ded948752e00a00_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4564
    • C:\Users\Admin\AppData\Local\Temp\3582-490\666a2e0d5a9862b82ded948752e00a00_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\666a2e0d5a9862b82ded948752e00a00_NeikiAnalytics.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Windows\IFinst27.exe
        "C:\Windows\IFinst27.exe" -IC:\Users\Admin\AppData\Local\Temp\3582-490\666a2e0d5a9862b82ded948752e00a00_NeikiAnalytics.exe
        3⤵
        • Executes dropped EXE
        PID:1972

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe
    Filesize

    2.4MB

    MD5

    d9e8a1fa55faebd36ed2342fedefbedd

    SHA1

    c25cc7f0035488de9c5df0121a09b5100e1c28e9

    SHA256

    bd7696911d75a9a35dfd125b24cb95003f1e9598592df47fa23a2568986a4a9a

    SHA512

    134644c68bd04536e9ea0a5da6e334d36b1ce8012a061fa6dabd31f85c16a1ac9eee8c40fee3d55f25c4d4edf0672de8ce204e344c800361cbcff092c09d7a33

  • C:\Users\Admin\AppData\Local\Temp\3582-490\666a2e0d5a9862b82ded948752e00a00_NeikiAnalytics.exe
    Filesize

    605KB

    MD5

    d0b09059f54f22d5250bfdb36e85749c

    SHA1

    0099a2c8cff7616569acbc5af082a2641755dc1e

    SHA256

    4386e9e45f1b566b52cffef397e4b97f7e4b07363bf70f77c0648a698be56382

    SHA512

    185eb15e3fbd8f2ccdf9ed416422a4ea6c761ebf9e18fed12f5eaa748e1825c4ee4decb1189a9ffcae8b5bb39fa3884617314b5c790786d05f491d730177c586

  • C:\Users\Admin\AppData\Local\Temp\_if43A0.tmp
    Filesize

    3KB

    MD5

    1e28befa166fe2ef7b78e93c2ce971b7

    SHA1

    e7594e0b10b5af26576885dffd73ccd81cf0e8f2

    SHA256

    94135972aecdbe97a3d64ffaafeef684a1c76e7bb92a6a70a4df7dda560b2e90

    SHA512

    20fb5ef5de41788af69ea127ad96dd64f11a5956c47f024e5dc1ab2a5b558e4bb8fa92952fcb541ec02767988946e672bebdfda7d547a4a689911fdefd6f7585

  • C:\Windows\IFinst27.exe
    Filesize

    64KB

    MD5

    9c17bca3ef837bacded7e4299508e71d

    SHA1

    253c7e956ad6cb66e0e47e5d9a6a19d78e9c96e0

    SHA256

    2405e5479aeb7d43d1362969b9c439e5931b8f900f9adfe0faaa986365415193

    SHA512

    12c1c5dbdf763d6d361b9d412794b0d85b6134843114120b843f30db198a3a211e2c06eadd3ed25271b4cd06a7367df7dafc6b9b33b1bce479f3ad050caeb625

  • memory/1120-11-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/1120-30-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/1972-15-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/1972-119-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/4564-118-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/4564-120-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/4564-123-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB