Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 20:55

General

  • Target

    0de3f1ee1da6ffcb52540daa79453010_NeikiAnalytics.exe

  • Size

    569KB

  • MD5

    0de3f1ee1da6ffcb52540daa79453010

  • SHA1

    77ad40eeb4e5dc0da0de7820f0dd72ee758c6425

  • SHA256

    55a6680943aae16c189001f3566dccf20f7a80ca829e12a211432c9d3c2d20db

  • SHA512

    01d11be57398424964b0c33d24f01daec6daaef9bb9f7d5dfe427e6fa8af5965d05c37bac1edbc8253ca42fe53758b1e1bb512b0d30f0078b4a79f9e37e79b35

  • SSDEEP

    12288:NpJcShRZhRUQ4hK137WTh0tFhfa+WHjpcf2E1eR4IrxwV:NpySZjQE13STh0tFda+CtcfR1eR

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 58 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0de3f1ee1da6ffcb52540daa79453010_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0de3f1ee1da6ffcb52540daa79453010_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3844
    • C:\Users\Admin\AppData\Local\Temp\40A3.tmp
      C:\Users\Admin\AppData\Local\Temp\40A3.tmp
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      PID:1684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\59D76868C250B3240414CE3EFBB12518_809DE37BF6F91747203FF7559791C460

    Filesize

    471B

    MD5

    6a2addc78ace6881803ceb2af8e5434d

    SHA1

    2a6eb1ddaf31c834ca82a14067a5ca50b57f9da2

    SHA256

    da2439d8b6584ca641cb5233141c6e2bff0b306323021e403bbf682c08adf182

    SHA512

    277a9d069e2a08ee594fa77ed7e7e5c3e23c22d828d1254038344aa11c8e770e13e77a86edceaee64118b757b63a57f432c832c034cd66166755668228a7f94c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419

    Filesize

    471B

    MD5

    e5e3b9a44e7c44eb10937abff1471b6b

    SHA1

    de4c3e789179fbe019b4cb5da76aa076820a0f96

    SHA256

    b8daf1b1a084c58499b53a768fa833b9de752269a28177568841173c26589055

    SHA512

    72bd25a6de0bb1e90d514d4fed18ce6e259a729220416e2bf56b83dd6e57126673ee5d478a1f3dfe67971f51a92cdf819600f8feaf42a9d481193adeb43ce092

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\59D76868C250B3240414CE3EFBB12518_809DE37BF6F91747203FF7559791C460

    Filesize

    404B

    MD5

    629174bce6e9a015dfeb5bacfaf84c47

    SHA1

    dc68f35fd94912ff4bbbc619cc5e1b8880d87f7d

    SHA256

    a0fafc11271fa270e21106ff8f03040514d25bc144536f4184d6d40abd3f32b3

    SHA512

    ed12fcf055896aefe552a051c9bdaf46c3469440e09fe56d0ef1f35c82d45915c78cef0bb86a2c8b6520ff6fd1506c9e2b4127ea16aeb42739b767e4c2787243

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419

    Filesize

    412B

    MD5

    19355932ead7d6a4ee2b065aa172508a

    SHA1

    b9e0409f66d99ed78f7bcc71a21e4e0f283ea79c

    SHA256

    0a28367a94af62123aed2dbd237e2ae986ca5925af46472fbb076cc83998e119

    SHA512

    e1f34b616e22acbf575ca88d5e9c8a2bf829ba4e05c2835d17df34121123a484b3d4ccb79a6bad5b91501cc8f12c725854e8c5ff01b37b28d4fabe1622425332

  • C:\Users\Admin\AppData\Local\Temp\40A3.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • C:\Users\Admin\AppData\Roaming\Adobe\LogTransport2\LogTransport2.cfg

    Filesize

    3KB

    MD5

    a1383a04720d80aac9f8ceeca06ddb5d

    SHA1

    3d0b26d44046384de7d57365eff5fcf8822f66af

    SHA256

    77e3eab7aa9884ab6efa94d046acc679cd718035609e585b539640f55f292ebb

    SHA512

    80af9f5400f1bf49476a292137ea6de6fe05976ed1968691b416b1b5b8a504b49e0f01fb2461b304ac9cc5c864456b5eb42c266054331bfcc7b80f5cea460dd7

  • memory/3844-0-0x0000000002220000-0x000000000225F000-memory.dmp

    Filesize

    252KB

  • memory/3844-1-0x0000000002220000-0x000000000225F000-memory.dmp

    Filesize

    252KB