General

  • Target

    e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe

  • Size

    211KB

  • Sample

    240523-ed59cach6s

  • MD5

    e001ecbe13347dc35e2de3089f6144f0

  • SHA1

    ff99a479cee1d76005f9e9af1011818897b31a78

  • SHA256

    eb30e6e1159ac49a11426997c6354c2b73be0d177b56f523cfb1e8c93fc1c342

  • SHA512

    7720b9dd66fc7600924a59cf5b9444f87baadf864f1c832061dc9422ca6e3ff10428f2acda904e367a23dedb0210d751311f02c319790e95694baa11c7d351f7

  • SSDEEP

    3072:JTDETepBR25NaWUtdBuqE4grFYszWU6Uvn65ZkmxLZklBIZH:JRU5NaWUb8qE4yF9JPy5qmbklOZH

Malware Config

Targets

    • Target

      e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe

    • Size

      211KB

    • MD5

      e001ecbe13347dc35e2de3089f6144f0

    • SHA1

      ff99a479cee1d76005f9e9af1011818897b31a78

    • SHA256

      eb30e6e1159ac49a11426997c6354c2b73be0d177b56f523cfb1e8c93fc1c342

    • SHA512

      7720b9dd66fc7600924a59cf5b9444f87baadf864f1c832061dc9422ca6e3ff10428f2acda904e367a23dedb0210d751311f02c319790e95694baa11c7d351f7

    • SSDEEP

      3072:JTDETepBR25NaWUtdBuqE4grFYszWU6Uvn65ZkmxLZklBIZH:JRU5NaWUb8qE4yF9JPy5qmbklOZH

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (74) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Modify Registry

4
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks