Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe
-
Size
3.0MB
-
MD5
4c34d9f44a3a5cb6e258a51c4a1efa60
-
SHA1
5b9b00cdbcf3faa48e7d17475292e59070d6de28
-
SHA256
3aa288b56f4e5feb3cd6efff2ba6dd52089a0680346d2bc2876b979719f36754
-
SHA512
2c7424db0748526a570ee79aceaec4c7a97f8adc704c567a6d0a861358ea1c56db2b54880644721c9b74ec7276c50d8680f7aab9bb1d20ef66db8f6b8a941fad
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBxB/bSqz8b6LNX:sxX7QnxrloE5dpUpObVz8eLF
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe 4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 3844 sysdevopti.exe 3592 aoptiloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeV6\\aoptiloc.exe" 4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZ65\\optialoc.exe" 4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1968 4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe 1968 4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe 1968 4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe 1968 4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe 3844 sysdevopti.exe 3844 sysdevopti.exe 3592 aoptiloc.exe 3592 aoptiloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1968 wrote to memory of 3844 1968 4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe 96 PID 1968 wrote to memory of 3844 1968 4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe 96 PID 1968 wrote to memory of 3844 1968 4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe 96 PID 1968 wrote to memory of 3592 1968 4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe 97 PID 1968 wrote to memory of 3592 1968 4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe 97 PID 1968 wrote to memory of 3592 1968 4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4c34d9f44a3a5cb6e258a51c4a1efa60_NeikiAnalytics.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
C:\AdobeV6\aoptiloc.exeC:\AdobeV6\aoptiloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4168,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=3984 /prefetch:81⤵PID:2980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD54401005079b5d568781ba3036bcb13fb
SHA1ff818bcff46557b8a8571c31fa89e3cab499d383
SHA25681e6c650c3471498152617db40ac63fe7d015750b7aef001bf176d1e616c1e3e
SHA512113134a85e54f97f9477b4e2b4f856986fefb58a3606c636cdb91215733b31fd7add902282adf5a8d21834b55462a42ae329de8c2766f4481215c279e3d6daf9
-
Filesize
3.0MB
MD5edf33b16d9738446c3db0750b1b6b757
SHA13179fceb0abf564282741d246dbe54536ac60139
SHA2564ca1d2fc92c0a2641ccde4393125bd77a0d244a48f6efa09dfb69ef993987086
SHA512edc2da2b7ec2e284fd7befced11d81c644d3e0aded0435dd37a12477690137f98a8fb60668a2394b9eee26dc0d975b87ae9c4eed342a9b019b7558c5ca5355b5
-
Filesize
3.0MB
MD575d877e1d10b846635dba633429ebcdc
SHA131ece7df18be1917e231cd1c0c4d1d4dbd9f0557
SHA256cd300fad4d9541829c50245de98992f3b91378e8f1548145cd2d13e089aa4273
SHA512476e769fe68dea8af756388d88576f8ad2ad6c4ab49cd58ea2c8075c0db8eaa1bbf38b955b968b58626a48c9c8e98a8665b66ddcf8b273d1a9b03348103e9eba
-
Filesize
205B
MD57354f08ac4cdd2d10db080476a2f8b20
SHA16d54850f6c98c406ef3f265aa5771f11ceb90759
SHA256dc226e65b0dc37397673a2184d3fce79f834d58d32e0c6d8f7d54da7256bdda3
SHA5125003f8697477047229737133106170ddbf05dbb9b79ee40926dfa1c182a2671d0fdb062dccbd075e77e71cf4fcb0646547a2895e042f31c370cd00a1d3c1c7b6
-
Filesize
173B
MD5f33bab3376250229dfac181a5fab1e2c
SHA180531fcb2ca957f369b799925fb1a62f2f912253
SHA2568204b402197246735f3bba3b6ee2496b3148eb77c0f4bf736f30da3aded530f0
SHA512975a8de29dd7882f6adcf35f01da765e16bae704bd48b36116d367cc0720ccbd598cc492a5fd564f0ab143880dc621b5bd98d6731972833592b2ad59331470cb
-
Filesize
3.0MB
MD54ec6c66e9bdd45b4d0dd8fbae6c753fb
SHA1c0082fa39185d22c724c1f638a9a4e325c22a1e3
SHA256f9caa7849406448e75e5b599c7b487ddba696e926a51d83a2cdba45a32bf5982
SHA5126a0962a8f5dd0324c62b6f576a7934f89b17b4c9b999f6603487b354bd37600e80b77c2ddc347ae3679862abba1b8caf979e40e735a7f33e5f77ce0050e5bcbc