Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 03:57
Behavioral task
behavioral1
Sample
5fe0d791433b06792c910857a72fca50_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5fe0d791433b06792c910857a72fca50_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5fe0d791433b06792c910857a72fca50_NeikiAnalytics.exe
-
Size
1.6MB
-
MD5
5fe0d791433b06792c910857a72fca50
-
SHA1
0dedb715e809b5c5666bd8c9598f1ef2da405d1b
-
SHA256
ac82016516585cfb76c36a0808d84b263119b148f6a7aa7ab9d221d616954025
-
SHA512
9100856b77af8d1678adf33c4e0e7f643158a4be7937eb63ee05a5f06c6c5790a06cb4ad7660ac1bcd858160916d609d3c90f3690eb652481baa1280486bda9d
-
SSDEEP
49152:1kTq24GjdGSiqkqXfd+/9AqYanieKds6:11EjdGSiqkqXf0FLYW
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1237701622168158289/yCA4XMxxNf2MMWFp1FwpefUD1pLGH0mhT_TQTwndsr1dAVvybWr3hp5JZAVJm0HcEBh8
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1368 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1484 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5fe0d791433b06792c910857a72fca50_NeikiAnalytics.exepid process 1632 5fe0d791433b06792c910857a72fca50_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
5fe0d791433b06792c910857a72fca50_NeikiAnalytics.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1632 5fe0d791433b06792c910857a72fca50_NeikiAnalytics.exe Token: SeDebugPrivilege 1484 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
5fe0d791433b06792c910857a72fca50_NeikiAnalytics.execmd.exedescription pid process target process PID 1632 wrote to memory of 2904 1632 5fe0d791433b06792c910857a72fca50_NeikiAnalytics.exe cmd.exe PID 1632 wrote to memory of 2904 1632 5fe0d791433b06792c910857a72fca50_NeikiAnalytics.exe cmd.exe PID 1632 wrote to memory of 2904 1632 5fe0d791433b06792c910857a72fca50_NeikiAnalytics.exe cmd.exe PID 1632 wrote to memory of 2904 1632 5fe0d791433b06792c910857a72fca50_NeikiAnalytics.exe cmd.exe PID 2904 wrote to memory of 1716 2904 cmd.exe chcp.com PID 2904 wrote to memory of 1716 2904 cmd.exe chcp.com PID 2904 wrote to memory of 1716 2904 cmd.exe chcp.com PID 2904 wrote to memory of 1716 2904 cmd.exe chcp.com PID 2904 wrote to memory of 1484 2904 cmd.exe taskkill.exe PID 2904 wrote to memory of 1484 2904 cmd.exe taskkill.exe PID 2904 wrote to memory of 1484 2904 cmd.exe taskkill.exe PID 2904 wrote to memory of 1484 2904 cmd.exe taskkill.exe PID 2904 wrote to memory of 1368 2904 cmd.exe timeout.exe PID 2904 wrote to memory of 1368 2904 cmd.exe timeout.exe PID 2904 wrote to memory of 1368 2904 cmd.exe timeout.exe PID 2904 wrote to memory of 1368 2904 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fe0d791433b06792c910857a72fca50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5fe0d791433b06792c910857a72fca50_NeikiAnalytics.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp4062.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 16323⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak3⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Cab3F92.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar3FC3.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
C:\Users\Admin\AppData\Local\Temp\tmp4062.tmp.batFilesize
57B
MD5eabeddffe7aab0b4538303a4ca0c831a
SHA13df0727455ff18a75b24e3678bfc37496567de66
SHA2564a8215eb090f23f7974479c60387cf0a29fcf57b479142055faa023a70b90489
SHA512e7bb3368f22b5d6a1efbbc8c637706168cd345e305ffd3ffdf4dacc17cbedc0ba08147ed7e5e9bbcfe8fd0e9ae2f40b843e06ac7735f6fde7d8ef431dc36feee
-
memory/1632-0-0x000000007495E000-0x000000007495F000-memory.dmpFilesize
4KB
-
memory/1632-1-0x00000000000A0000-0x0000000000232000-memory.dmpFilesize
1.6MB
-
memory/1632-2-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB
-
memory/1632-6-0x0000000004440000-0x00000000044D2000-memory.dmpFilesize
584KB
-
memory/1632-7-0x0000000001FB0000-0x0000000001FD6000-memory.dmpFilesize
152KB
-
memory/1632-8-0x0000000000A30000-0x0000000000A38000-memory.dmpFilesize
32KB
-
memory/1632-47-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB