Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 06:54

General

  • Target

    23b270add7b30a413a1b0d8047cb8570_NeikiAnalytics.exe

  • Size

    2.6MB

  • MD5

    23b270add7b30a413a1b0d8047cb8570

  • SHA1

    8ebd82ba85376d1108820112238134237f3a2fbd

  • SHA256

    c67427d1f7af3ad23965b88e84c0d4b78b30145eeee25450ca82ba7f22dac700

  • SHA512

    5b5b75f71cb46f00f9572843a8781a25cde92ca7f3bc043a6af58c153b1c4efabd8ebffaf620f45cb73304713fa740b2333def89f864118b83d1efe1c16ba55b

  • SSDEEP

    24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4e4:ObCjPKNqQEfsw43qtmVfq4p

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.mail.me.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    RICHARD205lord

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 26 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • NTFS ADS 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23b270add7b30a413a1b0d8047cb8570_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\23b270add7b30a413a1b0d8047cb8570_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe
      C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        0
        3⤵
        • Suspicious use of SetThreadContext
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp642F.tmp"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2536
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp64FB.tmp"
          4⤵
          • Accesses Microsoft Outlook accounts
          • Suspicious use of AdjustPrivilegeToken
          PID:2856
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp7911.tmp"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2576
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2776
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:760
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2556
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2068
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2500
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2948
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1464
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2416
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:844
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2288
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:112
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:988
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1836
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2376
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2004
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1696
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1728
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1664
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:3040
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2740
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2656
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2572
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:3004
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2756
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1644
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        0
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:288
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp4E9D.tmp"
          4⤵
            PID:1296
        • C:\Windows\SysWOW64\schtasks.exe
          C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
          3⤵
          • Creates scheduled task(s)
          PID:1792
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {24FECE88-E8C4-4A6F-A549-3EC6FE457A51} S-1-5-21-481678230-3773327859-3495911762-1000:UIBNQNMA\Admin:Interactive:[1]
      1⤵
        PID:548
        • C:\ProgramData\winmgr119.exe
          C:\ProgramData\winmgr119.exe
          2⤵
          • Executes dropped EXE
          • NTFS ADS
          • Suspicious behavior: EnumeratesProcesses
          PID:848
        • C:\ProgramData\winmgr119.exe
          C:\ProgramData\winmgr119.exe
          2⤵
          • Executes dropped EXE
          • NTFS ADS
          • Suspicious behavior: EnumeratesProcesses
          PID:2888

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Scheduled Task/Job

      1
      T1053

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Scheduled Task/Job

      1
      T1053

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Scheduled Task/Job

      1
      T1053

      Defense Evasion

      Modify Registry

      2
      T1112

      Subvert Trust Controls

      1
      T1553

      Install Root Certificate

      1
      T1553.004

      Credential Access

      Unsecured Credentials

      2
      T1552

      Credentials In Files

      2
      T1552.001

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      2
      T1005

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\khaxFMfI\009276b996b04917a9a60a951037d8a6
        Filesize

        16B

        MD5

        90ecb76c90cdd05e60b1c0b06ac158cf

        SHA1

        73a7ad54f7751552b147d8bcac6fe7f5ab71a480

        SHA256

        09c4bfd0e179926ff30c08695837c3b5c23d722d64aa95e2af43c3713ececb11

        SHA512

        82509393400ec6d9fb079e8f55f83f7133d615d1322283836bb3784faa89b0f755bea451952d714ea5aaaf302baa7b3369f32eae53adaae437de550e5c378233

      • C:\ProgramData\khaxFMfI\189d625f98324bab87032800e1e7f084
        Filesize

        8B

        MD5

        f399eb6a4201f31243b45bec4f24424a

        SHA1

        c72edb4acc307f14b4b33bda2751eddb0505d486

        SHA256

        d3bf914db82c128dd56db07298f1e2088e6342043fb3460a089cb13475b64c2c

        SHA512

        952569ccea491de2d4dae77c7fc6ee77cbec877bf4ef5a97f78a29fe50c5218caebd9fb8ebacfc1ad9a2e22c502a945bb81816cab891fe1362a69c9d01b9a7be

      • C:\ProgramData\khaxFMfI\2c945db753d341ef9b0f02d75d493749
        Filesize

        8B

        MD5

        fc7f279669d1ced8d0ade0e5de7db3d6

        SHA1

        2908a8b3a95b3ebe9e96c4b50d99481edda85e6a

        SHA256

        6e0e547839bb2a094f6fc878264c0c7329b2d12de328e7ba3589881dfc0c1e51

        SHA512

        20c6c66c549b85aa7dbf5578fdf4f4d2ef6db0cd0137e0632b1080e08f95f7c16181d327b3542b575fbb9e0b3e2195b260a5bd11160addfb6c64135bdf9a0235

      • C:\ProgramData\khaxFMfI\47928f366bbf48c9ad07f8d6a7670eaf
        Filesize

        88B

        MD5

        ceab929c883ec52f5aeacb93f9314fd2

        SHA1

        e07bb3de7939e0c0c6f3bc9c24b6f3683e66e81f

        SHA256

        0158c5da1833669dc55b03d9a5bdf9a9abbdff58708aa1fbb9abbf4e2f0df13a

        SHA512

        8f5b2a83bce920255049216383602eb07d665829b663a5bd66faf8ff8f64914c30a2d8bec165bb430dbd4452baadf3f61aed0c307480552196611a283ef7a880

      • C:\ProgramData\winmgr119.exe
        Filesize

        2.6MB

        MD5

        f186e581eeb25618e933944e75ffeee0

        SHA1

        36478bd1a44f762f1951af1012c75e2e14775d41

        SHA256

        893dae87abb152a18e1c22d942a650b0ac345bbb0d9c88dfe5f5082e89818455

        SHA512

        01689c4bf091980e637a86b703cf7837b8e2d52adca5e98d0d59d2af66ebd3636acb1cf86b264f5bb81f809bc9fe438f967c511cd13d2fde658867d697d775f3

      • C:\Users\Admin\AppData\Local\Temp\Cab69BF.tmp
        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\Local\Temp\Tar69E1.tmp
        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Users\Admin\AppData\Local\Temp\tmp642F.tmp
        Filesize

        399B

        MD5

        e4bf4f7accc657622fe419c0d62419ab

        SHA1

        c2856936dd3de05bad0da5ca94d6b521e40ab5a2

        SHA256

        b32fa68b79c5a7ceaa89e8e537efe33a963c499666202611329944bd2c09318e

        SHA512

        85dc223e39a16ddeba53a4b3d6c9eff14d30ec67dfda1e650da2c9057f640edd033a31868915a31caac0d325d240a7f634f62cd52fbd2adc68bd1d9cb6281431

      • C:\Users\Admin\AppData\Local\Temp\tmp64FB.tmp
        Filesize

        400B

        MD5

        de4e5ff058882957cf8a3b5f839a031f

        SHA1

        0b3d8279120fb5fa27efbd9eee89695aa040fc24

        SHA256

        ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49

        SHA512

        a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72

      • C:\Users\Admin\AppData\Local\Temp\tmp7911.tmp
        Filesize

        391B

        MD5

        3525ea58bba48993ea0d01b65ea71381

        SHA1

        1b917678fdd969e5ee5916e5899e7c75a979cf4d

        SHA256

        681bcee53cf679ac674e700136f9229b9184fe60ed6410dbd7a33d462ed13ae2

        SHA512

        5aad8dca43ec85882daf50c469bd04dcf0b62affc8bc605b3e289496a2679d4d548fea8bb0aea7080bbfbcdcab9d275fc6797b9c95b64f9f97ecf79583a83986

      • \ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe
        Filesize

        2.6MB

        MD5

        99045a905d977f512b93f33470909f2e

        SHA1

        31ab68218b3cee928491ae11b36f6767bfff221a

        SHA256

        eab1e31b17a4edf0cdb3a5fe9af61cc5ae2c288a215cc0dd61e9108f44fc25a8

        SHA512

        8d64bd1c50039c0432e92e8e5f08a3f8c146f6501916ce5a917a8fad2ca50b8c8d0d5e861ce7adc0cbab1b0095d0781dccdd192d12df2f9edeccd21bf2a70484

      • memory/288-103-0x00000000001D0000-0x000000000029A000-memory.dmp
        Filesize

        808KB

      • memory/288-100-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
        Filesize

        4KB

      • memory/288-101-0x00000000001D0000-0x000000000029A000-memory.dmp
        Filesize

        808KB

      • memory/288-102-0x00000000001D0000-0x000000000029A000-memory.dmp
        Filesize

        808KB

      • memory/2536-22-0x0000000000400000-0x000000000048E000-memory.dmp
        Filesize

        568KB

      • memory/2536-24-0x0000000000400000-0x000000000048E000-memory.dmp
        Filesize

        568KB

      • memory/2536-23-0x0000000000400000-0x000000000048E000-memory.dmp
        Filesize

        568KB

      • memory/2536-31-0x0000000000400000-0x000000000048E000-memory.dmp
        Filesize

        568KB

      • memory/2576-80-0x0000000000400000-0x000000000043C000-memory.dmp
        Filesize

        240KB

      • memory/2576-77-0x0000000000400000-0x000000000043C000-memory.dmp
        Filesize

        240KB

      • memory/2576-78-0x0000000000400000-0x000000000043C000-memory.dmp
        Filesize

        240KB

      • memory/2672-84-0x0000000073D32000-0x0000000073D34000-memory.dmp
        Filesize

        8KB

      • memory/2672-18-0x0000000073D32000-0x0000000073D34000-memory.dmp
        Filesize

        8KB

      • memory/2672-17-0x0000000000090000-0x000000000015A000-memory.dmp
        Filesize

        808KB

      • memory/2672-15-0x0000000000090000-0x000000000015A000-memory.dmp
        Filesize

        808KB

      • memory/2672-13-0x0000000000090000-0x000000000015A000-memory.dmp
        Filesize

        808KB

      • memory/2672-10-0x0000000000090000-0x000000000015A000-memory.dmp
        Filesize

        808KB

      • memory/2672-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
        Filesize

        4KB

      • memory/2856-34-0x0000000000400000-0x0000000000491000-memory.dmp
        Filesize

        580KB

      • memory/2856-36-0x0000000000400000-0x0000000000491000-memory.dmp
        Filesize

        580KB

      • memory/2856-74-0x0000000000400000-0x0000000000491000-memory.dmp
        Filesize

        580KB

      • memory/2856-35-0x0000000000400000-0x0000000000491000-memory.dmp
        Filesize

        580KB