Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 05:20
Static task
static1
Behavioral task
behavioral1
Sample
44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe
-
Size
3.6MB
-
MD5
44c5a687f09c7cf905c1201b6cbb89b0
-
SHA1
cb9a49520fd02dcef1b22bccf49199304af3bd99
-
SHA256
3055b3aa55f7987d8a6971a5ca2894ef0b5d0123f6993628f2240758711904e9
-
SHA512
2e8e9e19f4e23a6314a95232ef91bc7a050e57bc6888563d4119c9c3d5b19c5e70a0026e1aa81da0089fa6c97a8e2e3da216427d3b312d931f1176949839a2c9
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBOB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpRbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe 44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 4248 sysdevopti.exe 4132 xbodsys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesOF\\xbodsys.exe" 44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintLN\\dobdevloc.exe" 44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4572 44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe 4572 44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe 4572 44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe 4572 44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe 4248 sysdevopti.exe 4248 sysdevopti.exe 4132 xbodsys.exe 4132 xbodsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4248 4572 44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe 96 PID 4572 wrote to memory of 4248 4572 44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe 96 PID 4572 wrote to memory of 4248 4572 44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe 96 PID 4572 wrote to memory of 4132 4572 44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe 100 PID 4572 wrote to memory of 4132 4572 44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe 100 PID 4572 wrote to memory of 4132 4572 44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\44c5a687f09c7cf905c1201b6cbb89b0_NeikiAnalytics.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysdevopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\FilesOF\xbodsys.exeC:\FilesOF\xbodsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1308,i,6593821857742176458,13646536021844995125,262144 --variations-seed-version --mojo-platform-channel-handle=4016 /prefetch:81⤵PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD53208e663b8a75a941894a0c93d93e1b0
SHA1e75699085214e5f01e1da82130b73b8b69b37685
SHA25604ff509fc495ef932a5e55ddcf0cfbd2509c74a8a373d5c0dd44565a213bea89
SHA5127397e7eb4af3690928d0a7a590ab4a8ffe0b21d98d27a2ed51815cf7486cc27d915e214b753c3d66cf34be8125fb92ef638753177bea0e7a89f5774b90c06d4c
-
Filesize
3.6MB
MD5036cae94d79a4b3c99839bcd01b25a3a
SHA1fcf57705e6058d5f787e11a17a58c2cc88393741
SHA256cf1a13d6c31e6c5a132d10fd52fcf2e19956108876b5a1df721fa9b20a631109
SHA512df8a87639092d4d5370bdb1bb2e54c2bc43ba4e3f4ecc4494ff17ce879491045d7aedd00614f1344318729c4666f1300faa4be2546ef23a0aa93c08a5a064ad5
-
Filesize
3.6MB
MD5a931d7dce94cd6115ece0f88e41d45a8
SHA1ad7cbca7b78083e7a456fa004924873dfc831f18
SHA256d4e02f453158def598dc7518934f38c19d7d08ab0f7bd3d3e63d051167e3ae34
SHA512f3b2dce79bc7e4df26fb9bde236b9d9dfdda192c661eafea990a30767f7508bc3afaaf9ce8697d69422a3e4a1317e67ecd907a8a1d12f874d7eea7389ec6f720
-
Filesize
205B
MD5c302a5af025743472570af197df97017
SHA186945238e324e61229b74b6cd2564836e2ba3568
SHA256602d05819592267f0987d6804073324238a656e446927905308e9d9ec2c07d4e
SHA51205bca1dcda393ecd50f74e82cffbffe39892272dd0732b3b4ad838947a84b2b672ce0dec00d81e588089584d976438581167407d3c9cc11caf5ff4587c75b3db
-
Filesize
173B
MD5ad7d331776eac85a6d467d4f93b763a1
SHA18face1bb88792c91c7267ca4ff5399afab944ada
SHA25649633c23c2eed9ecd9b3f488bac8c95755768490907adb31b5af50e53f10b93f
SHA512b9134e024e057b690c00a8b5670eda525ee5b2bb724b569320cf4fb4a615e8ef7965d7edacfb33fcf0166b0a9cf1b562b64a06c7cffde703a1feb366b5a8b8a2
-
Filesize
3.6MB
MD554ffbf088cb56768b319517116704202
SHA1607eed4782242eb6efb278a1f5cbff6404719efc
SHA2567037b83ba6b7277537c3caf9b626e60ed48e34ea1d2bbab58b0f988069c69749
SHA51235a210002d79b2b3efef13bb10dd7989aebca9315219e00bc7cc2b6a75471245645334c841af97547aee2e55a3776ca9f70e586591e71a740e3bd3fb8faa72af