Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2024 13:32

General

  • Target

    5aaaffdc4bc4802ab0bcec9a62d63930_NeikiAnalytics.exe

  • Size

    4.1MB

  • MD5

    5aaaffdc4bc4802ab0bcec9a62d63930

  • SHA1

    2176930b0802f756ab7193e3c509f9e302f026ca

  • SHA256

    0be71902d15a12bb0f21ab325ab5f50c4b7935a6320a9c810064ab712142a872

  • SHA512

    5e684a05e5bdd754254af407b54e2a7a14ab769fdb9bd526c8ead612e0a59830eb3bb411ad7f93a543e796ca0443e48242954e25917c0fc0abcbeaaec6b094bc

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBEB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUp/bVz8eLFcz

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5aaaffdc4bc4802ab0bcec9a62d63930_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5aaaffdc4bc4802ab0bcec9a62d63930_NeikiAnalytics.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2240
    • C:\UserDotDT\xoptisys.exe
      C:\UserDotDT\xoptisys.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\KaVBQQ\dobaloc.exe

    Filesize

    4.1MB

    MD5

    94dfa680d1110c1878b44300c924a6d8

    SHA1

    ff879088a17f609d9d880cfa3ff1aef790cdc394

    SHA256

    b51e6fa4646cfbd75fb398821642b6dc3fd678bc9f2a11f27cbfc65316d5103e

    SHA512

    9678afeb1a9bccd67ee373260f80d84fa459d8e29394d40cc52dadec2375c46459e6bf52fdbf1c33e497d5c575cb08718918a5ee1f9dd6e294119c61295958b5

  • C:\UserDotDT\xoptisys.exe

    Filesize

    4.1MB

    MD5

    3c4fe9bc9e100f62f6fa4ace6b7df7de

    SHA1

    17199ebf4161ca524747cb51bf455b8bd0182dda

    SHA256

    dd5c7b68f244bc81391da14664860e39edd06eca0beb7ef7f093d2b83744f148

    SHA512

    7f8fb6629fa844b8a425e069572591e08d3fbf39b481909a738750f0d8b5ce48f36b65aae476cdd532d14e40dae6af647b20f6a57aed94dc7c9b93456cd4eb21

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    170B

    MD5

    8456938cb093d7e56432b74f52f521dd

    SHA1

    b4b67221aef0fb08c5ac81545906f51e04533589

    SHA256

    62357e25ce63ea78a9fe47362235c9f028c4483b029d6a11c79624f2de40e8bf

    SHA512

    8b7ecec1ff7e67e5c5ce79f2fd7766ccd3798676a130fd2355073b55839b0750239dcf83aecbe6909ef5181103c4576f91c97630acc235c0a6d7983f9e7fc311

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    202B

    MD5

    0ab0138860c11670e5a3bd4b88994884

    SHA1

    53135aa390cc029671df6b32c4983c409e392527

    SHA256

    395d295c584948fca23b6b786dc2da28cc7ed7df90553d12ef8fcd3f66fa91bb

    SHA512

    c0021d6ccfa7a26317b322c4ee78a5a80e895573c053299c32f8fc75da68bd952c81b6abb5487d16caa18bc384e4d12a7a1abe17f4994fa49f7fbf7aa3f2a304

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecabod.exe

    Filesize

    4.1MB

    MD5

    6262f03f5a3a93a62b260a056db22a70

    SHA1

    7ecddbba0b78be9731f524a96c8f95e6441119ce

    SHA256

    74666e8f5befe2e7e34978b8571797dbf8ea1379669afc33aec2cb31bd14fef8

    SHA512

    0d58b4024fd121e0c55b0c16f53c3c054db5419064d6c3d25ad00e29eb05316a7b9c8408f750a3f8229950b847a2b5a4eddd3a249e7499774d9a05d72e5af99e