Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe
-
Size
3.9MB
-
MD5
79282650946aa061feda7bb4f0ca2870
-
SHA1
9b08233ee7c898a0a247c5cb379cb06cf660d597
-
SHA256
0f71cd9425616efad6c00696769ad12080cf491daf00bb79811e2bee8c1bbe15
-
SHA512
7f92abff390cb1d0462cc9e4a9cd5004f91108fa7e76a06478ec3e285d070520f329ccc9315cf19b3baa1f47185be74dfddb986f788dee64f2d2887e25575d3f
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBbB/bSqz8:sxX7QnxrloE5dpUpYbVz8
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 2732 locabod.exe 2580 xbodsys.exe -
Loads dropped DLL 2 IoCs
pid Process 2248 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe 2248 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotVH\\xbodsys.exe" 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxU8\\bodxec.exe" 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2248 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe 2248 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe 2732 locabod.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe 2580 xbodsys.exe 2732 locabod.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2732 2248 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe 28 PID 2248 wrote to memory of 2732 2248 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe 28 PID 2248 wrote to memory of 2732 2248 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe 28 PID 2248 wrote to memory of 2732 2248 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe 28 PID 2248 wrote to memory of 2580 2248 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe 29 PID 2248 wrote to memory of 2580 2248 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe 29 PID 2248 wrote to memory of 2580 2248 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe 29 PID 2248 wrote to memory of 2580 2248 79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\UserDotVH\xbodsys.exeC:\UserDotVH\xbodsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD57f6b65d8ff9cb951b7023a5b167c46a3
SHA18f61882e8fabd254c917b2064af12d574a05c671
SHA2564335384a8ada37ccfba189be70ba8dc2e218557934bdfeddd2d07912c3e0fc09
SHA512cb972df50e565173c72b2fe0bfdbbaa6ec36b3e9b663b0d2622e9d53fe322e6d873fa3302cbe345a0281a5959a0d93097267ede8cf3222aea7df03281473c5cc
-
Filesize
3.9MB
MD5d597062f484446c9a111dee1b2f80d9b
SHA15c7b68bb2bb32ac0b21387d490efddd9ff2e5600
SHA25691b31d825dbfc2b0fcb8ee89501d2bcace988bf7d04e69b58d470e9329039169
SHA512cab715945632dd15f397f77abc693183fa0bf1d99ab830c0beefeb44c00915316c70c3c17c4d3906c22baa84821eb80251eac5c4746bb3cc8e623cfc79de2970
-
Filesize
3.9MB
MD5fd5e65b8eb4890534e37dd791582365d
SHA102ecef6971bd832bf0cb2a03f9646275fd46492e
SHA2566fe424e36b5e85cd00b8e2ddf590f0ccd16af8feb2484676be5a9f4ff968c816
SHA5122f753194edde03c430ac7cff962e974d0c4f85b2f3f6b5342ef853cb7cbb4a156134a7fa4418ed8f63c1026b6b8b10623a39c4a4561e1a2fd3059c084fb19cb1
-
Filesize
170B
MD5e2209238850a56c603680d8f3d51083d
SHA1d13902224feeee5fcd2359955c583580eff320b6
SHA256584c1c990bade01a122ca182b4ddd27c999f69a547aef0ed46faa39fafb392e6
SHA51259c47520e0ece5832c027331e2fa849d7dd70a1fff0b224f170b48ee7a19d9e71fc0bdaecf4e0ff379d8350b8e854aae92b0c9f20b09b5eed832b0eef744ff51
-
Filesize
202B
MD5662d8095ea06bbdcd654f7190d88d4b3
SHA1e35b435c79c73fa08f9940cee9070d62a01f47a1
SHA256a4fa63f36464c746034cd60d9a72e7eb9fb3a2c4e9fc1f94fe48450333c65b7a
SHA51260b51147b73b4a2b18f2d47bf892819a4a7fba7e8d02e804192e592dc15a64c7ecc1a487c632c9c10a1478dfba7e3ff69dfe540c8420fb4749f3edab86745036
-
Filesize
3.9MB
MD5d21fbd4fbbfa89238943e694efd45179
SHA19fe60c6ca1556fe571a509e322400e8db4e0a3b8
SHA256f87e8bcedb53a9c665aa0eb0712fcf58482c52ba511fd24d873b3aef3709e953
SHA512f7165b61f9cf7f449ec9bc55da32525e8da9e8a4179e1d419fb1e11af1126c86d096c72618f0e4a851c557f7009ff6b67bb21c69a297b646a716af2559ae0da1