Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2024, 22:41

General

  • Target

    79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe

  • Size

    3.9MB

  • MD5

    79282650946aa061feda7bb4f0ca2870

  • SHA1

    9b08233ee7c898a0a247c5cb379cb06cf660d597

  • SHA256

    0f71cd9425616efad6c00696769ad12080cf491daf00bb79811e2bee8c1bbe15

  • SHA512

    7f92abff390cb1d0462cc9e4a9cd5004f91108fa7e76a06478ec3e285d070520f329ccc9315cf19b3baa1f47185be74dfddb986f788dee64f2d2887e25575d3f

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBbB/bSqz8:sxX7QnxrloE5dpUpYbVz8

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\79282650946aa061feda7bb4f0ca2870_NeikiAnalytics.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2732
    • C:\UserDotVH\xbodsys.exe
      C:\UserDotVH\xbodsys.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\GalaxU8\bodxec.exe

    Filesize

    3.9MB

    MD5

    7f6b65d8ff9cb951b7023a5b167c46a3

    SHA1

    8f61882e8fabd254c917b2064af12d574a05c671

    SHA256

    4335384a8ada37ccfba189be70ba8dc2e218557934bdfeddd2d07912c3e0fc09

    SHA512

    cb972df50e565173c72b2fe0bfdbbaa6ec36b3e9b663b0d2622e9d53fe322e6d873fa3302cbe345a0281a5959a0d93097267ede8cf3222aea7df03281473c5cc

  • C:\GalaxU8\bodxec.exe

    Filesize

    3.9MB

    MD5

    d597062f484446c9a111dee1b2f80d9b

    SHA1

    5c7b68bb2bb32ac0b21387d490efddd9ff2e5600

    SHA256

    91b31d825dbfc2b0fcb8ee89501d2bcace988bf7d04e69b58d470e9329039169

    SHA512

    cab715945632dd15f397f77abc693183fa0bf1d99ab830c0beefeb44c00915316c70c3c17c4d3906c22baa84821eb80251eac5c4746bb3cc8e623cfc79de2970

  • C:\UserDotVH\xbodsys.exe

    Filesize

    3.9MB

    MD5

    fd5e65b8eb4890534e37dd791582365d

    SHA1

    02ecef6971bd832bf0cb2a03f9646275fd46492e

    SHA256

    6fe424e36b5e85cd00b8e2ddf590f0ccd16af8feb2484676be5a9f4ff968c816

    SHA512

    2f753194edde03c430ac7cff962e974d0c4f85b2f3f6b5342ef853cb7cbb4a156134a7fa4418ed8f63c1026b6b8b10623a39c4a4561e1a2fd3059c084fb19cb1

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    170B

    MD5

    e2209238850a56c603680d8f3d51083d

    SHA1

    d13902224feeee5fcd2359955c583580eff320b6

    SHA256

    584c1c990bade01a122ca182b4ddd27c999f69a547aef0ed46faa39fafb392e6

    SHA512

    59c47520e0ece5832c027331e2fa849d7dd70a1fff0b224f170b48ee7a19d9e71fc0bdaecf4e0ff379d8350b8e854aae92b0c9f20b09b5eed832b0eef744ff51

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    202B

    MD5

    662d8095ea06bbdcd654f7190d88d4b3

    SHA1

    e35b435c79c73fa08f9940cee9070d62a01f47a1

    SHA256

    a4fa63f36464c746034cd60d9a72e7eb9fb3a2c4e9fc1f94fe48450333c65b7a

    SHA512

    60b51147b73b4a2b18f2d47bf892819a4a7fba7e8d02e804192e592dc15a64c7ecc1a487c632c9c10a1478dfba7e3ff69dfe540c8420fb4749f3edab86745036

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe

    Filesize

    3.9MB

    MD5

    d21fbd4fbbfa89238943e694efd45179

    SHA1

    9fe60c6ca1556fe571a509e322400e8db4e0a3b8

    SHA256

    f87e8bcedb53a9c665aa0eb0712fcf58482c52ba511fd24d873b3aef3709e953

    SHA512

    f7165b61f9cf7f449ec9bc55da32525e8da9e8a4179e1d419fb1e11af1126c86d096c72618f0e4a851c557f7009ff6b67bb21c69a297b646a716af2559ae0da1