Analysis
-
max time kernel
132s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe
-
Size
713KB
-
MD5
8052cedd205a553f3a02bd6a36a85d00
-
SHA1
ada283686217c783f0b6d388396cad26fb8b87e3
-
SHA256
e76b11ccaf546f2c7ac99afa909bf8231530587804762bc1aabc2d2893f84941
-
SHA512
363f593160c1a25a9250507542babadda77ef5d39e00abffba17ce5055ac9fff0019d3698748221f3fb471208e462c60cd39c4ef3eeda661527eb7a1ced3c91b
-
SSDEEP
12288:9n8yN0Mr8MP41v6ro4nBzr0p5PUGd2r/QnF7d87n:FPuMcCro4Bzr0p5PUGd2jBT
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2504 Isass.exe 2628 Isass.exe 3064 Isass.exe 2868 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 2412 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe -
Loads dropped DLL 11 IoCs
pid Process 3036 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 3036 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 3036 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 3036 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 2544 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 2544 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 3064 Isass.exe 2868 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 2412 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 2504 Isass.exe 2504 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3036 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 2504 Isass.exe 2628 Isass.exe 2628 Isass.exe 2628 Isass.exe 2544 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 3064 Isass.exe 3064 Isass.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2504 3036 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 28 PID 3036 wrote to memory of 2504 3036 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 28 PID 3036 wrote to memory of 2504 3036 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 28 PID 3036 wrote to memory of 2504 3036 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 28 PID 3036 wrote to memory of 2628 3036 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 29 PID 3036 wrote to memory of 2628 3036 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 29 PID 3036 wrote to memory of 2628 3036 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 29 PID 3036 wrote to memory of 2628 3036 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 29 PID 2628 wrote to memory of 2544 2628 Isass.exe 30 PID 2628 wrote to memory of 2544 2628 Isass.exe 30 PID 2628 wrote to memory of 2544 2628 Isass.exe 30 PID 2628 wrote to memory of 2544 2628 Isass.exe 30 PID 2544 wrote to memory of 3064 2544 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 31 PID 2544 wrote to memory of 3064 2544 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 31 PID 2544 wrote to memory of 3064 2544 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 31 PID 2544 wrote to memory of 3064 2544 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 31 PID 3064 wrote to memory of 2868 3064 Isass.exe 32 PID 3064 wrote to memory of 2868 3064 Isass.exe 32 PID 3064 wrote to memory of 2868 3064 Isass.exe 32 PID 3064 wrote to memory of 2868 3064 Isass.exe 32 PID 3064 wrote to memory of 2868 3064 Isass.exe 32 PID 3064 wrote to memory of 2868 3064 Isass.exe 32 PID 3064 wrote to memory of 2868 3064 Isass.exe 32 PID 2868 wrote to memory of 2412 2868 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 33 PID 2868 wrote to memory of 2412 2868 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 33 PID 2868 wrote to memory of 2412 2868 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 33 PID 2868 wrote to memory of 2412 2868 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 33 PID 2868 wrote to memory of 2412 2868 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 33 PID 2868 wrote to memory of 2412 2868 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 33 PID 2868 wrote to memory of 2412 2868 8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8052cedd205a553f3a02bd6a36a85d00_NeikiAnalytics.exe" -burn.unelevated BurnPipe.{02547CF3-F95F-4328-B8D6-A00E7A140580} {311C6823-8793-4871-9EF3-3F22FD20E7DD} 28686⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2412
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
455KB
MD53284088a2d414d65e865004fdb641936
SHA17f3e9180d9025fc14c8a7868b763b0c3e7a900b4
SHA256102f69b5a98352a6a1a6b26bc2c86ee7611c1f45f5a9ca04f5a8841961f191c6
SHA5126786fb431addf05df256d0e1383501f96356aa78f66482db9772c58334aead59838abb7db0ea793d4a17627a357598266681c28328485489a21bc2985e751b62
-
Filesize
117KB
MD5a52e5220efb60813b31a82d101a97dcb
SHA156e16e4df0944cb07e73a01301886644f062d79b
SHA256e7c8e7edd9112137895820e789baaaeca41626b01fb99fede82968ddb66d02cf
SHA512d6565ba18b5b9795d6bde3ef94d8f7cd77bf8bb69ba3fe7adefb80fc7c5d888cdfdc79238d86a0839846aea4a1e51fc0caed3d62f7054885e8b15fad9f6c654e
-
Filesize
211KB
MD5d9e6a255071908d5fca6eced94d5e7c7
SHA16507c3fcb45949bdbcd396e4032d42766bb23ab2
SHA256ff6b2923c9af7222dedbbed783aa3ed3f357048d6c4885838ec26050948fd86d
SHA5128c924426bf2a515ec3bcfef734826500c387c5cf784d8cd34b8f62fc4bea03358b73813341f6438ce4f8f1a68deb5741f450febba7f4e198276996529617f948