Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 05:37
Static task
static1
Behavioral task
behavioral1
Sample
9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe
-
Size
3.9MB
-
MD5
9d5737ca0ecfaf990199410dbb7b73d0
-
SHA1
da2b3dee7bab04a7177783bf15b39e04b183c5f6
-
SHA256
eb45b1b1e94564e6e787e834b47a05992a334d8477cf310f387c35d87a4eab40
-
SHA512
4e1ee09195d94098f03ffce5886451fc3d6f18830487467efc6bf210612aa13db013107c4fafa21e0a9d2676280c3ef3e952903b8f58aa529d9f290d81d7dad4
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBYB/bSqz8:sxX7QnxrloE5dpUpbbVz8
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
Processes:
locdevdob.exeaoptisys.exepid Process 2988 locdevdob.exe 2628 aoptisys.exe -
Loads dropped DLL 2 IoCs
Processes:
9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exepid Process 2868 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe 2868 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeHT\\aoptisys.exe" 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZTM\\optixec.exe" 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exelocdevdob.exeaoptisys.exepid Process 2868 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe 2868 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe 2988 locdevdob.exe 2628 aoptisys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exedescription pid Process procid_target PID 2868 wrote to memory of 2988 2868 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe 28 PID 2868 wrote to memory of 2988 2868 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe 28 PID 2868 wrote to memory of 2988 2868 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe 28 PID 2868 wrote to memory of 2988 2868 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe 28 PID 2868 wrote to memory of 2628 2868 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe 29 PID 2868 wrote to memory of 2628 2868 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe 29 PID 2868 wrote to memory of 2628 2868 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe 29 PID 2868 wrote to memory of 2628 2868 9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9d5737ca0ecfaf990199410dbb7b73d0_NeikiAnalytics.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locdevdob.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\AdobeHT\aoptisys.exeC:\AdobeHT\aoptisys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD52e5aab3550c91c456241b362b6d00296
SHA167d3e88e8a75cb277b5d7b5810454c863c8c9b1c
SHA256903d73368a245340dab5ab498326e56703b101e05fbde141acda2d133eedb445
SHA51282344b67c9853b9d992b5062c043afb545e5a516558b6d073eb76498a93f61f34e0dacc0a92d32176eccf853832ab6f84e313630b062620f4cfccf4f2f6a21c9
-
Filesize
588KB
MD54a4769d12111d060cde346c83c85e800
SHA1365afec67f46eda58de4f62169e6ee600d8251b7
SHA256c75594548a1c75718352102c0bf615d7264cc5b9f5d00f344b2991d2285fde97
SHA512efd6d034b57148ca3f33754c6d07ffb86a767bb914900fb155791236be98283591a2f98ced72d214fb53f174e836fd1ba333b35b43c03ccbef97fb4c0869e8a7
-
Filesize
185KB
MD5b07ff72e8f6a5e1b266f3ea7d97c7326
SHA14aa2e5611aafe6cb135b8344638c440dae097130
SHA25682f858d2b1fde7d3cd4fb07eacb17aa73e20c86e34994b6abf0c407cb4707db6
SHA512c10ee4d7c5895023bee788fc95ad584025c509fd9258d3714071b8be3835a9a375eab03717d5f7b2976fc7ae6c921df93c7c00c60852d4655f5bf655afb02c68
-
Filesize
171B
MD544b4eaeee7de1957f6afcb4358a00e2d
SHA140f0c198c9f7a0be17e7b447d406d6055a558388
SHA25608ff917f9ce4b47d56b3feafcdb0b4f5a65def2e6551a5f886b10c59f1109645
SHA5120be9463456612ff12da286f8ab4f4c534d1073ac01739bba502a73875a5e661bce362303071a4e637a9a7a11efc624006b29658aebf60626ff3420e9fb53fbfb
-
Filesize
203B
MD5516af11ddd54f872e3b98aa4f25f8c07
SHA1b9286be0a42b9ed0ac212a8a1f9f59969655b52a
SHA2564bdbd46b8b1b8bafb71d9014f5a6f22085ffcbc4f363da81aed4f8bf329a7e75
SHA5120582d28b4a85ecfc972cbf690834854b24435b4d9b9886f58c047eda3385dd94dfde927ab208a957fbfd409be5f9dbe0a3f70df11b88a8a8d67ff5327b888d3e
-
Filesize
3.9MB
MD567b41d7af47cdf11c12538a0a1b42dd6
SHA1a49d2ea95f2ff2b8545d638492523d9bd79f2520
SHA2561be1abbcd41288eb2f127ce557985c7b48c342f09582768cb5be85a568b633f0
SHA5128250f3e38d02ae26bb5fbd287cd9802d304ba79f7d2d0cce3842ee39fe5f09cf957fc79c09d180ffd4af2cfbabee76be55f82a7f2989e94d3b9ba8ba45860fb9