Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe
-
Size
524KB
-
MD5
42d914f3439e167379b2c0eb390f0760
-
SHA1
83dba0dec1aa75f29243b4a3b3065c8b1f447ed6
-
SHA256
7b1789e70dfe0f1be5e2ca7474a74c1c8da17ce58e8e84b08ea04fc3b90bd639
-
SHA512
401217d93323999716ea0aee113b516c7059991d69978d23256996595b86bf5cb9d128a473de5af3b52695942ca600b4f8cb994c5c78743a2fc125f4605e5f68
-
SSDEEP
6144:/rTfUHeeSKOS9ccFKk3Y9t9YZgViYz1MpA5ns/hCvYlP:/n8yN0Mr8ZgcI1z5nECc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3480 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2788 42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe 2788 42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe 3480 Isass.exe 3480 Isass.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2788 wrote to memory of 3480 2788 42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe 82 PID 2788 wrote to memory of 3480 2788 42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe 82 PID 2788 wrote to memory of 3480 2788 42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1007KB
MD5ee1140e7ac07d2a0bf66d6d63a69d4e0
SHA18d29008a29b0e2a5aca4058f66de1e5128faae20
SHA256300ca095a616328a55a94f1a427e57100ea8c7193fbe700753a7b1338d4924e3
SHA5128c9a033926cbfe21c403f96fb4b38040c9bbb857522760220615f60ef33122ace65ecd8915dbb5b188d6bbabf7f2090997dfd160f791d9c21a4d23affbed29f5
-
Filesize
524KB
MD542d914f3439e167379b2c0eb390f0760
SHA183dba0dec1aa75f29243b4a3b3065c8b1f447ed6
SHA2567b1789e70dfe0f1be5e2ca7474a74c1c8da17ce58e8e84b08ea04fc3b90bd639
SHA512401217d93323999716ea0aee113b516c7059991d69978d23256996595b86bf5cb9d128a473de5af3b52695942ca600b4f8cb994c5c78743a2fc125f4605e5f68