Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2024, 08:14

General

  • Target

    42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe

  • Size

    524KB

  • MD5

    42d914f3439e167379b2c0eb390f0760

  • SHA1

    83dba0dec1aa75f29243b4a3b3065c8b1f447ed6

  • SHA256

    7b1789e70dfe0f1be5e2ca7474a74c1c8da17ce58e8e84b08ea04fc3b90bd639

  • SHA512

    401217d93323999716ea0aee113b516c7059991d69978d23256996595b86bf5cb9d128a473de5af3b52695942ca600b4f8cb994c5c78743a2fc125f4605e5f68

  • SSDEEP

    6144:/rTfUHeeSKOS9ccFKk3Y9t9YZgViYz1MpA5ns/hCvYlP:/n8yN0Mr8ZgcI1z5nECc

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\42d914f3439e167379b2c0eb390f0760_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Users\Public\Microsoft Build\Isass.exe
      "C:\Users\Public\Microsoft Build\Isass.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe

    Filesize

    1007KB

    MD5

    ee1140e7ac07d2a0bf66d6d63a69d4e0

    SHA1

    8d29008a29b0e2a5aca4058f66de1e5128faae20

    SHA256

    300ca095a616328a55a94f1a427e57100ea8c7193fbe700753a7b1338d4924e3

    SHA512

    8c9a033926cbfe21c403f96fb4b38040c9bbb857522760220615f60ef33122ace65ecd8915dbb5b188d6bbabf7f2090997dfd160f791d9c21a4d23affbed29f5

  • C:\Users\Public\Microsoft Build\Isass.exe

    Filesize

    524KB

    MD5

    42d914f3439e167379b2c0eb390f0760

    SHA1

    83dba0dec1aa75f29243b4a3b3065c8b1f447ed6

    SHA256

    7b1789e70dfe0f1be5e2ca7474a74c1c8da17ce58e8e84b08ea04fc3b90bd639

    SHA512

    401217d93323999716ea0aee113b516c7059991d69978d23256996595b86bf5cb9d128a473de5af3b52695942ca600b4f8cb994c5c78743a2fc125f4605e5f68

  • memory/2788-8-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2788-4-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-18-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-23-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-12-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-13-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-7-0x00000000019B0000-0x00000000019B1000-memory.dmp

    Filesize

    4KB

  • memory/3480-17-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-6-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-9-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-27-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-33-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-34-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-41-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-42-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-50-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-54-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/3480-63-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB