Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-06-2024 23:07
Static task
static1
Behavioral task
behavioral1
Sample
7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
7559547ccaeddcbcea9850347a04ab30
-
SHA1
4a3fd39962741c4055ada58a2ecb338b82e6a05d
-
SHA256
f32e7a23f724c65fa105ddc10f360f5d104df1c5eb03db789bc6c2a894139bd5
-
SHA512
4f810ee3d0483feb68a0b9bb65c13b292960912a3dde5730234068489c583631ea42f30f945a08449972f8dc70703cbbf3b2facf227dc9a59956868be0e6be51
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBFB/bS:sxX7QnxrloE5dpUpCb
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 1776 ecxbod.exe 2968 xoptiloc.exe -
Loads dropped DLL 2 IoCs
pid Process 1400 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe 1400 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvG1\\xoptiloc.exe" 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxLU\\dobaloc.exe" 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1400 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe 1400 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe 1776 ecxbod.exe 2968 xoptiloc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1776 1400 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe 28 PID 1400 wrote to memory of 1776 1400 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe 28 PID 1400 wrote to memory of 1776 1400 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe 28 PID 1400 wrote to memory of 1776 1400 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe 28 PID 1400 wrote to memory of 2968 1400 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe 29 PID 1400 wrote to memory of 2968 1400 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe 29 PID 1400 wrote to memory of 2968 1400 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe 29 PID 1400 wrote to memory of 2968 1400 7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7559547ccaeddcbcea9850347a04ab30_NeikiAnalytics.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxbod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\SysDrvG1\xoptiloc.exeC:\SysDrvG1\xoptiloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5c29ca554b2d51bc91a74bba218cadf6b
SHA1e54997d90f515d594c3ace31712ab3912d6f886a
SHA25609c4c6926a63910b01f9272e813dd0c7f9a8643d777913d519aed25c24d7f5ab
SHA51202ecf26a7b46843e90ee3041df614bc4b44477d763133efce0eef13095aa9a42f3094e933f5d24d0de1d3da4f468a7006e95d20701a3c9ba09f53b3959a17c96
-
Filesize
2.6MB
MD596c78231cb6f964f9d0002a9163b47b2
SHA1c3949604c125ae3adcac67b4c39a72ec3b3b2ee4
SHA2560cfcce583c08d4fcdda77f260fec6dc353c70266de58417e351777b0d651f1b7
SHA5129710feb66a5fd4bb9c719337fcad4e14a4e2b584ccc593d41e156066af8b4fd67294146c121eca17e0b8702645bf1334cec458fdb3ed9d57c64303f431b62498
-
Filesize
2.6MB
MD5fb8b93cc9976f14ad3b96e7b46bf2adf
SHA11a571326e3097a771c0a73cd6d4077e92cacb525
SHA2565d156f1d3ae373c1ef25addecabbac85ceb5923f3d9f1eef899fd0906bd15dc5
SHA512d7ec3599cfc560f5996ef686245ce6f2ebbbc758e550d52066c1786351b04cce3572f4003b65322a98da9492e88e53af3725fb24213a651158973f6e93037705
-
Filesize
170B
MD57995c5b784c93ffdd1b57718d3f1ae75
SHA1b8443d6db2ca12c6fb35856da13f44f63ea20b96
SHA25674167df7a4a0821837e837db1e3869dc512e74b7bc02ffe0c00ff311f1daa431
SHA512368d179407f7516063012ee9baa5cd98651397038fd0c251438e50b85356809f9d85ea3189b26ecc76d550889b5f44952746a2d9343c6a257631f32c5240237c
-
Filesize
202B
MD51e9d8d27748fb955d305c53d5eb052f5
SHA15559dc8fbe9487ea970bab5938806409da14ad9f
SHA2567efea65a0ee7e623aad4230767c04b9dccd9cc07bd75006e2ff4c4a4acfdcd39
SHA5122b64752e95a69f8d7b96756a3fa0c2764797ef7249723ab64171b0a1fffdb8a78860e050764ad3c062b283327a916f1a91610f9ac1304bd05fc7ae69c86d7607
-
Filesize
2.6MB
MD5f1d2d8fcaa0595c7eea80538d90436a6
SHA1222217b1a1904e11548b87f060c61d4c8f0617ac
SHA2563fe097f32a0a597ee919714ee4b777e4280b6379e6524e9fbb58b49ce24b9928
SHA512f45844e9103f99bb5371d42d81a14b63c4a0a453d28df068707991527c5b1f82d7c8b8d411625d57aa4ab4c30d11dec77307b0e961997625712239c900b37093