Analysis

  • max time kernel
    143s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-06-2024 01:48

General

  • Target

    0a43015ee967c504ecc257ba9b984f50_NeikiAnalytics.exe

  • Size

    251KB

  • MD5

    0a43015ee967c504ecc257ba9b984f50

  • SHA1

    37d9951e4f1202dc080de746be15b0087943eba6

  • SHA256

    9327a049e7395bd0a053001cfc293a661205988f3a927c19df1f7979412b4ca0

  • SHA512

    c9d2fc11cf2aa57c31ca3767b908b1813cd1c77dd563813e27237e63414f04bbfc92eccab978fd22b2a34b81ee43eba72da9ef2a0c347157e9a71748d0a5bd74

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s53ZUDWUa3UWeJM6Nmot+5u:h1OgLdaO3ZUDWUyUY6NftN

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a43015ee967c504ecc257ba9b984f50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0a43015ee967c504ecc257ba9b984f50_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\5417a6b475ecf.exe
      .\5417a6b475ecf.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:4476
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3964 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\[email protected]\bootstrap.js

      Filesize

      2KB

      MD5

      c7851add2cc4447d12a22d6a9a5ce36f

      SHA1

      2065ba7c8ac98726faaf51557a0bfae4b9cfe3da

      SHA256

      2ce72135e86e65c534fb86361dee8ba38039151c3f9df1964cefd44aeb79452d

      SHA512

      9d6c9391ac00e5ba06d0db4ce0f106e2768954913921dbe99c08630529f62839af701c1d5c19d32e5aea600399c88884b98768b275b5854dfa6418cd509abe4c

    • C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\[email protected]\chrome.manifest

      Filesize

      116B

      MD5

      5b91109a4e5e3ed17e2bef177fe57050

      SHA1

      3f0c421dd7285b569721d368623b9ca3430036eb

      SHA256

      755f964111e4131fc2b9ec42b2e426428094bad5139ac82ad8adb4ca4d935bdc

      SHA512

      c398b38b40f2f8ef9f7b931c40852a36355e3b520124075b3d014ad5fc8ff9681ab1ad01c06abcd5b08cce0546716bd528b8810bc155a438f14ff81c04782a20

    • C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\[email protected]\content\1410836148.png

      Filesize

      894B

      MD5

      83e1555c9d1507825e397b0a5dfb5947

      SHA1

      1633d3d7f6e0fa7777848c8a208ab6aff84ec2f4

      SHA256

      e8c3d1d756b924e469a033f22c669713476d7c1759dd2bc7ab3716db214ba560

      SHA512

      d813a6893f00690b62928358e77fe35d50f1eafe681eea6bd65ebfd0e5d3e0660d23475a407d9573f8ae98ec0e72b793d2c937f7f3684ede41361a322332a682

    • C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\[email protected]\content\bg.js

      Filesize

      9KB

      MD5

      60e44c19c7be4767fcda79e09ddbb9ff

      SHA1

      6b9b6c1b58e5298a78b82b1233ec69b00ba694cf

      SHA256

      aedd8fbbd4d3db57853dcfadeec7630648db435c177001ded4d2d09588b8f748

      SHA512

      e57db60b3a9058f9aac7a6d7725d19b5c1a32af62aa9be13c6b975f3942528f8abc9b8b9829b4bbf034d565a1e9f96e361fc3a783242ceadabdc4631df9db6b1

    • C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\[email protected]\install.rdf

      Filesize

      620B

      MD5

      edb9bc0dad6c292b5a7b6585360e5e1a

      SHA1

      903b746a9edf45e82b0b6ebc8c6f71a6046fa864

      SHA256

      f1e8dce670ca5b0826bb3f83b80ca17c2736422da79e3dce847964d2967d51b8

      SHA512

      7335899c6c8db355e37ce3c21cd6f13b5a541203240175fd65d030367043fafaf2a22dfe8da69b900a433ba8578053327e3a05eb55080370e3273d7c705b972e

    • C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\5417a6b475ecf.exe

      Filesize

      65KB

      MD5

      f325c5c19f0b1e7fe0258901f0b134e8

      SHA1

      6d2a27c23834eb8506901588c4854ae485f284e6

      SHA256

      8522d4d3dfa051ae8c8095d498b24c193a1574d7a04490806ae2991054984624

      SHA512

      4ae05b145f8e69fd732a9fe23aa4d0761dbcf663085ca722444c1b8d3c0ac98858d9ed3de1562299c1adb59fb7fcf0f4c989813c4be48b5fa4753322214958c4

    • C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\5417a6b475f08.dll

      Filesize

      116KB

      MD5

      05234975b085632d70d89c2f420c5107

      SHA1

      078fb2a3e5de54c3737a4541242a4725c02c6b9c

      SHA256

      a758ad4fdc8949ea005258075457a972eb0672d69d98d688117b85221fca096a

      SHA512

      f9fa6aee142e32875127feadebbe235f4f376b0c3b7415036b8afc81c0a09a8ba0c5ec9e1703f1a34b220b7646caa1ca02629918185c4afbafe6926014044c4e

    • C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\5417a6b475f08.tlb

      Filesize

      18KB

      MD5

      c1e296ff01d3cf37f91c7473bdd9de52

      SHA1

      832e3d1ddeb5a0ceb5b13c1ee271eb94bf9bf2a6

      SHA256

      a8e54ad3e1fbc91d5a7b02bf177a24a02f2558419ce46859bf15859b81478492

      SHA512

      aeb1f3962746caa3858c27b4753959d5ec9db2727e94642d5db2710633a96e7ceef5f9c0ff3b358f83143b6594459b5d9a94e095fed7a5d1fa97ae6a3c4e564c

    • C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\pdpagjljneblbopofgklhlnlpamipmii.crx

      Filesize

      9KB

      MD5

      c5d7361084caa3026a404f9f1ab77aed

      SHA1

      12a4dc8bb44b33301161733574c4b30e3d928497

      SHA256

      6730cb1c961b1557cb0332cc769d2c4ff4953c89d117449c8761d8f1453247a9

      SHA512

      f2fbf7aa69ada594eb917184eb15dac51f3cb1f9e36dad9adab0d9dcc24e2464d14892007d241ae047cb3e778849b0e0b5c6682a2f653274dc318c29fb743fc5

    • C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\settings.ini

      Filesize

      6KB

      MD5

      a404946e5cf2b093495fe7d06ef3381d

      SHA1

      88bb6ea64be6279a2c24b80be9ac6845d38d15e1

      SHA256

      7efa412407e2235cf8f884a5258f13d0804411b794dad0910d599c90aceea985

      SHA512

      34b67deee73005eec2ad84153ae1d502da4a1c4acb070c7ecc19cf0478e84187dab3c14e46f8cdabc0fed729af64b120c5bb4516c44a7bd7a0dd062dfc09de48

    • C:\Users\Admin\AppData\Local\Temp\nsj24E.tmp\UserInfo.dll

      Filesize

      4KB

      MD5

      7579ade7ae1747a31960a228ce02e666

      SHA1

      8ec8571a296737e819dcf86353a43fcf8ec63351

      SHA256

      564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

      SHA512

      a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b