Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 07:22
Static task
static1
Behavioral task
behavioral1
Sample
6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe
-
Size
3.1MB
-
MD5
6116b5c411c0ce0a30ffd470a9fbeb30
-
SHA1
246645a6bf29e4a07c41f65aac6e2477a2c94de9
-
SHA256
24b4f6afa459cacc08eee536c212605f5f65424958944547e912a0a94eccb6b4
-
SHA512
5e36495a6d78ef06a543b44ea07305bf3c8c4e1d735ab1c4ba9e63297d3e29eb11993406561354f6b4945bde01d6150a197a7f5fc4ee38b7390b719d8588561e
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBYB/bSqz8b6LNXJqI:sxX7QnxrloE5dpUpPbVz8eLFc
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe 6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 3004 locxbod.exe 4492 abodloc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Intelproc8Y\\abodloc.exe" 6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintND\\optixec.exe" 6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3480 6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe 3480 6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe 3480 6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe 3480 6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe 3004 locxbod.exe 3004 locxbod.exe 4492 abodloc.exe 4492 abodloc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3004 3480 6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe 93 PID 3480 wrote to memory of 3004 3480 6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe 93 PID 3480 wrote to memory of 3004 3480 6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe 93 PID 3480 wrote to memory of 4492 3480 6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe 94 PID 3480 wrote to memory of 4492 3480 6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe 94 PID 3480 wrote to memory of 4492 3480 6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6116b5c411c0ce0a30ffd470a9fbeb30_NeikiAnalytics.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Intelproc8Y\abodloc.exeC:\Intelproc8Y\abodloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1424,i,6576818814118437872,11004518367271063231,262144 --variations-seed-version --mojo-platform-channel-handle=3916 /prefetch:81⤵PID:4656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362KB
MD5b5a4f404e314653c251f41e8e6ff1506
SHA12481e42e62dd0e166bbf8b201ced4fb0f97c0c4b
SHA25629dee0c5a77b281b607ce6acafc6a643fc5c05ed1c1259281c9a2065c633f64b
SHA5125b7cd57f124bea1e5bf4d8340bf5d6fb5c3de99c10eb2d81af2ae842f1b94a4f81bc1caf430b783099534829c76983bbb922c7f91df646950bde44c64d46ca6b
-
Filesize
3.1MB
MD571dd608187155beefdd282fc78329dde
SHA1db4d68a181ec44f29478f15d47e7fc2e960c4c8e
SHA256fff73802434018529187248e98a3c8e142ecfadf2d7b6b55e502bbec5524a53d
SHA51239699eed9a6cd9c8199bfbb284f0ba7822abab56e125aaf70772fd4606b8b30004bad25413c7c958194c0c3b7b63c48ccef8e9a33abf6a1730af1a0834067b36
-
Filesize
714KB
MD59b7f05a10ecfa8fd28c28aa9c30998f4
SHA126fdcc0bae93f506a1f2a3e009b1750fe300b486
SHA256da88beefc6eb0f5b4f1f738d108f2d1168375ba45b346ab95da85801b7b45029
SHA512d6985561cf87881cbde07fe1e905b4a90c15537cc708bdde13b2f532f68222da806c196b5370f3254ee0b673180058c86a5ea7668b56b8efe0f43fe133588cda
-
Filesize
3.1MB
MD5eeaaf9c302b9243efb28658669125ad0
SHA1043401039474d87bae86f3fe91cd066ff3ccca2f
SHA2568f99b9b6e56e749b78196ec17e41651c1824b48b23eb0cb0bc3af4fbb6cce042
SHA512b1864a1c6fd9676b41980ad3dea19c499797274182d1adf5d74fc9aa32061c95763940061d234f3bb8d7ab6f9f4a54b50087c6d838c6904541b9fa0aaf0380f2
-
Filesize
204B
MD5b5cda47b8087d9c3ba5882ab2554d38f
SHA1f0e44a3c054c065d57472930bd17dae4bb96e055
SHA256e10584d15af832423aebc43bb23ef02f9c1a9573db02cc5657b042feeaa6a7ce
SHA512b0c49591136ae0b8f1ff83947de03789708eab38d5a4c948caac84470a1d8a1bb474a573e239e91f9786f92ddf30080e3defa403a2bc511f9c3ea7c87092c814
-
Filesize
172B
MD5afdcba414b655a93ab17fbf9b92f6b5c
SHA182e3a3ffb476af88e7d89394dd7f1713f8bbfb7f
SHA256801898127a2061b4c7ec6d8e9d85e7678d98372677c41b096002162804f0cd33
SHA51253a39b26a52b63c4034736595f4ea89277bccf5bb6b48c4d6bfbbf2db7db6c621388f1fe2f7f8f6400d8c679b5bc8661bba410961d2a1cdf74675c62bd321eb3
-
Filesize
3.1MB
MD53eaf13ae5bb853c1945f30ae46c13625
SHA1730332ff36e3d19f36c6bee476c1f4b92a1cc392
SHA256bd0954d0fb3ba99d15db43a825ab46261f3df072f6b4c16edde269948f20d992
SHA512a2d0c3facf2b88944f11ffe9b5f02b2f264a2fc5223ad875eb1fe1f2bad5c83b8c129cbb5fc302c99bcb6be915936333d5d3859cc2e694314ddbea425ba857f8