Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 23:53
Behavioral task
behavioral1
Sample
1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6_NeikiAnalytics.exe
-
Size
252KB
-
MD5
8f0c03643467c7db494a21edd2c18400
-
SHA1
8efacb614fd255331e2c46d44678981ac9d32d27
-
SHA256
1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6
-
SHA512
6eb1c273cbce340444289dbce05f87890e92024d117cb1eaa2dc2f56a8dbc457bf8fb8d426cc401da8d2ebe3d5abebdc7f6d369454b821aa4d3549b3de71a8c9
-
SSDEEP
3072:MO7bMqu+6juQulgpsXuZ4jB/l3jAQ9iGb9Okv5H+dU5nZUVBsf/5JCsfhI/KQ73r:TbMu6YIejB/hA2iGB7edU5eK8d
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1251114546576494723/tXNLbJKNqLuPx5ncqCYn3VLtnEirV2Nq2ZSnMIH2N-D8Y9ZGZqL60vo8KWWurw_TzBjT
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 freegeoip.app 5 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6_NeikiAnalytics.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6_NeikiAnalytics.exepid process 2936 1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6_NeikiAnalytics.exe 2936 1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6_NeikiAnalytics.exe 2936 1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6_NeikiAnalytics.exe 2936 1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 2936 1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1a0d29582aa1f16cd794b95e3e257799eacef8341cceb5588ae6dbf4dfcc79d6_NeikiAnalytics.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
459B
MD599ee4937fafc40ede5e0bf87dda4815d
SHA11383a0de228c6deb1818c7e241f99df37f60f499
SHA256a501dda478f8dccffb0efefffe09cd5289b40de9171d00e14a2ba837d5519e1e
SHA51206d03c139d3eb589e7db77922e9af40eec1ccec188c5bdc2c057f0f75704ee301dae020948e9b1e1a8aecfe7b58b455b8b24a91280a6fee83341226778a17ab6