Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-06-2024 03:21

General

  • Target

    35967cb42a74583690cf3dde02d74b96aa148d7109561359eb4038c3f6d9d578_NeikiAnalytics.exe

  • Size

    160KB

  • MD5

    23b8a501e32a71fa0fd3b293a33f4c80

  • SHA1

    bd84241c2533e409ad516852417cba67a288969d

  • SHA256

    35967cb42a74583690cf3dde02d74b96aa148d7109561359eb4038c3f6d9d578

  • SHA512

    150b81f0359141da4265c0eac1496968ea830f4c949528cde9105a910b19ee3544439c82660cd87b929e348caee73f36b6b188a1dcb871d5cf0f5ed328228e2b

  • SSDEEP

    3072:sr85CgmTlEpFNQ48BOLhO/DMZJxwpDQ48BOLhO/DMZJxwp6:k9gmGpFNQ7wLhOAZJ2Q7wLhOAZJP

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.66/

http://77.91.77.92/

http://91.202.233.141/

Wallets

0xAa3ea4838e8E3F6a1922c6B67E3cD6efD1ff175b

THRUoPK7oYqF7YyKZJvPYwTH35JsPZVPto

1Hw9tx4KyTq4oRoLVhPb4hjDJcLhEa4Tn6

qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut

XtxFdsKkRN3oVDXtN2ipcHeNi87basT2sL

LXMNcn9D8FQKzGNLjdSyR9dEM8Rsh9NzyX

rwn7tb5KQjXEjH42GgdHWHec5PPhVgqhSH

ARML6g7zynrwUHJbFJCCzMPiysUFXYBGgQ

48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg

3PL7YCa4akNYzuScqQwiSbtTP9q9E9PLreC

3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3

D9AJWrbYsidS9rAU146ifLRu1fzX9oQYSH

t1gvVWHnjbGTsoWXEyoTFojc2GqEzBgvbEn

bnb1cgttf7t5hu7ud3c436ufhcmy59qnkd09adqczd

bc1q0fusmmgycnhsd5cadsuz2hk8d4maausjfjypqg

bitcoincash:qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut

GAUCC7ZBSU2KJMHXOZD6AP5LOBGKNDPCDNRYP2CO2ACR63YCSUBNT5QE

0xAa3ea4838e8E3F6a1922c6B67E3cD6efD1ff175b

THRUoPK7oYqF7YyKZJvPYwTH35JsPZVPto

1Hw9tx4KyTq4oRoLVhPb4hjDJcLhEa4Tn6

Attributes
  • mutex

    x99x998x7x

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36

Signatures

  • Detect Neshta payload 4 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Phorphiex payload 3 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Windows security bypass 2 TTPs 12 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 14 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35967cb42a74583690cf3dde02d74b96aa148d7109561359eb4038c3f6d9d578_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\35967cb42a74583690cf3dde02d74b96aa148d7109561359eb4038c3f6d9d578_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Users\Admin\AppData\Local\Temp\3582-490\35967cb42a74583690cf3dde02d74b96aa148d7109561359eb4038c3f6d9d578_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\35967cb42a74583690cf3dde02d74b96aa148d7109561359eb4038c3f6d9d578_NeikiAnalytics.exe"
      2⤵
      • Windows security bypass
      • Executes dropped EXE
      • Windows security modification
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:976
      • C:\Users\Admin\AppData\Local\Temp\1051725183.exe
        C:\Users\Admin\AppData\Local\Temp\1051725183.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:684
        • C:\Windows\sysmablsvr.exe
          C:\Windows\sysmablsvr.exe
          4⤵
          • Modifies security service
          • Windows security bypass
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: SetClipboardViewer
          • Suspicious use of WriteProcessMemory
          PID:4028
          • C:\Users\Admin\AppData\Local\Temp\333172204.exe
            C:\Users\Admin\AppData\Local\Temp\333172204.exe
            5⤵
            • Executes dropped EXE
            PID:4384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

    Filesize

    86KB

    MD5

    3b73078a714bf61d1c19ebc3afc0e454

    SHA1

    9abeabd74613a2f533e2244c9ee6f967188e4e7e

    SHA256

    ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

    SHA512

    75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

  • C:\Users\Admin\AppData\Local\Temp\1051725183.exe

    Filesize

    88KB

    MD5

    ababca6d12d96e8dd2f1d7114b406fae

    SHA1

    dcd9798e83ec688aacb3de8911492a232cb41a32

    SHA256

    a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba

    SHA512

    b7fc70c176bdc74cf68b14e694f3e53142e64d39bd6d3e0f2e3a74ce3178ea606f92f760d21db69d72ae6677545a47c7bf390fb65cd5247a48e239f6ae8f7b8f

  • C:\Users\Admin\AppData\Local\Temp\251932052.exe

    Filesize

    86KB

    MD5

    fe1e93f12cca3f7c0c897ef2084e1778

    SHA1

    fb588491ddad8b24ea555a6a2727e76cec1fade3

    SHA256

    2ebc4a92f4fdc27d4ab56e57058575a8b18adb076cbd30feea2ecdc8b7fcd41f

    SHA512

    36e0524c465187ae9ad207c724aee45bcd61cfd3fa66a79f9434d24fcbadc0a743834d5e808e6041f3bd88e75deb5afd34193574f005ed97e4b17c6b0388cb93

  • C:\Users\Admin\AppData\Local\Temp\333172204.exe

    Filesize

    88KB

    MD5

    cf68718b0d7b63adceae3480c7e525f5

    SHA1

    acd48e3e03bbf71f254eb9387b0646c8e438881c

    SHA256

    c2515acb1648a8707d7ce693c41bac24eba62ff268f44da59eb0f7ee61728685

    SHA512

    ec616e40cc35a7a9f740cda0390d55ee3cf852c759f0b1fcc483ecb79860d4d269735fffe93b665fdb2ba6ad5438b9d909d1802f357ae0b6501a77a119a5699f

  • C:\Users\Admin\AppData\Local\Temp\3582-490\35967cb42a74583690cf3dde02d74b96aa148d7109561359eb4038c3f6d9d578_NeikiAnalytics.exe

    Filesize

    120KB

    MD5

    03536cb1d6d54c079b663719ed9880a8

    SHA1

    d1e7a067aaf1f4ec9d9d6695b138c58e9b8054d6

    SHA256

    5086a3ba38e6be64bda6d35562860927f465352b835568fa0ec3cddde4ba8c32

    SHA512

    e6ddcd9e72fc64b9d174dca04e6d5de57f18edb688c54bc323956fa8eea68d08dba2a82300ed4e47b3636c6717fe6b9478be3424822070760479b0f0fb2b7ac1

  • C:\Users\Admin\WINXSD~1.EXE

    Filesize

    160KB

    MD5

    b0ad34995ef4ffa1457732a882962d0f

    SHA1

    c1bef6f0cb04bb1e027bba18b1cd657e2ac5dd5e

    SHA256

    fca97d762dabb754532c86390575b6d37142d3899224a74cd6b1df71681e4e07

    SHA512

    fbbc702c1ce9c07728b5ebb257b5d779b5e75a69cda50460573429ec4ee9cc31757669e32e780323a6de5f214165ee9f43fccb598371337b6ad99828187cd14e

  • memory/4704-106-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4704-119-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4704-128-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB