Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2024 07:08
Static task
static1
Behavioral task
behavioral1
Sample
4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe
-
Size
1.6MB
-
MD5
9188c33ab4a38ed6d04af3cad9a93fd0
-
SHA1
8fe33de4478ae8065ebb0b10b987be20e913fc22
-
SHA256
4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1
-
SHA512
654472fe6e10e714b3da8c4e7e3f3ccc981c52d743bef3a64ed52c67572eeef68e00a76f82473e207b20f65534f99e8a1fdfcc5f35e2911cf359abd35b08ade4
-
SSDEEP
24576:lb9bhDjaHR4Os0/jZlBiABSqcqTWkd6Drwf7n16oi2xx9avbF7KL:lb9bBjaH6OB7zBiABSxqTwvK432JucL
Malware Config
Signatures
-
Meduza Stealer payload 1 IoCs
resource yara_rule behavioral2/memory/3368-2-0x000000000E650000-0x000000000E72C000-memory.dmp family_meduza -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 api.ipify.org 18 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4492 PING.EXE -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3368 wrote to memory of 3492 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 101 PID 3368 wrote to memory of 3492 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 101 PID 3368 wrote to memory of 3492 3368 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe 101 PID 3492 wrote to memory of 4492 3492 cmd.exe 103 PID 3492 wrote to memory of 4492 3492 cmd.exe 103 PID 3492 wrote to memory of 4492 3492 cmd.exe 103 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\4cfc33deeedcc336cc541b2a91eb666fdb2c8984c215daf8cee6ab793c9ef9d1_NeikiAnalytics.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:4492
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1748,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=4152 /prefetch:81⤵PID:1888