Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-06-2024 10:13

General

  • Target

    601bcdce53e91668510a0bfd0be470b06f2102cfe10a5fb0d6e3573b2cafcb82_NeikiAnalytics.exe

  • Size

    161KB

  • MD5

    4d23f8e8d6e5754a939f244c0ae20340

  • SHA1

    a9e158c7d655099bc18a11496d30de72cbc64a32

  • SHA256

    601bcdce53e91668510a0bfd0be470b06f2102cfe10a5fb0d6e3573b2cafcb82

  • SHA512

    d2c587089b0e23c7df16b12d073a6bdf3476c4f91080334459f6aa95f202a0fc61a8cb0e7a14e15ead3ee75a4a11dfd9f666435671180b3da50c23baf22ea7ff

  • SSDEEP

    1536:JxqjQ+P04wsmJC/tp9eSFStfFfeeeeeeeeWeeeeeg3Mz8WZp3fh1LCh1G0dz3Mzh:sr85C/bfFStfFTwc5lI1G3wc5lI1Gh

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.66/

http://77.91.77.92/

http://91.202.233.141/

Wallets

0xAa3ea4838e8E3F6a1922c6B67E3cD6efD1ff175b

THRUoPK7oYqF7YyKZJvPYwTH35JsPZVPto

1Hw9tx4KyTq4oRoLVhPb4hjDJcLhEa4Tn6

qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut

XtxFdsKkRN3oVDXtN2ipcHeNi87basT2sL

LXMNcn9D8FQKzGNLjdSyR9dEM8Rsh9NzyX

rwn7tb5KQjXEjH42GgdHWHec5PPhVgqhSH

ARML6g7zynrwUHJbFJCCzMPiysUFXYBGgQ

48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg

3PL7YCa4akNYzuScqQwiSbtTP9q9E9PLreC

3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3

D9AJWrbYsidS9rAU146ifLRu1fzX9oQYSH

t1gvVWHnjbGTsoWXEyoTFojc2GqEzBgvbEn

bnb1cgttf7t5hu7ud3c436ufhcmy59qnkd09adqczd

bc1q0fusmmgycnhsd5cadsuz2hk8d4maausjfjypqg

bitcoincash:qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut

GAUCC7ZBSU2KJMHXOZD6AP5LOBGKNDPCDNRYP2CO2ACR63YCSUBNT5QE

0xAa3ea4838e8E3F6a1922c6B67E3cD6efD1ff175b

THRUoPK7oYqF7YyKZJvPYwTH35JsPZVPto

1Hw9tx4KyTq4oRoLVhPb4hjDJcLhEa4Tn6

Attributes
  • mutex

    79588678

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36

Signatures

  • Detect Neshta payload 2 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Phorphiex payload 2 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Windows security bypass 2 TTPs 12 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 9 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 14 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\601bcdce53e91668510a0bfd0be470b06f2102cfe10a5fb0d6e3573b2cafcb82_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\601bcdce53e91668510a0bfd0be470b06f2102cfe10a5fb0d6e3573b2cafcb82_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\3582-490\601bcdce53e91668510a0bfd0be470b06f2102cfe10a5fb0d6e3573b2cafcb82_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\601bcdce53e91668510a0bfd0be470b06f2102cfe10a5fb0d6e3573b2cafcb82_NeikiAnalytics.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Windows\sysfreavs.exe
        C:\Windows\sysfreavs.exe
        3⤵
        • Windows security bypass
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Users\Admin\AppData\Local\Temp\272906782.exe
          C:\Users\Admin\AppData\Local\Temp\272906782.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Windows\sysmablsvr.exe
            C:\Windows\sysmablsvr.exe
            5⤵
            • Modifies security service
            • Windows security bypass
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: SetClipboardViewer
            • Suspicious use of WriteProcessMemory
            PID:376
            • C:\Users\Admin\AppData\Local\Temp\1454012120.exe
              C:\Users\Admin\AppData\Local\Temp\1454012120.exe
              6⤵
              • Executes dropped EXE
              PID:324
            • C:\Users\Admin\AppData\Local\Temp\1027132879.exe
              C:\Users\Admin\AppData\Local\Temp\1027132879.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2704
              • C:\Users\Admin\AppData\Local\Temp\2870526128.exe
                C:\Users\Admin\AppData\Local\Temp\2870526128.exe
                7⤵
                • Executes dropped EXE
                PID:548

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

5
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe
    Filesize

    547KB

    MD5

    cf6c595d3e5e9667667af096762fd9c4

    SHA1

    9bb44da8d7f6457099cb56e4f7d1026963dce7ce

    SHA256

    593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

    SHA512

    ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

  • C:\Users\Admin\AppData\Local\Temp\41934108.exe
    Filesize

    86KB

    MD5

    fe1e93f12cca3f7c0c897ef2084e1778

    SHA1

    fb588491ddad8b24ea555a6a2727e76cec1fade3

    SHA256

    2ebc4a92f4fdc27d4ab56e57058575a8b18adb076cbd30feea2ecdc8b7fcd41f

    SHA512

    36e0524c465187ae9ad207c724aee45bcd61cfd3fa66a79f9434d24fcbadc0a743834d5e808e6041f3bd88e75deb5afd34193574f005ed97e4b17c6b0388cb93

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\1027132879.exe
    Filesize

    10KB

    MD5

    6567b839ec69322ba1aa41b15fbd1e64

    SHA1

    0a2a0770afe094765a5eb88f6201847bf642bea9

    SHA256

    8a4b87ed94fc50767d0bc91291a8b8a436b941b273b29ab0d442ba1cc10b76fb

    SHA512

    2e4798244bf3891beea64ee0b0d106c6f47b7c7d6daf222af6192874dc0ef67491c82e93821c1ff9fbd25cf9ec50178e959adb466b210ff9754dd4e8387a30cf

  • \Users\Admin\AppData\Local\Temp\272906782.exe
    Filesize

    88KB

    MD5

    ababca6d12d96e8dd2f1d7114b406fae

    SHA1

    dcd9798e83ec688aacb3de8911492a232cb41a32

    SHA256

    a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba

    SHA512

    b7fc70c176bdc74cf68b14e694f3e53142e64d39bd6d3e0f2e3a74ce3178ea606f92f760d21db69d72ae6677545a47c7bf390fb65cd5247a48e239f6ae8f7b8f

  • \Users\Admin\AppData\Local\Temp\2870526128.exe
    Filesize

    5.4MB

    MD5

    41ab08c1955fce44bfd0c76a64d1945a

    SHA1

    2b9cb05f4de5d98c541d15175d7f0199cbdd0eea

    SHA256

    dd12cb27b3867341bf6ca48715756500d3ec56c19b21bb1c1290806aa74cb493

    SHA512

    38834ae703a8541b4fec9a1db94cfe296ead58649bb1d4873b517df14d0c6a9d25e49ff04c2bf6bb0188845116a4e894aae930d849f9be8c98d2ce51da1ef116

  • \Users\Admin\AppData\Local\Temp\3582-490\601bcdce53e91668510a0bfd0be470b06f2102cfe10a5fb0d6e3573b2cafcb82_NeikiAnalytics.exe
    Filesize

    121KB

    MD5

    100ce2ff0190ee64fa91383f3eb50fa1

    SHA1

    b9c1c6b36b7299d5c2ba08418bc0ba8a10cb4208

    SHA256

    6a687faa5afd7879ad74989ac928bd3514851da2f883868caa82bf7b7bf3aa0a

    SHA512

    cfbf3fd656edc007251c8136e44017365a0978e68003738b029d816a24fa55be2bb48eec21588cebd639486177c3bd82c2e4a05fe692c420a60159b4ebe943b2

  • memory/2864-96-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB