Analysis

  • max time kernel
    150s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 16:04

General

  • Target

    8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe

  • Size

    4.0MB

  • MD5

    7bfd20db106b80d913739d6cec3e8e20

  • SHA1

    e190085bbcfaf96228a58e4c19c210b9a2672afb

  • SHA256

    8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc

  • SHA512

    143d4080d835fd3672241c51af2e458f0f329cd64d477be690bd054c2967e7f57a0c477b8ea73ca29f5766eeea66f103d51c25b8f84cf1a758fc1f41cdd9a287

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBIB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpjbVz8eLFcz

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4952
    • C:\IntelprocS0\xdobsys.exe
      C:\IntelprocS0\xdobsys.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\IntelprocS0\xdobsys.exe

    Filesize

    4.0MB

    MD5

    367c90690f0a5f5fd16de3b69c0954de

    SHA1

    1af8e7cec30a52d2f0450033343bfe228fae24cc

    SHA256

    835aadd5719374f825e8887f6c941c6e1077e560cd8f3096d4f1f5ec8af2ce0b

    SHA512

    35c1aaa0838026877ef54293fe9834deb7486257b2325c0119c5a2ee30a338fb16e6e2804f9a13fd69cff505c92eed940d598cdc1c391325ec35834da48a4de6

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    203B

    MD5

    5b827734ca849bf8653b6957646f8e52

    SHA1

    7155ab8c268873b67d1d26302bcfa1ddabf43654

    SHA256

    b2dede06a63d5fd29d6e53376f1e285a1ae32e2684ddf52724e335720cef4193

    SHA512

    367a8e6cc63de6d5d4c80611d19d61594a33200c8bec464754b60d3199b8dffaa004acc08b8f3db0768af1606d08ed2425eaa036cd1aaab77f40bb2f63b97e05

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    171B

    MD5

    743542110c257ddd822de7e1ac035224

    SHA1

    b0f7db06fd8e36c9b3912fc74120ddc8a42fd10d

    SHA256

    c1f036bfc63179adfa05999718d83cb17cada9f89b96ddb05a2dfeb5b03d1ce2

    SHA512

    e17b9b0cfcad6ba8124c483889ac89687842b69b567953c3def827d8166ce74b17a0a7902198bbae384d33693e16a8f08f292af26c324e144ca9234d269365af

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe

    Filesize

    4.0MB

    MD5

    575eb612ed876f1427641b963e6cd1cf

    SHA1

    8b945e3e1b1080ea60d05b9a120e707092244463

    SHA256

    ecbc3ba16b059b8aef40d3b2d4755ccb3e404ffc05e7fb514b66cab0ff78908d

    SHA512

    7c13b5f0357200809355b3fa96858b879776a35dec255237e2f18164e98de7be38b58f6bbb88e3a259e1161c330df9768ed584ee02f0342357970f0b6c94ebe4

  • C:\Vid6B\dobxsys.exe

    Filesize

    4.0MB

    MD5

    1d990f226aaba1707414773cf833dfe2

    SHA1

    b86da564577ad21e6e1185db62636bfa007bfab7

    SHA256

    b6b28f23d3e805c41b9b1921ebaff5b696ddee02f87e50fa9b74e0a5d96074fa

    SHA512

    e61f048917af86f6e156e49e4635e27151e51f5b76232bd4a6652ba1cb2a0ebabfb9c8e7bdb7be33dbc935c0130f286f1c8d4bb0ba5cf3bba99b9a814482a155

  • C:\Vid6B\dobxsys.exe

    Filesize

    4.0MB

    MD5

    fa6894d4e41b4ac22b176434435c70b6

    SHA1

    58184eaf09eae0c541bd6d65f0b51e82861f2e43

    SHA256

    941869112a468f02a10a29a86cb01c4de66e750c29cc508fb501d9de1d64a26f

    SHA512

    c953973aeb0b7a85a3b2d96ba4d2233a850ddc8e43a4cc9e1398bf572227355a27f21e6ffeabb998fe486faf3b53032e13e1c72518087410baaef2f2e8d1a7f2