Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 16:04
Static task
static1
Behavioral task
behavioral1
Sample
8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe
-
Size
4.0MB
-
MD5
7bfd20db106b80d913739d6cec3e8e20
-
SHA1
e190085bbcfaf96228a58e4c19c210b9a2672afb
-
SHA256
8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc
-
SHA512
143d4080d835fd3672241c51af2e458f0f329cd64d477be690bd054c2967e7f57a0c477b8ea73ca29f5766eeea66f103d51c25b8f84cf1a758fc1f41cdd9a287
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBIB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpjbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe 8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 4952 sysabod.exe 4264 xdobsys.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocS0\\xdobsys.exe" 8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid6B\\dobxsys.exe" 8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 956 8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe 956 8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe 956 8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe 956 8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe 4952 sysabod.exe 4952 sysabod.exe 4264 xdobsys.exe 4264 xdobsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 956 wrote to memory of 4952 956 8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe 81 PID 956 wrote to memory of 4952 956 8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe 81 PID 956 wrote to memory of 4952 956 8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe 81 PID 956 wrote to memory of 4264 956 8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe 82 PID 956 wrote to memory of 4264 956 8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe 82 PID 956 wrote to memory of 4264 956 8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysabod.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\IntelprocS0\xdobsys.exeC:\IntelprocS0\xdobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5367c90690f0a5f5fd16de3b69c0954de
SHA11af8e7cec30a52d2f0450033343bfe228fae24cc
SHA256835aadd5719374f825e8887f6c941c6e1077e560cd8f3096d4f1f5ec8af2ce0b
SHA51235c1aaa0838026877ef54293fe9834deb7486257b2325c0119c5a2ee30a338fb16e6e2804f9a13fd69cff505c92eed940d598cdc1c391325ec35834da48a4de6
-
Filesize
203B
MD55b827734ca849bf8653b6957646f8e52
SHA17155ab8c268873b67d1d26302bcfa1ddabf43654
SHA256b2dede06a63d5fd29d6e53376f1e285a1ae32e2684ddf52724e335720cef4193
SHA512367a8e6cc63de6d5d4c80611d19d61594a33200c8bec464754b60d3199b8dffaa004acc08b8f3db0768af1606d08ed2425eaa036cd1aaab77f40bb2f63b97e05
-
Filesize
171B
MD5743542110c257ddd822de7e1ac035224
SHA1b0f7db06fd8e36c9b3912fc74120ddc8a42fd10d
SHA256c1f036bfc63179adfa05999718d83cb17cada9f89b96ddb05a2dfeb5b03d1ce2
SHA512e17b9b0cfcad6ba8124c483889ac89687842b69b567953c3def827d8166ce74b17a0a7902198bbae384d33693e16a8f08f292af26c324e144ca9234d269365af
-
Filesize
4.0MB
MD5575eb612ed876f1427641b963e6cd1cf
SHA18b945e3e1b1080ea60d05b9a120e707092244463
SHA256ecbc3ba16b059b8aef40d3b2d4755ccb3e404ffc05e7fb514b66cab0ff78908d
SHA5127c13b5f0357200809355b3fa96858b879776a35dec255237e2f18164e98de7be38b58f6bbb88e3a259e1161c330df9768ed584ee02f0342357970f0b6c94ebe4
-
Filesize
4.0MB
MD51d990f226aaba1707414773cf833dfe2
SHA1b86da564577ad21e6e1185db62636bfa007bfab7
SHA256b6b28f23d3e805c41b9b1921ebaff5b696ddee02f87e50fa9b74e0a5d96074fa
SHA512e61f048917af86f6e156e49e4635e27151e51f5b76232bd4a6652ba1cb2a0ebabfb9c8e7bdb7be33dbc935c0130f286f1c8d4bb0ba5cf3bba99b9a814482a155
-
Filesize
4.0MB
MD5fa6894d4e41b4ac22b176434435c70b6
SHA158184eaf09eae0c541bd6d65f0b51e82861f2e43
SHA256941869112a468f02a10a29a86cb01c4de66e750c29cc508fb501d9de1d64a26f
SHA512c953973aeb0b7a85a3b2d96ba4d2233a850ddc8e43a4cc9e1398bf572227355a27f21e6ffeabb998fe486faf3b53032e13e1c72518087410baaef2f2e8d1a7f2