Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe
-
Size
3.6MB
-
MD5
fd9d6e7114b8e4ae748c96a2630a6ab0
-
SHA1
03395ae30e0a752a93e41639f0bd74dbbe5db464
-
SHA256
1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee
-
SHA512
e9ad0908d810993b08f8796f019e1c54a5893225271d2610c9a1aeeb899ea171ad045d7d4e9d99e49b19afe133dbce10de865847056145bfbc41eaf9f9ae370f
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBMB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpbbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe 1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 3180 sysxopti.exe 4844 xoptiec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotWP\\xoptiec.exe" 1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Galax37\\bodxsys.exe" 1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3368 1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe 3368 1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe 3368 1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe 3368 1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe 3180 sysxopti.exe 3180 sysxopti.exe 4844 xoptiec.exe 4844 xoptiec.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3368 wrote to memory of 3180 3368 1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe 82 PID 3368 wrote to memory of 3180 3368 1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe 82 PID 3368 wrote to memory of 3180 3368 1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe 82 PID 3368 wrote to memory of 4844 3368 1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe 84 PID 3368 wrote to memory of 4844 3368 1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe 84 PID 3368 wrote to memory of 4844 3368 1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1ca351ee8ec822d8fccba6e8fdf5789b51df08c70857b28918cc00476a86f7ee_NeikiAnalytics.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sysxopti.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\UserDotWP\xoptiec.exeC:\UserDotWP\xoptiec.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5e0403c3705e2ce9590c0749b8f0bb004
SHA159644098c1f8ab04e78912cabaee1999998d65a7
SHA2565f04fe5f854e7e3b778cd48cc8df37a976d139f79ed376436688c8e41c101188
SHA51205859b65564f7c8ee8dfd7b9cf73882d91a7d999e597990646a22ea112d295ec164306346336084c7c649424e90bf6bea68e207fb02c9cbb5781155e01825d03
-
Filesize
3.6MB
MD504dd1babac170a3c181d61c8fa7c83af
SHA1a17ace03aee80383d9bcc1423d4b6bc2d3d29838
SHA2567308f1f5eb23706dd686ab510123f6e4d02d7f374edf399c0c71e4386865065d
SHA512b80961c92368611186ebe72660967b678aa01988568cff0176ac2cae5c75630b4687a0b44f5b09e7d5f960bed966bcff2d924e35101ee5c3d99a4113e6e0edf0
-
Filesize
669KB
MD57a2bd0bb041bd3731085fb77d27d5243
SHA11d7a55fe4e406d69c4544d8fe6f2706f4b2fec03
SHA256f8490081cd620648196844fdeba71f87d542bd0d4957c26555e066ab57525357
SHA512ffef73b39e9e38834b8f8419dfc1487c08d540ef7abc7d5e942ec58befa00d8aa868cfb76d7029bddc7c4f95891d7252d945449806ff06c056de450ec84bd08a
-
Filesize
3.6MB
MD53d637d34b363595022b593a422903193
SHA1a9bb240f9fca9e7e699d5cc22cbb08147e820ed0
SHA256b69502faa9391d4faa0626741e76b013a17c36a606a2257341932f1dbd64660b
SHA512671e22cf4810d4ad12898b0c27003d7917361c0286198e80baf5db1190b1c96a0a1a33149743d139366122a8c1b8613392453dd5810533276c63d4f104dc7f51
-
Filesize
204B
MD5637bd0f0faa85a6a1f4435943f64b205
SHA1cd53935b874b0901e7863540b2ada5de7d5dfd02
SHA25622723d8afdf9e7342389c3f4fe31bb7c2f9295e52c53c6bd09fc33f57e2816dc
SHA5120632a5d4e0336c6ca1418424e1f3c28c1179b57f4ae3ad0b23f5cb5345bfd857ed36cce5a620c46bee1a03cf9df5f2d24a74b9ea352fd826e74f50306679a2eb
-
Filesize
172B
MD5a1b0de0cbb025c43d42c54a8d7f12c2c
SHA164d515a158bb3cffabab4cb970fe2ecf29b4bc9a
SHA2563efc304cc3cba14d6c119bf619347f41416d8d2d34b55b9f21f2724f1eff8f98
SHA512508392e40893261b0ffe6c1e65d34d60fc7da80742ff97106c61a525769a834b2b749eeb4100cf7e6ccd25ad6a01ee5fc3cf419b53929984f6d52b6d444510d3
-
Filesize
3.6MB
MD5595db93f22cd6c90658d6642613039d6
SHA1c11fbb3dfdabc3c1d05661d534802929527fe3ac
SHA256bfca54056f2bf7eeddd0453d317701a397ef404316fb7991f2544f5e78cd7d84
SHA512098ced9fe7a37adb9f43d102df7b836d0a4c6ba6ddc0f33af8a1e20718f19720eca9d3336b5f58382621aa8313430fb7ae3fdcdc69b1b5a1666eba6e6785a153