Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
19ae732d10cf23f2656aaf0e84bba240
-
SHA1
c0ca858bd21aac14fe3c07b04fb88cebee806600
-
SHA256
a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59
-
SHA512
36089869abd2c7c7cccfcf21f525c9416faebe6cec01ab49aafcea165c540db60d6f4565e367b64cc71af5db7dae88ec7c089d6ea203b67e7f8b6106cebbe440
-
SSDEEP
49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBZB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpGbVz8eLFcz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 2128 ecxdob.exe 2608 devoptiloc.exe -
Loads dropped DLL 2 IoCs
pid Process 2780 a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe 2780 a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesRN\\devoptiloc.exe" a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidTI\\dobxloc.exe" a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2780 a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe 2780 a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe 2608 devoptiloc.exe 2128 ecxdob.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2128 2780 a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe 28 PID 2780 wrote to memory of 2128 2780 a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe 28 PID 2780 wrote to memory of 2128 2780 a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe 28 PID 2780 wrote to memory of 2128 2780 a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe 28 PID 2780 wrote to memory of 2608 2780 a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe 29 PID 2780 wrote to memory of 2608 2780 a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe 29 PID 2780 wrote to memory of 2608 2780 a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe 29 PID 2780 wrote to memory of 2608 2780 a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a4da9413c667bb5da30cbd750e81712e4bdcddc702965e73988edb2c93808c59_NeikiAnalytics.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ecxdob.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2128
-
-
C:\FilesRN\devoptiloc.exeC:\FilesRN\devoptiloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD57d850746e1d691fbe7e72d470caab0c8
SHA18cd367043c8741116709db10698faaf90d0b80dd
SHA256206414651508c2d6112260ff567bd67bec68122d295e5e7f2ece54864b3ddf41
SHA5127a573a7f54a95f4565c42117a920b08b8865ccb66c3a8b577880064a6b9e24e2cdbaac629cc161b5e2c1f1ff418c1ffe88978987ea7cf4a3589c924e1508d96e
-
Filesize
169B
MD511447c66eebd7a30b90c4bdd487095c0
SHA18166894235473743f5a4eadbe8340a16b8d1b5cb
SHA2560e4b6f847d50412e68b1050fd2c512456bb13f1a44887d88b8e914e1c7f165ce
SHA5124d94198c1344ffe8273ea39c9f7ac37a6f8b7e1c5722206ffe03f2d2d8e25027bb2d7faf5dd38b30bab83a7bf693d56198313788822daceb4afe5c6d6866b935
-
Filesize
201B
MD50b5d16910e9fce96c3532a275cc64f48
SHA1e2bb07b9049849434564fe349edacccbda4648c8
SHA2562e02d6a536bb47dbf5ac0ac297cab315e0f60d1d3b2a9bfdf6c3c8e3c10df799
SHA512434117dd0efcd6fbf40628669c0a5e0c3a311882e802ca0b949e672f815b674be990a464dbcf0ef195b839e946c5c29448dc636c0a83303e48c57149ef493e03
-
Filesize
2.7MB
MD50abf2dc9394b2cb7736ddb4d4fe80f9e
SHA14d77bdb825695184b77d3bc43330e21ae46971ff
SHA256bdec8dfb76447ace5cbab8ffd9b554216483a99c766d41be2e5751e23e895e06
SHA512854c29708c7130be56151e34cc653a558672bd2ec501b496d6abffe9f6082d98586549314a2ad4a715cbbb894c834d4d2cf02db809914342ba98c3432a3f52a7
-
Filesize
4.1MB
MD591dfb4c8c1b700b606880be497354949
SHA1dc5456087feae66b3621855fa5458b7d26ad430b
SHA256a723131aed4a40abae2a276c5fbbeafac220a324bdea24705bb6f3e4ddd7ef17
SHA5122282cfa8f4e20db31c65cea85a421f02c6c9b74e941a768e9b0519c37fa019fc17313aae1fff8e94db5a715dfb62f89dffdc367fd765e7760c7b501eb74ac520
-
Filesize
4.1MB
MD59cf0e9d7d2751f2941c81170fd6bdb3f
SHA13f1cf5580d0459c6e2e665ffd437237c42d5df88
SHA256e77707fc85c4506805eafa707353979349255796de11a56d2ce66d3ca4d54df0
SHA5126d16c20919e92e370138319a45db3102d043442e5ef9b4f800ad32cf09d864bea3455c12863c1d56151617f22cc5de9d8e6187cc3911bda87bff998ab7aaad5c