Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe
-
Size
497KB
-
MD5
78ec630f3ed072441ce509aa4060e2e0
-
SHA1
25b02caab0c2baf14683bbfa0a1fc006a53bc479
-
SHA256
2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943
-
SHA512
29c1b542ebd06cd14500e1b91e59d589e753be592eb52a5041c5b6514dba3418e1d678301793344b3f7e07d9311f778a34ad8a0966e49d0e2164079fbe90f7d8
-
SSDEEP
12288:/n8yN0Mr8Zm8DEO7z4Kv7yGvZPeC4qgrl5XJPv:vPuZm9Kv7VZPeBrF
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2096 Isass.exe 2796 Isass.exe 2720 Isass.exe 2664 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe -
Loads dropped DLL 10 IoCs
pid Process 2980 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 2980 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 2980 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 2980 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 2660 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 2660 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 2720 Isass.exe 2720 Isass.exe 2096 Isass.exe 2096 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2980 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 2096 Isass.exe 2796 Isass.exe 2796 Isass.exe 2796 Isass.exe 2660 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 2720 Isass.exe 2720 Isass.exe 2664 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2096 2980 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 28 PID 2980 wrote to memory of 2096 2980 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 28 PID 2980 wrote to memory of 2096 2980 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 28 PID 2980 wrote to memory of 2096 2980 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 28 PID 2980 wrote to memory of 2796 2980 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 29 PID 2980 wrote to memory of 2796 2980 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 29 PID 2980 wrote to memory of 2796 2980 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 29 PID 2980 wrote to memory of 2796 2980 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 29 PID 2796 wrote to memory of 2660 2796 Isass.exe 30 PID 2796 wrote to memory of 2660 2796 Isass.exe 30 PID 2796 wrote to memory of 2660 2796 Isass.exe 30 PID 2796 wrote to memory of 2660 2796 Isass.exe 30 PID 2660 wrote to memory of 2720 2660 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 31 PID 2660 wrote to memory of 2720 2660 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 31 PID 2660 wrote to memory of 2720 2660 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 31 PID 2660 wrote to memory of 2720 2660 2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe 31 PID 2720 wrote to memory of 2664 2720 Isass.exe 32 PID 2720 wrote to memory of 2664 2720 Isass.exe 32 PID 2720 wrote to memory of 2664 2720 Isass.exe 32 PID 2720 wrote to memory of 2664 2720 Isass.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2ca927a9e9c7dec6056273908c9d91fd68b9b620672052daee9917ef376bd943_NeikiAnalytics.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD520a01dcd1a68ed02b8367b1acf045777
SHA1bc6faad1dd5b52c238a1e16083df1ec36856d28e
SHA2560dc9d189d3f162fbeef97345f98afe3749272c9da7e04057c50bbb80c674546f
SHA512a43717b7d0b06d967176cb2f222af27d045baad32a4c363947debdd416f6814084ce49490e9c50d8af1d2be77c4d4bde36e22e44940ca60b8cf4344f5a3f42a8