General

  • Target

    3bca3e183af73f57f76ef41673a30358ff0b45cf508686e5bb25cf0b12f612af_NeikiAnalytics.exe

  • Size

    156KB

  • Sample

    240621-e1f8qssbnk

  • MD5

    fca036dd87095f96db816a0dd84e8e30

  • SHA1

    1527e7ff676db1574cc05419302d611a9b669dd7

  • SHA256

    3bca3e183af73f57f76ef41673a30358ff0b45cf508686e5bb25cf0b12f612af

  • SHA512

    2a760582c8cc03e8b87fb3b38578c28e3e932ceae7983c0f2bac1a7e017e880460cb9485e680d2b8714943ef2d4f6513e7f000ca37b0d95fc34f436ad313c538

  • SSDEEP

    1536:JxqjQ+P04wsmJC5X5WKxqlfF+XEdeeeeeeeeeeeeeeeeeeeWeeeeecOxqjQ+P04U:sr85C5pvqlfFjfr85CEwbk1LSiGo

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.66/

http://77.91.77.92/

http://91.202.233.141/

Targets

    • Target

      3bca3e183af73f57f76ef41673a30358ff0b45cf508686e5bb25cf0b12f612af_NeikiAnalytics.exe

    • Size

      156KB

    • MD5

      fca036dd87095f96db816a0dd84e8e30

    • SHA1

      1527e7ff676db1574cc05419302d611a9b669dd7

    • SHA256

      3bca3e183af73f57f76ef41673a30358ff0b45cf508686e5bb25cf0b12f612af

    • SHA512

      2a760582c8cc03e8b87fb3b38578c28e3e932ceae7983c0f2bac1a7e017e880460cb9485e680d2b8714943ef2d4f6513e7f000ca37b0d95fc34f436ad313c538

    • SSDEEP

      1536:JxqjQ+P04wsmJC5X5WKxqlfF+XEdeeeeeeeeeeeeeeeeeeeWeeeeecOxqjQ+P04U:sr85C5pvqlfFjfr85CEwbk1LSiGo

    • Detect Neshta payload

    • Modifies security service

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Phorphiex payload

    • Phorphiex, Phorpiex

      Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Modify Registry

5
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks