Analysis

  • max time kernel
    147s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2024 22:51

General

  • Target

    207fb4aeffd47811049fe5c6366f09f70b859c6987883dcd9244a915af91a342_NeikiAnalytics.exe

  • Size

    4.4MB

  • MD5

    4a8099ca44ad78fa5414bab4f54ba030

  • SHA1

    ad1e9ee328d7eb870ebdaf9cf592a183f838f459

  • SHA256

    207fb4aeffd47811049fe5c6366f09f70b859c6987883dcd9244a915af91a342

  • SHA512

    b1f905210d372c8352c07ea6c27bd71f12f7ee3a1e40375925bc6cb295b08d07d5bd9407e4da6e7d303a0951fb19e060a652951bfdf67f1151f19720e8698d03

  • SSDEEP

    49152:0fhvX07qcsIUv5z95W+diSQJAoCWFf4z6X5MS/tl3odglPCpgVS84OH:+hc7qcvWzE4OX53C+V5r

Malware Config

Extracted

Family

vidar

C2

https://t.me/g067n

https://steamcommunity.com/profiles/76561199707802586

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:129.0) Gecko/20100101 Firefox/129.0

Extracted

Family

lumma

C2

https://potterryisiw.shop/api

https://foodypannyjsud.shop/api

https://contintnetksows.shop/api

https://reinforcedirectorywd.shop/api

Signatures

  • Detect Vidar Stealer 5 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\207fb4aeffd47811049fe5c6366f09f70b859c6987883dcd9244a915af91a342_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\207fb4aeffd47811049fe5c6366f09f70b859c6987883dcd9244a915af91a342_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
        PID:4196
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\ProgramData\BGHIDGCAFC.exe
          "C:\ProgramData\BGHIDGCAFC.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4136
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:4632
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
                PID:3940
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 300
                4⤵
                • Program crash
                PID:1568
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BAKKEGCAAECA" & exit
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4376
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 10
                4⤵
                • Delays execution with timeout.exe
                PID:4648
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4136 -ip 4136
          1⤵
            PID:4880

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Credential Access

          Unsecured Credentials

          1
          T1552

          Credentials In Files

          1
          T1552.001

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          1
          T1082

          Collection

          Data from Local System

          1
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\BGHIDGCAFC.exe
            Filesize

            516KB

            MD5

            0309dd0131150796ea99b30a62194fae

            SHA1

            2df6e334708eae810a74b844fd57e18e9fdc34cd

            SHA256

            07c09ba5a84f619e5b83a54298ffc58d20b00f14399c7a94b7f02b70efc60f35

            SHA512

            3d4e5a0718d04fee92d8040880b631107d1e23a6b3bce430d58769179af999c28b99e50c5cd45f283339f7bbb24ffacbf601a5447edb12e28da4517fbfa282e8

          • memory/1684-15-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-17-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-3-0x0000000005040000-0x000000000504A000-memory.dmp
            Filesize

            40KB

          • memory/1684-4-0x0000000074BC0000-0x0000000075370000-memory.dmp
            Filesize

            7.7MB

          • memory/1684-5-0x00000000051F0000-0x00000000052BE000-memory.dmp
            Filesize

            824KB

          • memory/1684-6-0x0000000005080000-0x0000000005088000-memory.dmp
            Filesize

            32KB

          • memory/1684-7-0x00000000052C0000-0x00000000052DC000-memory.dmp
            Filesize

            112KB

          • memory/1684-11-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-67-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-65-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-63-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-1-0x0000000000280000-0x00000000006E6000-memory.dmp
            Filesize

            4.4MB

          • memory/1684-43-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-74-0x0000000074BC0000-0x0000000075370000-memory.dmp
            Filesize

            7.7MB

          • memory/1684-45-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-33-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-57-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-55-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-53-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-51-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-49-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-47-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-72-0x0000000074BC0000-0x0000000075370000-memory.dmp
            Filesize

            7.7MB

          • memory/1684-32-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-21-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-39-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-37-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-35-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-29-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-27-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-25-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-23-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-41-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-19-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-2-0x00000000050C0000-0x000000000515C000-memory.dmp
            Filesize

            624KB

          • memory/1684-0-0x0000000074BCE000-0x0000000074BCF000-memory.dmp
            Filesize

            4KB

          • memory/1684-13-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-9-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-8-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-61-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/1684-60-0x00000000052C0000-0x00000000052D5000-memory.dmp
            Filesize

            84KB

          • memory/3064-68-0x0000000000400000-0x0000000000648000-memory.dmp
            Filesize

            2.3MB

          • memory/3064-73-0x0000000000400000-0x0000000000648000-memory.dmp
            Filesize

            2.3MB

          • memory/3064-86-0x0000000000400000-0x0000000000648000-memory.dmp
            Filesize

            2.3MB

          • memory/3064-70-0x0000000000400000-0x0000000000648000-memory.dmp
            Filesize

            2.3MB

          • memory/3064-149-0x0000000000400000-0x0000000000648000-memory.dmp
            Filesize

            2.3MB

          • memory/3940-146-0x0000000000400000-0x000000000045A000-memory.dmp
            Filesize

            360KB

          • memory/4136-142-0x00000000013B0000-0x00000000013B1000-memory.dmp
            Filesize

            4KB