Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 05:00
Behavioral task
behavioral1
Sample
fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe
-
Size
1.3MB
-
MD5
fb5d0e064b08a5bc51273c961fd8ad00
-
SHA1
67e705092e01e137ecdbb1d48026567fd4f9fc54
-
SHA256
c88dd4b98e89630c257f4fee1181634eb613eff1ba20b22a3454c944715cc4e9
-
SHA512
ec24cf210d9f762f677d4933f7193d69d38e3426d78749830c3d7189c0390c5d180f56154c052272320b2796f27af756602f8b778445938ee3e5d03689e51db7
-
SSDEEP
24576:Ku6J33O0c+JY5UZ+XC0kGso6Fa720W4njUprvVcC1f2o5RRfgUWYQ:8u0c++OCvkGs9Fa+rd1f26RaYQ
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Signatures
-
NetWire RAT payload 6 IoCs
resource yara_rule behavioral1/files/0x0024000000015364-2.dat netwire behavioral1/memory/2240-23-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2548-45-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2548-48-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/files/0x0007000000015c23-51.dat netwire behavioral1/memory/2016-88-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2872-38-0x0000000000080000-0x000000000009D000-memory.dmp warzonerat behavioral1/memory/2872-28-0x0000000000080000-0x000000000009D000-memory.dmp warzonerat -
Executes dropped EXE 8 IoCs
pid Process 2240 Blasthost.exe 2548 Host.exe 1036 RtDCpl64.exe 2016 Blasthost.exe 1400 RtDCpl64.exe 1792 RtDCpl64.exe 1924 Blasthost.exe 792 RtDCpl64.exe -
Loads dropped DLL 13 IoCs
pid Process 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 2240 Blasthost.exe 2240 Blasthost.exe 1036 RtDCpl64.exe 1036 RtDCpl64.exe 1036 RtDCpl64.exe 1036 RtDCpl64.exe 1792 RtDCpl64.exe 1792 RtDCpl64.exe 1792 RtDCpl64.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000015c23-51.dat autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2764 set thread context of 2872 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 30 PID 1036 set thread context of 1400 1036 RtDCpl64.exe 40 PID 1792 set thread context of 792 1792 RtDCpl64.exe 47 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2620 schtasks.exe 1756 schtasks.exe 2304 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2240 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 28 PID 2764 wrote to memory of 2240 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 28 PID 2764 wrote to memory of 2240 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 28 PID 2764 wrote to memory of 2240 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 28 PID 2240 wrote to memory of 2548 2240 Blasthost.exe 29 PID 2240 wrote to memory of 2548 2240 Blasthost.exe 29 PID 2240 wrote to memory of 2548 2240 Blasthost.exe 29 PID 2240 wrote to memory of 2548 2240 Blasthost.exe 29 PID 2764 wrote to memory of 2872 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 30 PID 2764 wrote to memory of 2872 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 30 PID 2764 wrote to memory of 2872 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 30 PID 2764 wrote to memory of 2872 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 30 PID 2764 wrote to memory of 2872 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 30 PID 2764 wrote to memory of 2872 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 30 PID 2872 wrote to memory of 2564 2872 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 31 PID 2872 wrote to memory of 2564 2872 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 31 PID 2872 wrote to memory of 2564 2872 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 31 PID 2872 wrote to memory of 2564 2872 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 31 PID 2764 wrote to memory of 2620 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 33 PID 2764 wrote to memory of 2620 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 33 PID 2764 wrote to memory of 2620 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 33 PID 2764 wrote to memory of 2620 2764 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 33 PID 2872 wrote to memory of 2564 2872 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 31 PID 2872 wrote to memory of 2564 2872 fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe 31 PID 1720 wrote to memory of 1036 1720 taskeng.exe 38 PID 1720 wrote to memory of 1036 1720 taskeng.exe 38 PID 1720 wrote to memory of 1036 1720 taskeng.exe 38 PID 1720 wrote to memory of 1036 1720 taskeng.exe 38 PID 1036 wrote to memory of 2016 1036 RtDCpl64.exe 39 PID 1036 wrote to memory of 2016 1036 RtDCpl64.exe 39 PID 1036 wrote to memory of 2016 1036 RtDCpl64.exe 39 PID 1036 wrote to memory of 2016 1036 RtDCpl64.exe 39 PID 1036 wrote to memory of 1400 1036 RtDCpl64.exe 40 PID 1036 wrote to memory of 1400 1036 RtDCpl64.exe 40 PID 1036 wrote to memory of 1400 1036 RtDCpl64.exe 40 PID 1036 wrote to memory of 1400 1036 RtDCpl64.exe 40 PID 1036 wrote to memory of 1400 1036 RtDCpl64.exe 40 PID 1036 wrote to memory of 1400 1036 RtDCpl64.exe 40 PID 1400 wrote to memory of 1556 1400 RtDCpl64.exe 41 PID 1400 wrote to memory of 1556 1400 RtDCpl64.exe 41 PID 1400 wrote to memory of 1556 1400 RtDCpl64.exe 41 PID 1400 wrote to memory of 1556 1400 RtDCpl64.exe 41 PID 1036 wrote to memory of 1756 1036 RtDCpl64.exe 43 PID 1036 wrote to memory of 1756 1036 RtDCpl64.exe 43 PID 1036 wrote to memory of 1756 1036 RtDCpl64.exe 43 PID 1036 wrote to memory of 1756 1036 RtDCpl64.exe 43 PID 1400 wrote to memory of 1556 1400 RtDCpl64.exe 41 PID 1400 wrote to memory of 1556 1400 RtDCpl64.exe 41 PID 1720 wrote to memory of 1792 1720 taskeng.exe 45 PID 1720 wrote to memory of 1792 1720 taskeng.exe 45 PID 1720 wrote to memory of 1792 1720 taskeng.exe 45 PID 1720 wrote to memory of 1792 1720 taskeng.exe 45 PID 1792 wrote to memory of 1924 1792 RtDCpl64.exe 46 PID 1792 wrote to memory of 1924 1792 RtDCpl64.exe 46 PID 1792 wrote to memory of 1924 1792 RtDCpl64.exe 46 PID 1792 wrote to memory of 1924 1792 RtDCpl64.exe 46 PID 1792 wrote to memory of 792 1792 RtDCpl64.exe 47 PID 1792 wrote to memory of 792 1792 RtDCpl64.exe 47 PID 1792 wrote to memory of 792 1792 RtDCpl64.exe 47 PID 1792 wrote to memory of 792 1792 RtDCpl64.exe 47 PID 1792 wrote to memory of 792 1792 RtDCpl64.exe 47 PID 1792 wrote to memory of 792 1792 RtDCpl64.exe 47 PID 1792 wrote to memory of 2304 1792 RtDCpl64.exe 48 PID 1792 wrote to memory of 2304 1792 RtDCpl64.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"3⤵
- Executes dropped EXE
PID:2548
-
-
-
C:\Users\Admin\AppData\Local\Temp\fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\fb5d0e064b08a5bc51273c961fd8ad00_NEIKI.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:2564
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2620
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F2228CEE-BAD4-4ED8-AB34-67ADB35CDF3B} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:2016
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:1556
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1756
-
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:1924
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
PID:792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:1396
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2304
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5444584e487d91f0ef2d1417bbbc31bed
SHA15b6953f49149c75efd13d9f5f6f8c545ad50d1d2
SHA25617b9a6496754d33933daa5d34aca0fb2a04db77840950e86fc0db92fe4e3904a
SHA5121cabcac3a6ff4f3d81730f7049de4c78596e96cb7d99b5b264ded0e2a768d705bdb1a10f08680d33ea5224a1b33ff75ae3b2404b27f440c916e633c7ee1ae7e2
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292