Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 07:19
Behavioral task
behavioral1
Sample
9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe
-
Size
721KB
-
MD5
9eca20a1136b80e16ba2914ec77d7430
-
SHA1
ed7da214f5f7e6c780bb17f6fbb050045fbac625
-
SHA256
ac521479e4e200f6ce0d7225a5f2c0d1e9d5d6b333240d02cfbfbcfe7dd9dfff
-
SHA512
22a986d77eacc4a5bcfcba22e7a2e397175e0803675be26db3984f4aee7ab1d7a63c2ee76fbeb14d6c0eadc6654f985760c72779de9731629cd115a728fa5917
-
SSDEEP
12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi75G:arl6kD68JmloO7TdNaPymUi63i62xHLC
Malware Config
Extracted
azorult
http://185.79.156.23/j0n0/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2580 cmd.exe -
Processes:
resource yara_rule behavioral1/memory/2956-0-0x0000000000090000-0x0000000000224000-memory.dmp upx behavioral1/memory/2956-26-0x0000000000090000-0x0000000000224000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2956-26-0x0000000000090000-0x0000000000224000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exedescription pid process target process PID 2956 set thread context of 2840 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2480 timeout.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exepid process 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exepid process 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.execmd.exedescription pid process target process PID 2956 wrote to memory of 2840 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe RegAsm.exe PID 2956 wrote to memory of 2840 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe RegAsm.exe PID 2956 wrote to memory of 2840 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe RegAsm.exe PID 2956 wrote to memory of 2840 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe RegAsm.exe PID 2956 wrote to memory of 2840 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe RegAsm.exe PID 2956 wrote to memory of 2840 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe RegAsm.exe PID 2956 wrote to memory of 2840 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe RegAsm.exe PID 2956 wrote to memory of 2840 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe RegAsm.exe PID 2956 wrote to memory of 2840 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe RegAsm.exe PID 2956 wrote to memory of 2580 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe cmd.exe PID 2956 wrote to memory of 2580 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe cmd.exe PID 2956 wrote to memory of 2580 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe cmd.exe PID 2956 wrote to memory of 2580 2956 9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe cmd.exe PID 2580 wrote to memory of 2480 2580 cmd.exe timeout.exe PID 2580 wrote to memory of 2480 2580 cmd.exe timeout.exe PID 2580 wrote to memory of 2480 2580 cmd.exe timeout.exe PID 2580 wrote to memory of 2480 2580 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵PID:2840
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c TimeOut 1 & Del /F "C:\Users\Admin\AppData\Local\Temp\9eca20a1136b80e16ba2914ec77d7430_NeikiAnalytics.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\timeout.exeTimeOut 13⤵
- Delays execution with timeout.exe
PID:2480