Analysis
-
max time kernel
15s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 08:53
Behavioral task
behavioral1
Sample
b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe
-
Size
2.0MB
-
MD5
b3975d4dacd50dfcec2c1de7b06f1390
-
SHA1
b6be2f45682e6f117b52cf12533ce682065c8ce3
-
SHA256
ec74076a06ebf53fbdf50828b8f1b2f1fd950a901f1fdd85b1e13f513249626b
-
SHA512
3301c8d1c9a0adcbd531771cfe5789e587eb507f91aa4bfcc57fb1a6d77ca19579c9af963ef75389d162b01bd184975643ef78719776370f5bd3dd690c987d81
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYW:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YY
Malware Config
Extracted
azorult
http://0x21.in:8000/_az/
Extracted
quasar
1.3.0.0
EbayProfiles
5.8.88.191:443
sockartek.icu:443
QSR_MUTEX_0kBRNrRz5TDLEQouI0
-
encryption_key
MWhG6wsClMX8aJM2CVXT
-
install_name
winsock.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
win defender run
-
subdirectory
SubDir
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Quasar payload 3 IoCs
resource yara_rule behavioral2/files/0x000900000002325c-12.dat family_quasar behavioral2/memory/4616-39-0x0000000000970000-0x00000000009CE000-memory.dmp family_quasar behavioral2/files/0x0007000000023260-51.dat family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
pid Process 1980 vnc.exe 4616 windef.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\m: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\n: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\v: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\e: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\i: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\r: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\s: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\y: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\x: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\a: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\b: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\h: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\j: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\p: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\u: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\z: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\g: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\l: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\o: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\q: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\t: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe File opened (read-only) \??\w: b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com 77 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum svchost.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023260-51.dat autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1980 set thread context of 4780 1980 vnc.exe 93 PID 868 set thread context of 2096 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4104 2448 WerFault.exe 101 4952 436 WerFault.exe 126 2960 3400 WerFault.exe 135 -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1008 schtasks.exe 2188 schtasks.exe 1216 schtasks.exe 3700 schtasks.exe 1548 schtasks.exe 616 schtasks.exe 1684 schtasks.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4828 PING.EXE 4588 PING.EXE 3236 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1980 vnc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 868 wrote to memory of 1980 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 91 PID 868 wrote to memory of 1980 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 91 PID 868 wrote to memory of 1980 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 91 PID 1980 wrote to memory of 4780 1980 vnc.exe 93 PID 1980 wrote to memory of 4780 1980 vnc.exe 93 PID 1980 wrote to memory of 4780 1980 vnc.exe 93 PID 868 wrote to memory of 4616 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 94 PID 868 wrote to memory of 4616 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 94 PID 868 wrote to memory of 4616 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 94 PID 868 wrote to memory of 2096 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 95 PID 868 wrote to memory of 2096 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 95 PID 868 wrote to memory of 2096 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 95 PID 1980 wrote to memory of 4780 1980 vnc.exe 93 PID 868 wrote to memory of 2096 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 95 PID 868 wrote to memory of 2096 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 95 PID 868 wrote to memory of 616 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 96 PID 868 wrote to memory of 616 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 96 PID 868 wrote to memory of 616 868 b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe 96 PID 1980 wrote to memory of 4780 1980 vnc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵
- Maps connected drives based on registry
PID:4780
-
-
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵
- Executes dropped EXE
PID:4616 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1684
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"3⤵PID:2448
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\P9kV4V8r47oE.bat" "4⤵PID:4080
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:3152
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
PID:4828
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"5⤵PID:436
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f6⤵
- Creates scheduled task(s)
PID:1216
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\X7E7d5TJDkX3.bat" "6⤵PID:2000
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:1800
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost7⤵
- Runs ping.exe
PID:4588
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"7⤵PID:3400
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:3700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PKyYiJoyADTu.bat" "8⤵PID:3780
-
C:\Windows\SysWOW64\chcp.comchcp 650019⤵PID:4760
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost9⤵
- Runs ping.exe
PID:3236
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"9⤵PID:3476
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f10⤵
- Creates scheduled task(s)
PID:1548
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 22608⤵
- Program crash
PID:2960
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 20086⤵
- Program crash
PID:4952
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 22724⤵
- Program crash
PID:4104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b3975d4dacd50dfcec2c1de7b06f1390_NeikiAnalytics.exe"2⤵PID:2096
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:616
-
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeC:\Users\Admin\btpanui\SystemPropertiesPerformance.exe1⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵PID:720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵PID:2156
-
-
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵PID:3548
-
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"2⤵PID:1928
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3636 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2448 -ip 24481⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 436 -ip 4361⤵PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3400 -ip 34001⤵PID:1312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
208B
MD5538fc42d0d09c523cb43f5ccce6d518a
SHA107fc379032decba00b8760d1d6754a2eec6aae56
SHA2568e767adf36a461a7d0f8e5408b784b8c3e02e5bce6aa8a532a83ec4a89a5c2c3
SHA5129c355eafe55eefc4ce7f99271fa23e2cb882d405eb17fefcd196dd915302caad30745c5dcd13ec44d86dcb15dd40ae378d27efa88c607176961306896b7583da
-
Filesize
208B
MD5e1483fbd4b27980b431390547c8515bd
SHA1755099f45400ffab7bc33241d089cc9c6c06beb0
SHA25667bf3178b041f36c0c7ae587722f301fc567ec8c98efaf3494185431e87ab4ae
SHA512943c5e805559f32927e18648ccba01d3ec608374fbdf49b21818bbfb4e341f6a3baf6151179dc0c5174cf3e64a44a2aeba3ed4d50982b4a3024b3a74df7c67e4
-
Filesize
208B
MD5de13be4ec99d5ae06e0b555a6b1f01b6
SHA17b6a381763471294134dbfcdd98ce6ba444d1ffc
SHA256639480d7355047a199ab5f2d9241ffb4a2738d4af48f686addbbdc5699178ef8
SHA5125e10dc9a16310ff5b858f9b6e9b896bf8a338a740fd9931ef9ebc297318c74bee91c5dceecfb5d7eab29c00e11d59c5c1c728cf2bf7e66df4d9b38db04aab79e
-
Filesize
405KB
MD5b8ba87ee4c3fc085a2fed0d839aadce1
SHA1b3a2e3256406330e8b1779199bb2b9865122d766
SHA2564e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4
SHA5127a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2
-
Filesize
349KB
MD5b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb
-
Filesize
224B
MD565a61f828137a48648d7012354988123
SHA1b69db48e053a16964508821897d3027ad46ee98b
SHA256bb86f1798c09d703197fd4a49e643d78e9cdbccfb9c200ea0e26cd5c4fb81c19
SHA5129927e8d5c799548a83c4e82e8ffce48aec469d6e2a6ccc09dece01a56fbb8490d83c6d716bc81f0a0b1379303c803e9f3b4ca12c15c44b71a06942bb3641cc07
-
Filesize
224B
MD53e2cc6d5e66bcec411bfb8b06d8631b5
SHA1f9d4dc96499109d0210490cf9ccbc52d25ec9a27
SHA256ad3bb494cc2ab6de653bdbdf6698e1ee694729ce89959f1811bc66ff8a34d141
SHA512f1bb3bcf6b366589bb1f2871f40cb52788b18c494530a752d9c676312dfc8e43e728759a366fe6a7d54cb258e17b9f85b22297aa64268ccdf4c6bcb2fb268ece
-
Filesize
224B
MD56d8bbe808f1ee27130f26f6d8758d97d
SHA1ec871dea5dd0ae8dcfdad4e6eea2709f228d6fae
SHA256ad7a2cf56a752ea48a4064c07ad6f712c60f83270770c1b6bff38c3dad4809bc
SHA512aa86deb5b5ed296a72f5040b263cec33e29370b8702aa27dacc26b40d914cd2a9ae1d205a438e064a288d6d49461523ac0e628a343ee13bd741714edc70b4f17
-
Filesize
2.0MB
MD586965fd4b059ef649d5c7371e1a388c4
SHA161847617ce4d1c4e1dbdbde0405a82966f685adb
SHA256eb76033488d496072ff7da8630dd52712dba9da066e5aa4041e09c8139a6fdee
SHA512e1dd106bf471c2f673a4d657a255eae0cca43991f360c25d90808398fe469339d5fbf0236dda8c94edc2b0f219c83b24acf8d91298c9ef1b03492b54625e02d8