Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 02:47
Behavioral task
behavioral1
Sample
68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
68fd4b8a1b293a92dd87094710f6f900
-
SHA1
7a89b65547b452fb722233ac4a2da8aeca740551
-
SHA256
86c9c73cc5c1bd80b2a83eae93d64f2864ea10a64db13eb1280b58e8f6aaa885
-
SHA512
061a901fda3cb62e0aa18f0d3a2f8fc8b6d7b8a11b6cc97ad4cf392eeb503a1a6160c3a8cba395532369184f706d1b1e901100d69958836cae8fda910fc38071
-
SSDEEP
24576:ru6J3xO0c+JY5UZ+XCHkGso6Fa720W4njUprvVcC1f2o5RRfgdWYW:Fo0c++OCokGs9Fa+rd1f26RNYW
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Signatures
-
NetWire RAT payload 15 IoCs
resource yara_rule behavioral1/memory/2372-0-0x0000000000CE0000-0x0000000000E4B000-memory.dmp netwire behavioral1/files/0x000b00000001227b-13.dat netwire behavioral1/memory/2604-24-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2372-42-0x0000000000CE0000-0x0000000000E4B000-memory.dmp netwire behavioral1/memory/2792-41-0x0000000000CE0000-0x0000000000E4B000-memory.dmp netwire behavioral1/files/0x0007000000016c71-48.dat netwire behavioral1/memory/2980-50-0x00000000010E0000-0x000000000124B000-memory.dmp netwire behavioral1/memory/2772-78-0x00000000010E0000-0x000000000124B000-memory.dmp netwire behavioral1/memory/2980-80-0x00000000010E0000-0x000000000124B000-memory.dmp netwire behavioral1/memory/3044-86-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2204-88-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/3044-91-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1440-99-0x00000000010E0000-0x000000000124B000-memory.dmp netwire behavioral1/memory/1440-115-0x00000000010E0000-0x000000000124B000-memory.dmp netwire behavioral1/memory/3040-157-0x00000000010E0000-0x000000000124B000-memory.dmp netwire -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2792-29-0x0000000000080000-0x000000000009D000-memory.dmp warzonerat behavioral1/memory/2792-39-0x0000000000080000-0x000000000009D000-memory.dmp warzonerat -
Executes dropped EXE 11 IoCs
pid Process 2604 Blasthost.exe 3044 Host.exe 2980 RtDCpl64.exe 2204 Blasthost.exe 2772 RtDCpl64.exe 1440 RtDCpl64.exe 1868 RtDCpl64.exe 1760 Blasthost.exe 3040 RtDCpl64.exe 3004 Blasthost.exe 2716 RtDCpl64.exe -
Loads dropped DLL 16 IoCs
pid Process 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 2604 Blasthost.exe 2604 Blasthost.exe 2980 RtDCpl64.exe 2980 RtDCpl64.exe 2980 RtDCpl64.exe 2980 RtDCpl64.exe 1440 RtDCpl64.exe 1440 RtDCpl64.exe 1440 RtDCpl64.exe 3040 RtDCpl64.exe 3040 RtDCpl64.exe 3040 RtDCpl64.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2372-0-0x0000000000CE0000-0x0000000000E4B000-memory.dmp autoit_exe behavioral1/memory/2372-42-0x0000000000CE0000-0x0000000000E4B000-memory.dmp autoit_exe behavioral1/memory/2792-41-0x0000000000CE0000-0x0000000000E4B000-memory.dmp autoit_exe behavioral1/files/0x0007000000016c71-48.dat autoit_exe behavioral1/memory/2980-50-0x00000000010E0000-0x000000000124B000-memory.dmp autoit_exe behavioral1/memory/2772-78-0x00000000010E0000-0x000000000124B000-memory.dmp autoit_exe behavioral1/memory/2980-80-0x00000000010E0000-0x000000000124B000-memory.dmp autoit_exe behavioral1/memory/1440-99-0x00000000010E0000-0x000000000124B000-memory.dmp autoit_exe behavioral1/memory/1440-115-0x00000000010E0000-0x000000000124B000-memory.dmp autoit_exe behavioral1/memory/3040-157-0x00000000010E0000-0x000000000124B000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2372 set thread context of 2792 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 30 PID 2980 set thread context of 2772 2980 RtDCpl64.exe 38 PID 1440 set thread context of 1868 1440 RtDCpl64.exe 47 PID 3040 set thread context of 2716 3040 RtDCpl64.exe 54 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2804 schtasks.exe 2648 schtasks.exe 1948 schtasks.exe 444 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2604 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 28 PID 2372 wrote to memory of 2604 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 28 PID 2372 wrote to memory of 2604 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 28 PID 2372 wrote to memory of 2604 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 28 PID 2604 wrote to memory of 3044 2604 Blasthost.exe 29 PID 2604 wrote to memory of 3044 2604 Blasthost.exe 29 PID 2604 wrote to memory of 3044 2604 Blasthost.exe 29 PID 2604 wrote to memory of 3044 2604 Blasthost.exe 29 PID 2372 wrote to memory of 2792 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 30 PID 2372 wrote to memory of 2792 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 30 PID 2372 wrote to memory of 2792 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 30 PID 2372 wrote to memory of 2792 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 30 PID 2372 wrote to memory of 2792 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 30 PID 2372 wrote to memory of 2792 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 30 PID 2372 wrote to memory of 2648 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 31 PID 2372 wrote to memory of 2648 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 31 PID 2372 wrote to memory of 2648 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 31 PID 2372 wrote to memory of 2648 2372 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 31 PID 2792 wrote to memory of 2608 2792 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 33 PID 2792 wrote to memory of 2608 2792 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 33 PID 2792 wrote to memory of 2608 2792 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 33 PID 2792 wrote to memory of 2608 2792 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 33 PID 2792 wrote to memory of 2608 2792 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 33 PID 2792 wrote to memory of 2608 2792 68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe 33 PID 2640 wrote to memory of 2980 2640 taskeng.exe 36 PID 2640 wrote to memory of 2980 2640 taskeng.exe 36 PID 2640 wrote to memory of 2980 2640 taskeng.exe 36 PID 2640 wrote to memory of 2980 2640 taskeng.exe 36 PID 2980 wrote to memory of 2204 2980 RtDCpl64.exe 37 PID 2980 wrote to memory of 2204 2980 RtDCpl64.exe 37 PID 2980 wrote to memory of 2204 2980 RtDCpl64.exe 37 PID 2980 wrote to memory of 2204 2980 RtDCpl64.exe 37 PID 2980 wrote to memory of 2772 2980 RtDCpl64.exe 38 PID 2980 wrote to memory of 2772 2980 RtDCpl64.exe 38 PID 2980 wrote to memory of 2772 2980 RtDCpl64.exe 38 PID 2980 wrote to memory of 2772 2980 RtDCpl64.exe 38 PID 2980 wrote to memory of 2772 2980 RtDCpl64.exe 38 PID 2980 wrote to memory of 2772 2980 RtDCpl64.exe 38 PID 2980 wrote to memory of 1948 2980 RtDCpl64.exe 39 PID 2980 wrote to memory of 1948 2980 RtDCpl64.exe 39 PID 2980 wrote to memory of 1948 2980 RtDCpl64.exe 39 PID 2980 wrote to memory of 1948 2980 RtDCpl64.exe 39 PID 2772 wrote to memory of 1032 2772 RtDCpl64.exe 41 PID 2772 wrote to memory of 1032 2772 RtDCpl64.exe 41 PID 2772 wrote to memory of 1032 2772 RtDCpl64.exe 41 PID 2772 wrote to memory of 1032 2772 RtDCpl64.exe 41 PID 2772 wrote to memory of 1032 2772 RtDCpl64.exe 41 PID 2772 wrote to memory of 1032 2772 RtDCpl64.exe 41 PID 2640 wrote to memory of 1440 2640 taskeng.exe 45 PID 2640 wrote to memory of 1440 2640 taskeng.exe 45 PID 2640 wrote to memory of 1440 2640 taskeng.exe 45 PID 2640 wrote to memory of 1440 2640 taskeng.exe 45 PID 1440 wrote to memory of 1760 1440 RtDCpl64.exe 46 PID 1440 wrote to memory of 1760 1440 RtDCpl64.exe 46 PID 1440 wrote to memory of 1760 1440 RtDCpl64.exe 46 PID 1440 wrote to memory of 1760 1440 RtDCpl64.exe 46 PID 1440 wrote to memory of 1868 1440 RtDCpl64.exe 47 PID 1440 wrote to memory of 1868 1440 RtDCpl64.exe 47 PID 1440 wrote to memory of 1868 1440 RtDCpl64.exe 47 PID 1440 wrote to memory of 1868 1440 RtDCpl64.exe 47 PID 1440 wrote to memory of 1868 1440 RtDCpl64.exe 47 PID 1440 wrote to memory of 1868 1440 RtDCpl64.exe 47 PID 1868 wrote to memory of 1796 1868 RtDCpl64.exe 48 PID 1868 wrote to memory of 1796 1868 RtDCpl64.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"3⤵
- Executes dropped EXE
PID:3044
-
-
-
C:\Users\Admin\AppData\Local\Temp\68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\68fd4b8a1b293a92dd87094710f6f900_NeikiAnalytics.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:2608
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2648
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {55999861-B192-4254-9BB5-AA81D236EFB2} S-1-5-21-268080393-3149932598-1824759070-1000:UHRQKJCP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:2204
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:1032
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1948
-
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:1760
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:1796
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:444
-
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:3040 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:3004
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:2832
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD50dac88d5fcdf8b546dba1e638b2eb88c
SHA1e3137a922be2322ab6ab28d6e58a243270ef10a5
SHA256fee20f5dbae9e1cc7bfd32e081b61e3c385a344116bf19cf67c8a326bb5306b2
SHA512d6f86248acd53097d4530074aa1f8a7ffb1a6aa9ddb633f2dc9d66ee83d7c6a94940a470f27b379b56293f9125975c0197e88175a7bf10d9166d12d3318ce402
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292