Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 10:28
Behavioral task
behavioral1
Sample
c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
c694ac069083f0d533f1969a3de28530
-
SHA1
8dd4d855020449993929be42498fefaa6c52c37c
-
SHA256
ffe5e9cc23e87c4a5ffcd140488244025edf23feb85b48b365420d880202c2a7
-
SHA512
b171dd98c8698be41c8f512f36b5ecb5cb7714ffb75d74e8b1c981b07decaabaf4193936e0791d0d35a447e3105e2147f758e5357869cc34ee3d752b1a4c5ccb
-
SSDEEP
24576:ru6J3xO0c+JY5UZ+XCHkGso6Fa720W4njUprvVcC1f2o5RRfgdWYz:Fo0c++OCokGs9Fa+rd1f26RNYz
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Signatures
-
NetWire RAT payload 17 IoCs
resource yara_rule behavioral2/memory/4120-0-0x0000000000290000-0x00000000003FB000-memory.dmp netwire behavioral2/files/0x0008000000022f51-5.dat netwire behavioral2/memory/2360-12-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/1772-24-0x0000000000290000-0x00000000003FB000-memory.dmp netwire behavioral2/memory/4120-26-0x0000000000290000-0x00000000003FB000-memory.dmp netwire behavioral2/files/0x0007000000023402-29.dat netwire behavioral2/memory/4060-30-0x0000000000840000-0x00000000009AB000-memory.dmp netwire behavioral2/memory/1092-47-0x0000000000840000-0x00000000009AB000-memory.dmp netwire behavioral2/memory/4060-49-0x0000000000840000-0x00000000009AB000-memory.dmp netwire behavioral2/memory/3808-52-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/3808-54-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/3916-55-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4528-65-0x0000000000840000-0x00000000009AB000-memory.dmp netwire behavioral2/memory/4528-77-0x0000000000840000-0x00000000009AB000-memory.dmp netwire behavioral2/memory/1652-83-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/3012-97-0x0000000000840000-0x00000000009AB000-memory.dmp netwire behavioral2/memory/3012-108-0x0000000000840000-0x00000000009AB000-memory.dmp netwire -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral2/memory/1772-15-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/1772-23-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation RtDCpl64.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation RtDCpl64.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation RtDCpl64.exe -
Executes dropped EXE 11 IoCs
pid Process 2360 Blasthost.exe 3808 Host.exe 4060 RtDCpl64.exe 3916 Blasthost.exe 1092 RtDCpl64.exe 4528 RtDCpl64.exe 1652 Blasthost.exe 1560 RtDCpl64.exe 3012 RtDCpl64.exe 2304 Blasthost.exe 968 RtDCpl64.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4120-0-0x0000000000290000-0x00000000003FB000-memory.dmp autoit_exe behavioral2/memory/1772-24-0x0000000000290000-0x00000000003FB000-memory.dmp autoit_exe behavioral2/memory/4120-26-0x0000000000290000-0x00000000003FB000-memory.dmp autoit_exe behavioral2/files/0x0007000000023402-29.dat autoit_exe behavioral2/memory/4060-30-0x0000000000840000-0x00000000009AB000-memory.dmp autoit_exe behavioral2/memory/1092-47-0x0000000000840000-0x00000000009AB000-memory.dmp autoit_exe behavioral2/memory/4060-49-0x0000000000840000-0x00000000009AB000-memory.dmp autoit_exe behavioral2/memory/4528-65-0x0000000000840000-0x00000000009AB000-memory.dmp autoit_exe behavioral2/memory/4528-77-0x0000000000840000-0x00000000009AB000-memory.dmp autoit_exe behavioral2/memory/3012-97-0x0000000000840000-0x00000000009AB000-memory.dmp autoit_exe behavioral2/memory/3012-108-0x0000000000840000-0x00000000009AB000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4120 set thread context of 1772 4120 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 86 PID 4060 set thread context of 1092 4060 RtDCpl64.exe 98 PID 4528 set thread context of 1560 4528 RtDCpl64.exe 108 PID 3012 set thread context of 968 3012 RtDCpl64.exe 115 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2380 schtasks.exe 4672 schtasks.exe 3776 schtasks.exe 4676 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4120 wrote to memory of 2360 4120 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 82 PID 4120 wrote to memory of 2360 4120 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 82 PID 4120 wrote to memory of 2360 4120 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 82 PID 2360 wrote to memory of 3808 2360 Blasthost.exe 85 PID 2360 wrote to memory of 3808 2360 Blasthost.exe 85 PID 2360 wrote to memory of 3808 2360 Blasthost.exe 85 PID 4120 wrote to memory of 1772 4120 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 86 PID 4120 wrote to memory of 1772 4120 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 86 PID 4120 wrote to memory of 1772 4120 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 86 PID 4120 wrote to memory of 1772 4120 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 86 PID 4120 wrote to memory of 1772 4120 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 86 PID 1772 wrote to memory of 1524 1772 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 87 PID 1772 wrote to memory of 1524 1772 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 87 PID 1772 wrote to memory of 1524 1772 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 87 PID 4120 wrote to memory of 2380 4120 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 88 PID 4120 wrote to memory of 2380 4120 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 88 PID 4120 wrote to memory of 2380 4120 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 88 PID 1772 wrote to memory of 1524 1772 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 87 PID 1772 wrote to memory of 1524 1772 c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe 87 PID 4060 wrote to memory of 3916 4060 RtDCpl64.exe 97 PID 4060 wrote to memory of 3916 4060 RtDCpl64.exe 97 PID 4060 wrote to memory of 3916 4060 RtDCpl64.exe 97 PID 4060 wrote to memory of 1092 4060 RtDCpl64.exe 98 PID 4060 wrote to memory of 1092 4060 RtDCpl64.exe 98 PID 4060 wrote to memory of 1092 4060 RtDCpl64.exe 98 PID 4060 wrote to memory of 1092 4060 RtDCpl64.exe 98 PID 4060 wrote to memory of 1092 4060 RtDCpl64.exe 98 PID 1092 wrote to memory of 4812 1092 RtDCpl64.exe 99 PID 1092 wrote to memory of 4812 1092 RtDCpl64.exe 99 PID 1092 wrote to memory of 4812 1092 RtDCpl64.exe 99 PID 4060 wrote to memory of 4672 4060 RtDCpl64.exe 100 PID 4060 wrote to memory of 4672 4060 RtDCpl64.exe 100 PID 4060 wrote to memory of 4672 4060 RtDCpl64.exe 100 PID 1092 wrote to memory of 4812 1092 RtDCpl64.exe 99 PID 1092 wrote to memory of 4812 1092 RtDCpl64.exe 99 PID 4528 wrote to memory of 1652 4528 RtDCpl64.exe 107 PID 4528 wrote to memory of 1652 4528 RtDCpl64.exe 107 PID 4528 wrote to memory of 1652 4528 RtDCpl64.exe 107 PID 4528 wrote to memory of 1560 4528 RtDCpl64.exe 108 PID 4528 wrote to memory of 1560 4528 RtDCpl64.exe 108 PID 4528 wrote to memory of 1560 4528 RtDCpl64.exe 108 PID 4528 wrote to memory of 1560 4528 RtDCpl64.exe 108 PID 4528 wrote to memory of 1560 4528 RtDCpl64.exe 108 PID 1560 wrote to memory of 4124 1560 RtDCpl64.exe 109 PID 1560 wrote to memory of 4124 1560 RtDCpl64.exe 109 PID 1560 wrote to memory of 4124 1560 RtDCpl64.exe 109 PID 4528 wrote to memory of 3776 4528 RtDCpl64.exe 111 PID 4528 wrote to memory of 3776 4528 RtDCpl64.exe 111 PID 4528 wrote to memory of 3776 4528 RtDCpl64.exe 111 PID 1560 wrote to memory of 4124 1560 RtDCpl64.exe 109 PID 1560 wrote to memory of 4124 1560 RtDCpl64.exe 109 PID 3012 wrote to memory of 2304 3012 RtDCpl64.exe 114 PID 3012 wrote to memory of 2304 3012 RtDCpl64.exe 114 PID 3012 wrote to memory of 2304 3012 RtDCpl64.exe 114 PID 3012 wrote to memory of 968 3012 RtDCpl64.exe 115 PID 3012 wrote to memory of 968 3012 RtDCpl64.exe 115 PID 3012 wrote to memory of 968 3012 RtDCpl64.exe 115 PID 3012 wrote to memory of 968 3012 RtDCpl64.exe 115 PID 3012 wrote to memory of 968 3012 RtDCpl64.exe 115 PID 968 wrote to memory of 4516 968 RtDCpl64.exe 116 PID 968 wrote to memory of 4516 968 RtDCpl64.exe 116 PID 968 wrote to memory of 4516 968 RtDCpl64.exe 116 PID 3012 wrote to memory of 4676 3012 RtDCpl64.exe 118 PID 3012 wrote to memory of 4676 3012 RtDCpl64.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"3⤵
- Executes dropped EXE
PID:3808
-
-
-
C:\Users\Admin\AppData\Local\Temp\c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c694ac069083f0d533f1969a3de28530_NeikiAnalytics.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:1524
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2380
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
PID:3916
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:4812
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4672
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
PID:1652
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:4124
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:3776
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
PID:2304
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:4516
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
1.4MB
MD5e305adec766d39d60fa97407fbd72016
SHA1c3da29c472bb4738e402f70ff9ad79d65b721b17
SHA25670a053934e91bec6aaedf3643033d7a5937f4cbec3d5f7b729dfe68db2199510
SHA5122b2f527e393ea8ab52be192256dcdc6d06c5b5d63bb39e01d419245196ea54b3d3d994632275e0186474376e9ead450501c76c106ff2b56d07c6e6f67ce83bee