Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 06:49
Behavioral task
behavioral1
Sample
b55e18751720370b951e4d7112578350_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b55e18751720370b951e4d7112578350_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
b55e18751720370b951e4d7112578350_NeikiAnalytics.exe
-
Size
954KB
-
MD5
b55e18751720370b951e4d7112578350
-
SHA1
5bd4a5233fcc8e5817b9dc22ae9c163d5b943acd
-
SHA256
9cc3a59e4966b7af97d6de0a7bb50596f7fff08cd21236a752d632697c714982
-
SHA512
26acf813a09b059740b4e8a8178bb7748f38592623e5c49cfab5e46f522411ffe35ca693159ca852b13473644d09c8332ef41d80249c3752bf4ee63dfe04cdd3
-
SSDEEP
24576:rMjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsx8:mJ5gEKNikf3hBfUiWx8
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\budha.exe family_ammyyadmin -
Executes dropped EXE 1 IoCs
Processes:
budha.exepid process 1284 budha.exe -
Loads dropped DLL 1 IoCs
Processes:
b55e18751720370b951e4d7112578350_NeikiAnalytics.exepid process 2104 b55e18751720370b951e4d7112578350_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral1/memory/2104-0-0x0000000000400000-0x000000000040F000-memory.dmp upx \Users\Admin\AppData\Local\Temp\budha.exe upx behavioral1/memory/1284-12-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2104-11-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1284-16-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b55e18751720370b951e4d7112578350_NeikiAnalytics.exedescription pid process target process PID 2104 wrote to memory of 1284 2104 b55e18751720370b951e4d7112578350_NeikiAnalytics.exe budha.exe PID 2104 wrote to memory of 1284 2104 b55e18751720370b951e4d7112578350_NeikiAnalytics.exe budha.exe PID 2104 wrote to memory of 1284 2104 b55e18751720370b951e4d7112578350_NeikiAnalytics.exe budha.exe PID 2104 wrote to memory of 1284 2104 b55e18751720370b951e4d7112578350_NeikiAnalytics.exe budha.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b55e18751720370b951e4d7112578350_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b55e18751720370b951e4d7112578350_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:1284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
954KB
MD5fc3ad52ce32f490b69d581796ae7af0a
SHA129a1ff655f03a8a0204c9f3e12e65c07b6e1b384
SHA2569eb7505617c85a2c34eb41dee832dbde184618b5fb08f8f1802f03d907c353b3
SHA512b36c81955fdef2d8a0a107ed6699a9ec4260f940e418de738ce57c7af9ffa1f12cfaa4fa3b8045ec1532c75a2b045c70cb109697184712753fa76f49ac6db9e7