Analysis Overview
SHA256
860fcff2ec1ba07bff7832f5ff0176b0e4cd99cbf42f1945d22e1450b8897f26
Threat Level: Known bad
The file 1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe was found to be: Known bad.
Malicious Activity Summary
Azorult
UPX packed file
Deletes itself
Checks computer location settings
AutoIT Executable
Suspicious use of SetThreadContext
Unsigned PE
Enumerates physical storage devices
Suspicious use of SendNotifyMessage
Suspicious use of FindShellTrayWindow
Delays execution with timeout.exe
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-16 19:36
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
AutoIT Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-16 19:36
Reported
2024-05-16 19:39
Platform
win7-20240221-en
Max time kernel
117s
Max time network
118s
Command Line
Signatures
Azorult
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\cmd.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
AutoIT Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2180 set thread context of 2996 | N/A | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe |
Enumerates physical storage devices
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | N/A |
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c TimeOut 1 & Del /F "C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe"
C:\Windows\SysWOW64\timeout.exe
TimeOut 1
Network
| Country | Destination | Domain | Proto |
| IR | 185.79.156.23:80 | tcp | |
| IR | 185.79.156.23:80 | tcp | |
| IR | 185.79.156.23:80 | tcp |
Files
memory/2180-0-0x0000000000C10000-0x0000000000DA4000-memory.dmp
memory/2180-3-0x00000000000B0000-0x00000000000B1000-memory.dmp
memory/2996-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2996-14-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2996-5-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2996-4-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2996-24-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2996-20-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2996-18-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2996-17-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2996-22-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2180-26-0x0000000000C10000-0x0000000000DA4000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-16 19:36
Reported
2024-05-16 19:39
Platform
win10v2004-20240508-en
Max time kernel
136s
Max time network
99s
Command Line
Signatures
Azorult
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
AutoIT Executable
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1288 set thread context of 620 | N/A | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe |
Enumerates physical storage devices
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | N/A |
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe"
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c TimeOut 1 & Del /F "C:\Users\Admin\AppData\Local\Temp\1ebe565a53c03f4bdc495d6941df54d0_NeikiAnalytics.exe"
C:\Windows\SysWOW64\timeout.exe
TimeOut 1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| IR | 185.79.156.23:80 | tcp | |
| US | 8.8.8.8:53 | 80.90.14.23.in-addr.arpa | udp |
| NL | 23.62.61.137:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 16.53.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 137.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| IR | 185.79.156.23:80 | tcp | |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
Files
memory/1288-0-0x0000000000160000-0x00000000002F4000-memory.dmp
memory/1288-3-0x0000000001B40000-0x0000000001B41000-memory.dmp
memory/620-4-0x0000000000400000-0x0000000000420000-memory.dmp
memory/620-22-0x0000000000400000-0x0000000000420000-memory.dmp
memory/620-14-0x0000000000400000-0x0000000000420000-memory.dmp
memory/620-20-0x0000000000400000-0x0000000000420000-memory.dmp
memory/620-18-0x0000000000400000-0x0000000000420000-memory.dmp
memory/620-16-0x0000000000400000-0x0000000000420000-memory.dmp
memory/620-12-0x0000000000400000-0x0000000000420000-memory.dmp
memory/1288-23-0x0000000000160000-0x00000000002F4000-memory.dmp