Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 08:24
Behavioral task
behavioral1
Sample
b58c68fc1163aa112f05cfe819426320_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b58c68fc1163aa112f05cfe819426320_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
b58c68fc1163aa112f05cfe819426320_NeikiAnalytics.exe
-
Size
98KB
-
MD5
b58c68fc1163aa112f05cfe819426320
-
SHA1
30f4a83c7d34748551f05357e29d70575ed07767
-
SHA256
fadeed88912918b8ee75540162706beed835419ed7b6b3103cb8ac84790225c4
-
SHA512
543a9cd1f7dca6d81348ca1a6d0cdabcf671f28fb5173d54c5e20906dabc6bff38b72edc5413c818a1c3e92784f1428ebae04aee094985cb8a315de99a4c1a75
-
SSDEEP
1536:7CsqDw2ost58PNkDtPMpcJBO9YcvF11jVEya:mpjZ+cJBSYkdjVEx
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b58c68fc1163aa112f05cfe819426320_NeikiAnalytics.exedescription pid process target process PID 1108 wrote to memory of 2196 1108 b58c68fc1163aa112f05cfe819426320_NeikiAnalytics.exe cmd.exe PID 1108 wrote to memory of 2196 1108 b58c68fc1163aa112f05cfe819426320_NeikiAnalytics.exe cmd.exe PID 1108 wrote to memory of 2196 1108 b58c68fc1163aa112f05cfe819426320_NeikiAnalytics.exe cmd.exe PID 1108 wrote to memory of 2196 1108 b58c68fc1163aa112f05cfe819426320_NeikiAnalytics.exe cmd.exe PID 1108 wrote to memory of 2196 1108 b58c68fc1163aa112f05cfe819426320_NeikiAnalytics.exe cmd.exe PID 1108 wrote to memory of 2196 1108 b58c68fc1163aa112f05cfe819426320_NeikiAnalytics.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b58c68fc1163aa112f05cfe819426320_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b58c68fc1163aa112f05cfe819426320_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2196