Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 01:41
Behavioral task
behavioral1
Sample
482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
482c443e7a5b61bf9a639bc72bc2ec80
-
SHA1
4466d365a0258bdf965452c668e9dc6e5661a0fe
-
SHA256
14f7dcb66842f18e9d306d19fb8ca9cf0c82661867021c26372be3e162b08d9c
-
SHA512
667cd92c0615d2c22542b6f981f1fe9bdeb06ba77c1012b7ccfb1cde4ccf24b60185b21dcfcdedf5dfe8306b6cc8cec6b7fd3e380493cfe592d27001e5fcf632
-
SSDEEP
24576:Ku6J33O0c+JY5UZ+XC0kGso6Fa720W4njUprvVcC1f2o5RRfgUWYC:8u0c++OCvkGs9Fa+rd1f26RaYC
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Signatures
-
NetWire RAT payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Blasthost.exe netwire behavioral1/memory/2380-23-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2548-44-0x0000000000400000-0x000000000042C000-memory.dmp netwire C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe netwire behavioral1/memory/2648-82-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2548-91-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2724-36-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/2724-26-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/2820-74-0x0000000000080000-0x000000000009D000-memory.dmp warzonerat behavioral1/memory/2820-65-0x0000000000080000-0x000000000009D000-memory.dmp warzonerat -
Executes dropped EXE 11 IoCs
Processes:
Blasthost.exeHost.exeRtDCpl64.exeBlasthost.exeRtDCpl64.exeRtDCpl64.exeBlasthost.exeRtDCpl64.exeRtDCpl64.exeBlasthost.exeRtDCpl64.exepid process 2380 Blasthost.exe 2548 Host.exe 2208 RtDCpl64.exe 2648 Blasthost.exe 2820 RtDCpl64.exe 2068 RtDCpl64.exe 1864 Blasthost.exe 2948 RtDCpl64.exe 1684 RtDCpl64.exe 1588 Blasthost.exe 1064 RtDCpl64.exe -
Loads dropped DLL 16 IoCs
Processes:
482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exeBlasthost.exeRtDCpl64.exeRtDCpl64.exeRtDCpl64.exepid process 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe 2380 Blasthost.exe 2380 Blasthost.exe 2208 RtDCpl64.exe 2208 RtDCpl64.exe 2208 RtDCpl64.exe 2208 RtDCpl64.exe 2068 RtDCpl64.exe 2068 RtDCpl64.exe 2068 RtDCpl64.exe 1684 RtDCpl64.exe 1684 RtDCpl64.exe 1684 RtDCpl64.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exeRtDCpl64.exeRtDCpl64.exeRtDCpl64.exedescription pid process target process PID 1948 set thread context of 2724 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe PID 2208 set thread context of 2820 2208 RtDCpl64.exe RtDCpl64.exe PID 2068 set thread context of 2948 2068 RtDCpl64.exe RtDCpl64.exe PID 1684 set thread context of 1064 1684 RtDCpl64.exe RtDCpl64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3044 schtasks.exe 2592 schtasks.exe 2740 schtasks.exe 1296 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exeBlasthost.exe482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exetaskeng.exeRtDCpl64.exeRtDCpl64.exeRtDCpl64.exeRtDCpl64.exedescription pid process target process PID 1948 wrote to memory of 2380 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe Blasthost.exe PID 1948 wrote to memory of 2380 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe Blasthost.exe PID 1948 wrote to memory of 2380 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe Blasthost.exe PID 1948 wrote to memory of 2380 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe Blasthost.exe PID 2380 wrote to memory of 2548 2380 Blasthost.exe Host.exe PID 2380 wrote to memory of 2548 2380 Blasthost.exe Host.exe PID 2380 wrote to memory of 2548 2380 Blasthost.exe Host.exe PID 2380 wrote to memory of 2548 2380 Blasthost.exe Host.exe PID 1948 wrote to memory of 2724 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe PID 1948 wrote to memory of 2724 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe PID 1948 wrote to memory of 2724 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe PID 1948 wrote to memory of 2724 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe PID 1948 wrote to memory of 2724 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe PID 1948 wrote to memory of 2724 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe PID 2724 wrote to memory of 2760 2724 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe cmd.exe PID 2724 wrote to memory of 2760 2724 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe cmd.exe PID 2724 wrote to memory of 2760 2724 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe cmd.exe PID 2724 wrote to memory of 2760 2724 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe cmd.exe PID 1948 wrote to memory of 2740 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe schtasks.exe PID 1948 wrote to memory of 2740 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe schtasks.exe PID 1948 wrote to memory of 2740 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe schtasks.exe PID 1948 wrote to memory of 2740 1948 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe schtasks.exe PID 2724 wrote to memory of 2760 2724 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe cmd.exe PID 2724 wrote to memory of 2760 2724 482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe cmd.exe PID 2936 wrote to memory of 2208 2936 taskeng.exe RtDCpl64.exe PID 2936 wrote to memory of 2208 2936 taskeng.exe RtDCpl64.exe PID 2936 wrote to memory of 2208 2936 taskeng.exe RtDCpl64.exe PID 2936 wrote to memory of 2208 2936 taskeng.exe RtDCpl64.exe PID 2208 wrote to memory of 2648 2208 RtDCpl64.exe Blasthost.exe PID 2208 wrote to memory of 2648 2208 RtDCpl64.exe Blasthost.exe PID 2208 wrote to memory of 2648 2208 RtDCpl64.exe Blasthost.exe PID 2208 wrote to memory of 2648 2208 RtDCpl64.exe Blasthost.exe PID 2208 wrote to memory of 2820 2208 RtDCpl64.exe RtDCpl64.exe PID 2208 wrote to memory of 2820 2208 RtDCpl64.exe RtDCpl64.exe PID 2208 wrote to memory of 2820 2208 RtDCpl64.exe RtDCpl64.exe PID 2208 wrote to memory of 2820 2208 RtDCpl64.exe RtDCpl64.exe PID 2208 wrote to memory of 2820 2208 RtDCpl64.exe RtDCpl64.exe PID 2208 wrote to memory of 2820 2208 RtDCpl64.exe RtDCpl64.exe PID 2820 wrote to memory of 1300 2820 RtDCpl64.exe cmd.exe PID 2820 wrote to memory of 1300 2820 RtDCpl64.exe cmd.exe PID 2820 wrote to memory of 1300 2820 RtDCpl64.exe cmd.exe PID 2820 wrote to memory of 1300 2820 RtDCpl64.exe cmd.exe PID 2208 wrote to memory of 1296 2208 RtDCpl64.exe schtasks.exe PID 2208 wrote to memory of 1296 2208 RtDCpl64.exe schtasks.exe PID 2208 wrote to memory of 1296 2208 RtDCpl64.exe schtasks.exe PID 2208 wrote to memory of 1296 2208 RtDCpl64.exe schtasks.exe PID 2820 wrote to memory of 1300 2820 RtDCpl64.exe cmd.exe PID 2820 wrote to memory of 1300 2820 RtDCpl64.exe cmd.exe PID 2936 wrote to memory of 2068 2936 taskeng.exe RtDCpl64.exe PID 2936 wrote to memory of 2068 2936 taskeng.exe RtDCpl64.exe PID 2936 wrote to memory of 2068 2936 taskeng.exe RtDCpl64.exe PID 2936 wrote to memory of 2068 2936 taskeng.exe RtDCpl64.exe PID 2068 wrote to memory of 1864 2068 RtDCpl64.exe Blasthost.exe PID 2068 wrote to memory of 1864 2068 RtDCpl64.exe Blasthost.exe PID 2068 wrote to memory of 1864 2068 RtDCpl64.exe Blasthost.exe PID 2068 wrote to memory of 1864 2068 RtDCpl64.exe Blasthost.exe PID 2068 wrote to memory of 2948 2068 RtDCpl64.exe RtDCpl64.exe PID 2068 wrote to memory of 2948 2068 RtDCpl64.exe RtDCpl64.exe PID 2068 wrote to memory of 2948 2068 RtDCpl64.exe RtDCpl64.exe PID 2068 wrote to memory of 2948 2068 RtDCpl64.exe RtDCpl64.exe PID 2068 wrote to memory of 2948 2068 RtDCpl64.exe RtDCpl64.exe PID 2068 wrote to memory of 2948 2068 RtDCpl64.exe RtDCpl64.exe PID 2948 wrote to memory of 456 2948 RtDCpl64.exe cmd.exe PID 2948 wrote to memory of 456 2948 RtDCpl64.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"3⤵
- Executes dropped EXE
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\482c443e7a5b61bf9a639bc72bc2ec80_NeikiAnalytics.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:2760
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2740
-
C:\Windows\system32\taskeng.exetaskeng.exe {98A41803-E0FB-441A-898C-0F96C0D5CF81} S-1-5-21-1298544033-3225604241-2703760938-1000:IZKCKOTP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:2648 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:1300
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:1296 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:456
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:3044 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1684 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:1588 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:3036
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
1.3MB
MD5536f74585851a508b2ae73027abb74a9
SHA17d8579ce21244b02cf586c9f6b80b0aa15090456
SHA25672f46a8caced17f69dbb1ba17d673748d041fdbf407a283ecc44891b792ce643
SHA51247a40b801d1d8c20fbaf0cd79b43ba3197de1fad369aa7302b58a1f38647df4b3a6d18eb1706d7f05e5060e0e740ef37e26696dc7f93ff5923c1a358060b8c1d