Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 03:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe
-
Size
896KB
-
MD5
65082ee4bb13d81f6011e9ebfbfd0e90
-
SHA1
42af2f42d9b349438e20998f261e5bb92988fd7b
-
SHA256
8f5dc039858f2425120283f32b08a688219ec1fed56dca56ef072807d4b41380
-
SHA512
44a63aea9d0ee1b723d821aa77e5a699a4dcf4b548b799375dccea3f5b468a35e7904e4d2be976c69a295c5f76ac5f030f8f92db3a32aeca04611ce49c54b7e4
-
SSDEEP
12288:tySs6XN2uVSIuzIcCpTRJzkVwsvoXzMNnYW25+Hsp/MsDNFtH:ZxsXYW28Hfet
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:7771
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exedescription pid process target process PID 1584 set thread context of 2780 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exepid process 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exedescription pid process target process PID 1584 wrote to memory of 2780 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe InstallUtil.exe PID 1584 wrote to memory of 2780 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe InstallUtil.exe PID 1584 wrote to memory of 2780 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe InstallUtil.exe PID 1584 wrote to memory of 2780 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe InstallUtil.exe PID 1584 wrote to memory of 2780 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe InstallUtil.exe PID 1584 wrote to memory of 2780 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe InstallUtil.exe PID 1584 wrote to memory of 2780 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe InstallUtil.exe PID 1584 wrote to memory of 2780 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe InstallUtil.exe PID 1584 wrote to memory of 2780 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe InstallUtil.exe PID 1584 wrote to memory of 2780 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe InstallUtil.exe PID 1584 wrote to memory of 2780 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe InstallUtil.exe PID 1584 wrote to memory of 2780 1584 65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\65082ee4bb13d81f6011e9ebfbfd0e90_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:2780
-