Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 02:37
Behavioral task
behavioral1
Sample
9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
General
-
Target
9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exe
-
Size
5.5MB
-
MD5
9236138b3e06a43e09af78ebe2471930
-
SHA1
f8c11efa85dfdd424fb7f906ec5795ac07cfd8a2
-
SHA256
73cd0a128abf1c8d63ec550c4eef392bef06afc13867cd08fd1150157f2022af
-
SHA512
54d6f5d64bbe183188603c2faca3778b6abfd17573d861774e51bb56464773de5465aed26e947e4fa3360a76348ba5ea3703da5b146917700a9c4ece3ed79da4
-
SSDEEP
98304:GAsBbQ2H/oEMjghbO76uAqrngBNXsH7zMdDwPgQcM3qn8V/cwduNJKf+tLNTVGa:wRf/JTNXsH7z0DwPgdvwduGf67Ga
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
94.232.249.90:8848
Mutex
kalhf_nkjadhfjk333jvn
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SmokerLtd = "C:\\Users\\Admin\\Documents\\TuktukUpdater\\updater.exe" 9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exedescription pid process target process PID 2480 set thread context of 4044 2480 9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exe csc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4056 2480 WerFault.exe 9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
csc.exedescription pid process Token: SeDebugPrivilege 4044 csc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exedescription pid process target process PID 2480 wrote to memory of 4044 2480 9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exe csc.exe PID 2480 wrote to memory of 4044 2480 9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exe csc.exe PID 2480 wrote to memory of 4044 2480 9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exe csc.exe PID 2480 wrote to memory of 4044 2480 9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exe csc.exe PID 2480 wrote to memory of 4044 2480 9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exe csc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9236138b3e06a43e09af78ebe2471930_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 1402⤵
- Program crash
PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2480 -ip 24801⤵PID:4272