Analysis

  • max time kernel
    146s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 09:59

General

  • Target

    31b3f063f2e15008198227ea53faf480daefb6b3615bde6d028ddc0ea66fdb88_NeikiAnalytics.exe

  • Size

    1.7MB

  • MD5

    7a77191f602fe0850ab88654a388e079

  • SHA1

    350122f818f7a365e898d610d24459b793e4efc3

  • SHA256

    31b3f063f2e15008198227ea53faf480daefb6b3615bde6d028ddc0ea66fdb88

  • SHA512

    1c13149465cda1aab1d76600c0e43b5a98456eceeac98ae081df52377498e97b3c0acb0d82b9218342834804ca6e8f1dcf970b1c884df4fdbde8f00f70b197b5

  • SSDEEP

    49152:eydtOKqxZqwbXYdo1VtziCFAzazWlkItp:eyntwTjtRYtp

Malware Config

Extracted

Family

amadey

Version

4.20

Botnet

18befc

C2

http://5.42.96.141

Attributes
  • install_dir

    908f070dff

  • install_file

    explorku.exe

  • strings_key

    b25a9385246248a95c600f9a061438e1

  • url_paths

    /go34ko8/index.php

rc4.plain

Extracted

Family

amadey

Version

4.20

Botnet

c767c0

C2

http://5.42.96.7

Attributes
  • install_dir

    7af68cdb52

  • install_file

    axplons.exe

  • strings_key

    e2ce58e78f631ed97d01fe7b70e85d5e

  • url_paths

    /zamo7h/index.php

rc4.plain

Extracted

Family

risepro

C2

147.45.47.126:58709

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 33 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31b3f063f2e15008198227ea53faf480daefb6b3615bde6d028ddc0ea66fdb88_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\31b3f063f2e15008198227ea53faf480daefb6b3615bde6d028ddc0ea66fdb88_NeikiAnalytics.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe
      "C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of WriteProcessMemory
      PID:4892
      • C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe
        "C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"
        3⤵
          PID:4572
        • C:\Users\Admin\AppData\Local\Temp\1000013001\amers.exe
          "C:\Users\Admin\AppData\Local\Temp\1000013001\amers.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:5084
          • C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
            "C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:3644
        • C:\Users\Admin\AppData\Local\Temp\1000014001\ad24307970.exe
          "C:\Users\Admin\AppData\Local\Temp\1000014001\ad24307970.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          PID:4944
        • C:\Users\Admin\1000017002\69030ed4bd.exe
          "C:\Users\Admin\1000017002\69030ed4bd.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1000013001\amers.exe

      Filesize

      1.8MB

      MD5

      b882bfd4196be7fad247827e0b6820be

      SHA1

      33fd213c8c249311eb657c52d2772f2940c98186

      SHA256

      b4884ea6c3f598ffb1638404b1072967a0ecf82b32f6023ed664f77a00f30698

      SHA512

      e67544ec03a3ac5c711fa5519d198c8df6e9cfb499204e3fa0e632d23ea78d04550e5f04c52541e9fe25f456cc6e5ffd7fef890d5acdac20e4d36179ec0ed647

    • C:\Users\Admin\AppData\Local\Temp\1000014001\ad24307970.exe

      Filesize

      2.2MB

      MD5

      66ccbed41993a7620e5729ab00df0102

      SHA1

      b4b3623f2548303a18b9f11c451efd4ac9ff80bd

      SHA256

      fbfa056492b426ab6190ba84e23308421a4ab957acc08f256bb8c333201d3d01

      SHA512

      22758452407ada39d7724ad26f21cb15c0a3cebc2e579078bc9de896632f81175c30db2c9459c476386ae5b5a8b38c6fcef8010c19fd6bee2d17ce63084c725c

    • C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe

      Filesize

      1.7MB

      MD5

      7a77191f602fe0850ab88654a388e079

      SHA1

      350122f818f7a365e898d610d24459b793e4efc3

      SHA256

      31b3f063f2e15008198227ea53faf480daefb6b3615bde6d028ddc0ea66fdb88

      SHA512

      1c13149465cda1aab1d76600c0e43b5a98456eceeac98ae081df52377498e97b3c0acb0d82b9218342834804ca6e8f1dcf970b1c884df4fdbde8f00f70b197b5

    • memory/760-107-0x0000000000E90000-0x0000000001351000-memory.dmp

      Filesize

      4.8MB

    • memory/760-108-0x0000000000E90000-0x0000000001351000-memory.dmp

      Filesize

      4.8MB

    • memory/2916-5-0x0000000000230000-0x0000000000772000-memory.dmp

      Filesize

      5.3MB

    • memory/2916-6-0x0000000000230000-0x0000000000772000-memory.dmp

      Filesize

      5.3MB

    • memory/2916-7-0x0000000000230000-0x0000000000772000-memory.dmp

      Filesize

      5.3MB

    • memory/2916-8-0x0000000000230000-0x0000000000772000-memory.dmp

      Filesize

      5.3MB

    • memory/2916-2-0x0000000000230000-0x0000000000772000-memory.dmp

      Filesize

      5.3MB

    • memory/2916-21-0x0000000000230000-0x0000000000772000-memory.dmp

      Filesize

      5.3MB

    • memory/2916-4-0x0000000000230000-0x0000000000772000-memory.dmp

      Filesize

      5.3MB

    • memory/2916-3-0x0000000000230000-0x0000000000772000-memory.dmp

      Filesize

      5.3MB

    • memory/2916-1-0x0000000000230000-0x0000000000772000-memory.dmp

      Filesize

      5.3MB

    • memory/2916-0-0x0000000000230000-0x0000000000772000-memory.dmp

      Filesize

      5.3MB

    • memory/3644-137-0x0000000000B60000-0x0000000001021000-memory.dmp

      Filesize

      4.8MB

    • memory/3644-131-0x0000000000B60000-0x0000000001021000-memory.dmp

      Filesize

      4.8MB

    • memory/3644-128-0x0000000000B60000-0x0000000001021000-memory.dmp

      Filesize

      4.8MB

    • memory/3644-125-0x0000000000B60000-0x0000000001021000-memory.dmp

      Filesize

      4.8MB

    • memory/3644-122-0x0000000000B60000-0x0000000001021000-memory.dmp

      Filesize

      4.8MB

    • memory/3644-134-0x0000000000B60000-0x0000000001021000-memory.dmp

      Filesize

      4.8MB

    • memory/3644-119-0x0000000000B60000-0x0000000001021000-memory.dmp

      Filesize

      4.8MB

    • memory/3644-116-0x0000000000B60000-0x0000000001021000-memory.dmp

      Filesize

      4.8MB

    • memory/3644-113-0x0000000000B60000-0x0000000001021000-memory.dmp

      Filesize

      4.8MB

    • memory/3644-110-0x0000000000B60000-0x0000000001021000-memory.dmp

      Filesize

      4.8MB

    • memory/3644-64-0x0000000000B60000-0x0000000001021000-memory.dmp

      Filesize

      4.8MB

    • memory/3644-140-0x0000000000B60000-0x0000000001021000-memory.dmp

      Filesize

      4.8MB

    • memory/3644-143-0x0000000000B60000-0x0000000001021000-memory.dmp

      Filesize

      4.8MB

    • memory/4892-29-0x0000000000090000-0x00000000005D2000-memory.dmp

      Filesize

      5.3MB

    • memory/4892-49-0x0000000000090000-0x00000000005D2000-memory.dmp

      Filesize

      5.3MB

    • memory/4892-24-0x0000000000090000-0x00000000005D2000-memory.dmp

      Filesize

      5.3MB

    • memory/4892-25-0x0000000000090000-0x00000000005D2000-memory.dmp

      Filesize

      5.3MB

    • memory/4892-30-0x0000000000090000-0x00000000005D2000-memory.dmp

      Filesize

      5.3MB

    • memory/4892-28-0x0000000000090000-0x00000000005D2000-memory.dmp

      Filesize

      5.3MB

    • memory/4892-26-0x0000000000090000-0x00000000005D2000-memory.dmp

      Filesize

      5.3MB

    • memory/4892-23-0x0000000000090000-0x00000000005D2000-memory.dmp

      Filesize

      5.3MB

    • memory/4892-27-0x0000000000090000-0x00000000005D2000-memory.dmp

      Filesize

      5.3MB

    • memory/4892-22-0x0000000000090000-0x00000000005D2000-memory.dmp

      Filesize

      5.3MB

    • memory/4892-109-0x0000000000090000-0x00000000005D2000-memory.dmp

      Filesize

      5.3MB

    • memory/4944-89-0x00000000007D0000-0x0000000000E5C000-memory.dmp

      Filesize

      6.5MB

    • memory/4944-111-0x00000000007D0000-0x0000000000E5C000-memory.dmp

      Filesize

      6.5MB

    • memory/4944-83-0x00000000007D0000-0x0000000000E5C000-memory.dmp

      Filesize

      6.5MB

    • memory/4944-85-0x00000000007D0000-0x0000000000E5C000-memory.dmp

      Filesize

      6.5MB

    • memory/4944-91-0x00000000007D0000-0x0000000000E5C000-memory.dmp

      Filesize

      6.5MB

    • memory/4944-87-0x00000000007D0000-0x0000000000E5C000-memory.dmp

      Filesize

      6.5MB

    • memory/4944-90-0x00000000007D0000-0x0000000000E5C000-memory.dmp

      Filesize

      6.5MB

    • memory/4944-88-0x00000000007D0000-0x0000000000E5C000-memory.dmp

      Filesize

      6.5MB

    • memory/4944-84-0x00000000007D0000-0x0000000000E5C000-memory.dmp

      Filesize

      6.5MB

    • memory/4944-86-0x00000000007D0000-0x0000000000E5C000-memory.dmp

      Filesize

      6.5MB

    • memory/5084-50-0x00000000777C4000-0x00000000777C6000-memory.dmp

      Filesize

      8KB

    • memory/5084-48-0x0000000000480000-0x0000000000941000-memory.dmp

      Filesize

      4.8MB

    • memory/5084-63-0x0000000000480000-0x0000000000941000-memory.dmp

      Filesize

      4.8MB