Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 23:41

General

  • Target

    0d2d6eadb2ab5909029be6944c3338a0_NeikiAnalytics.exe

  • Size

    3.9MB

  • MD5

    0d2d6eadb2ab5909029be6944c3338a0

  • SHA1

    76155e279625e09637f21ec5e2ffc6561622055a

  • SHA256

    ad037b1200d5750500d6ef196ab0da8580ff54c337a14782ed68d55ec5a27543

  • SHA512

    a94b10a01ceb0a6e26eb3231819a5e57a3ec618bb0abf9b43472cc8f103bdbb31cec98519e3e3a887df7ad559c1a16cef71f05f9c33e08bc25a6e3797c138e0f

  • SSDEEP

    24576:GIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDR:7C0bNechC0bNechC0bNec5

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 52 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d2d6eadb2ab5909029be6944c3338a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0d2d6eadb2ab5909029be6944c3338a0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\0d2d6eadb2ab5909029be6944c3338a0_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\0d2d6eadb2ab5909029be6944c3338a0_NeikiAnalytics.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2672
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2616
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1448
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            PID:2120
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Windows directory
              • Suspicious use of SetWindowsHookEx
              PID:1968
              • \??\c:\windows\system\svchost.exe
                c:\windows\system\svchost.exe
                7⤵
                • Executes dropped EXE
                PID:2728
            • C:\Windows\SysWOW64\diskperf.exe
              "C:\Windows\SysWOW64\diskperf.exe"
              6⤵
                PID:760
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2160
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2300
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:976
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:852
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1668
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1820
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              PID:2112
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:820
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              PID:2304
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1608
          • C:\Windows\SysWOW64\diskperf.exe
            "C:\Windows\SysWOW64\diskperf.exe"
            4⤵
              PID:2580
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          2⤵
            PID:2744

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

          Filesize

          3.9MB

          MD5

          0d2d6eadb2ab5909029be6944c3338a0

          SHA1

          76155e279625e09637f21ec5e2ffc6561622055a

          SHA256

          ad037b1200d5750500d6ef196ab0da8580ff54c337a14782ed68d55ec5a27543

          SHA512

          a94b10a01ceb0a6e26eb3231819a5e57a3ec618bb0abf9b43472cc8f103bdbb31cec98519e3e3a887df7ad559c1a16cef71f05f9c33e08bc25a6e3797c138e0f

        • C:\Windows\system\explorer.exe

          Filesize

          3.9MB

          MD5

          bf82f50934c59eb2273b11c4cd7c8213

          SHA1

          0a94e95ba5bab8b7a41f162cd5b09540ce0d31ef

          SHA256

          ad9a33c5ffab40a8de02ce8ce7ec70493aa38eefc0749c4e6a2743d23235ff81

          SHA512

          12a35ab48379c933f3dc105f46c131cdb164627e69c611910f564a727bdd949026938855bc58711dd419e6420062ea5125f4107df69f8cd0ec6aee79bc9b5d86

        • \Windows\system\spoolsv.exe

          Filesize

          3.9MB

          MD5

          2889fa967f6d7a4172677ad110f2c932

          SHA1

          bc4de92d54f3c57940bfbc4ad7b973efef48b1f3

          SHA256

          9a2ccc05aebcac0437955f15207bd9ac5571bb4dd6c4b356e8758d9d46d128c1

          SHA512

          e4f9447d24e86ab2991523950e90fed2ca12bcd785d13ae08613eb83fea4f8483bd40a01579dd8a39cd595383bef39abad617c7d7608d8839a00961ab2253279

        • \Windows\system\svchost.exe

          Filesize

          3.9MB

          MD5

          cf7d33289944723e2a0ec5cedf28697e

          SHA1

          0171f1abdae90c8c5f3228654e18fd63b122cc93

          SHA256

          0082bee5b1f2427aff82bd4dfa16021e95587175b1cd4a79aa8686b833ec43bf

          SHA512

          96980346873e2034364aab6f5581b5dacfef1ebb425dac24d7355b2e256fca4a289d7a583aab02cb99f1099f7270df7ef4ab7e06b3c0a97a09af056b9119b692

        • memory/976-133-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1448-131-0x0000000003290000-0x00000000033A4000-memory.dmp

          Filesize

          1.1MB

        • memory/1448-183-0x0000000003290000-0x00000000033A4000-memory.dmp

          Filesize

          1.1MB

        • memory/1448-156-0x0000000003290000-0x00000000033A4000-memory.dmp

          Filesize

          1.1MB

        • memory/1448-155-0x0000000003290000-0x00000000033A4000-memory.dmp

          Filesize

          1.1MB

        • memory/1448-99-0x0000000003290000-0x00000000033A4000-memory.dmp

          Filesize

          1.1MB

        • memory/1448-141-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1448-121-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1448-153-0x0000000003290000-0x00000000033A4000-memory.dmp

          Filesize

          1.1MB

        • memory/1448-182-0x0000000003290000-0x00000000033A4000-memory.dmp

          Filesize

          1.1MB

        • memory/1448-144-0x0000000003290000-0x00000000033A4000-memory.dmp

          Filesize

          1.1MB

        • memory/1448-154-0x0000000003290000-0x00000000033A4000-memory.dmp

          Filesize

          1.1MB

        • memory/1448-112-0x0000000003290000-0x00000000033A4000-memory.dmp

          Filesize

          1.1MB

        • memory/1448-132-0x0000000003290000-0x00000000033A4000-memory.dmp

          Filesize

          1.1MB

        • memory/1968-226-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1968-240-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1968-236-0x00000000031C0000-0x00000000032D4000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-4-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-6-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2040-2-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-37-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-3-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2040-0-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-1-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2040-31-0x00000000031D0000-0x00000000032E4000-memory.dmp

          Filesize

          1.1MB

        • memory/2112-174-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2120-130-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2120-98-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2120-100-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2120-101-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2120-225-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2160-113-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2616-56-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2616-50-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2616-88-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2616-53-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2616-52-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2616-51-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2672-49-0x0000000003390000-0x00000000034A4000-memory.dmp

          Filesize

          1.1MB

        • memory/2672-11-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2672-43-0x0000000003390000-0x00000000034A4000-memory.dmp

          Filesize

          1.1MB

        • memory/2672-55-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2672-9-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2672-23-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2672-17-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2672-13-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2744-36-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2744-29-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2744-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2744-33-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2744-25-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB