Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2024 06:55

General

  • Target

    7bbc50af11ca46a958cecb2898884860_NeikiAnalytics.exe

  • Size

    765KB

  • MD5

    7bbc50af11ca46a958cecb2898884860

  • SHA1

    3acad220a592a55cf544462bfa9cda995d62145c

  • SHA256

    5579a050c744e49900d7e5d3cabbd61125a82da6bd7ff7e8e18f87fb50c2889e

  • SHA512

    d8f3b5deb8550f91caceb50c6de2d9fe7384ea2a45ded5a27535784376f185fe22213efd78692f6a0e58cd5f9bb781fdd0cb5f7b1e54e60ff9b9299e1d553687

  • SSDEEP

    12288:ChkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4a36Ph9y2d71YlRC:iRmJkcoQricOIQxiZY1ia0yY71YlE

Malware Config

Signatures

  • Detect XtremeRAT payload 13 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bbc50af11ca46a958cecb2898884860_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7bbc50af11ca46a958cecb2898884860_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\7bbc50af11ca46a958cecb2898884860_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\7bbc50af11ca46a958cecb2898884860_NeikiAnalytics.exe"
      2⤵
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe
        3⤵
        • Modifies Installed Components in the registry
        • Adds Run key to start application
        PID:2528
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:2624
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe
          3⤵
          • Suspicious use of SetWindowsHookEx
          PID:2644

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\yJt37W.GH8

      Filesize

      45KB

      MD5

      1ef026dc957131222733f734a365e078

      SHA1

      41e7d57fff3ae81d7147cc8476759d174e0445e5

      SHA256

      14b065bb0ef18f10421742800c1539c051383c820abff5793318b50bdad4e1f8

      SHA512

      9f5470514eaf806ce31cb470339082a57e9a383c4354813ce990ec645f43b6e8c90bd76c82e3571ca1be3e4adf3e356e88fa3830c8b530d751ee7a357a35b60e

    • C:\Users\Admin\AppData\Roaming\WindowsDDL\dlhost.exe

      Filesize

      765KB

      MD5

      7bbc50af11ca46a958cecb2898884860

      SHA1

      3acad220a592a55cf544462bfa9cda995d62145c

      SHA256

      5579a050c744e49900d7e5d3cabbd61125a82da6bd7ff7e8e18f87fb50c2889e

      SHA512

      d8f3b5deb8550f91caceb50c6de2d9fe7384ea2a45ded5a27535784376f185fe22213efd78692f6a0e58cd5f9bb781fdd0cb5f7b1e54e60ff9b9299e1d553687

    • memory/636-16-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/636-15-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/636-21-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/636-20-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/636-19-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/636-18-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/636-11-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/636-14-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/636-12-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/636-10-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/636-13-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/636-33-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/636-9-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/2528-28-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/2644-32-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB

    • memory/2644-35-0x0000000000C80000-0x0000000000C93000-memory.dmp

      Filesize

      76KB