Analysis Overview
SHA256
a77388ef2a7aa231dfffce78d26fc23c5d8aa38f2b76750c6d04bc0b9a3486c1
Threat Level: Known bad
The file 3add9057e56fe6ed3826b37110946af0_NeikiAnalytics.exe was found to be: Known bad.
Malicious Activity Summary
Discord RAT
Executes dropped EXE
Loads dropped DLL
Unsigned PE
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
Suspicious use of FindShellTrayWindow
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-07 05:19
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-07 05:18
Reported
2024-06-07 05:22
Platform
win7-20240221-en
Max time kernel
120s
Max time network
121s
Command Line
Signatures
Discord RAT
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\RarSFX0\Audio.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3add9057e56fe6ed3826b37110946af0_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Windows\system32\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\system32\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\system32\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\system32\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\system32\WerFault.exe | N/A |
Enumerates physical storage devices
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\DllHost.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\3add9057e56fe6ed3826b37110946af0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\3add9057e56fe6ed3826b37110946af0_NeikiAnalytics.exe"
C:\Windows\SysWOW64\DllHost.exe
C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Audio.exe
"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Audio.exe"
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2524 -s 596
Network
Files
memory/2468-6-0x0000000000250000-0x0000000000251000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Audio.exe
| MD5 | fe5bee67891649b12d45121e6120238a |
| SHA1 | 0bb63a513cd1ce3cbdaf46cf025b59912bd4208a |
| SHA256 | 5d8777f9fc0aa00b19e084a66d3f959e8feb37d38933788ebdc0c8d8edf25791 |
| SHA512 | 54021dd6ffcf7e245fecd5352ca2e6aeeeb6deaf514b16d0a4e754b3606597ff354bb568ff5a751e11c4cc2bbdf88b97eed80d2f8defb5087581be0f0a847486 |
memory/2524-13-0x000000013F210000-0x000000013F228000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\RarSFX0\b1f7543a267765bd182925c5d0ffe365a81bf737.png
| MD5 | 8608b56ec181b5a2875177b2f23501a3 |
| SHA1 | 4d6fd6e84e12d1573c9d1cf6835aba63079e9b90 |
| SHA256 | 83c101af8f89b5dc9e15af7150a2c130d9d0ac3fd662f8d07fb8225da963db4a |
| SHA512 | 15f459062db3970cd20db8cf71f8e1ce7d7b0fe7a0c8f108afa025d7187197ffc02f8893652d0e2ea90fee2c7004db6a916fd7232260e0407b8ce1c5e800c85e |
memory/2468-5-0x00000000001E0000-0x00000000001E2000-memory.dmp
memory/1904-4-0x0000000000D50000-0x0000000000D52000-memory.dmp
memory/2468-20-0x0000000000250000-0x0000000000251000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-07 05:18
Reported
2024-06-07 05:22
Platform
win10v2004-20240426-en
Max time kernel
7s
Max time network
135s
Command Line
Signatures
Discord RAT
Enumerates physical storage devices
Processes
C:\Users\Admin\AppData\Local\Temp\3add9057e56fe6ed3826b37110946af0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\3add9057e56fe6ed3826b37110946af0_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Audio.exe
"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Audio.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | gateway.discord.gg | udp |
| US | 162.159.136.234:443 | gateway.discord.gg | tcp |
| US | 8.8.8.8:53 | 234.136.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 30.243.111.52.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Audio.exe
| MD5 | fe5bee67891649b12d45121e6120238a |
| SHA1 | 0bb63a513cd1ce3cbdaf46cf025b59912bd4208a |
| SHA256 | 5d8777f9fc0aa00b19e084a66d3f959e8feb37d38933788ebdc0c8d8edf25791 |
| SHA512 | 54021dd6ffcf7e245fecd5352ca2e6aeeeb6deaf514b16d0a4e754b3606597ff354bb568ff5a751e11c4cc2bbdf88b97eed80d2f8defb5087581be0f0a847486 |
memory/332-15-0x0000016D07CD0000-0x0000016D07CE8000-memory.dmp
memory/332-16-0x0000016D22400000-0x0000016D225C2000-memory.dmp
memory/332-14-0x00007FFB31EC3000-0x00007FFB31EC5000-memory.dmp
memory/332-17-0x00007FFB31EC0000-0x00007FFB32981000-memory.dmp
memory/332-18-0x0000016D22B00000-0x0000016D23028000-memory.dmp
memory/332-19-0x00007FFB31EC0000-0x00007FFB32981000-memory.dmp