Malware Analysis Report

2024-09-11 09:22

Sample ID 240607-fzsqtabc73
Target 3add9057e56fe6ed3826b37110946af0_NeikiAnalytics.exe
SHA256 a77388ef2a7aa231dfffce78d26fc23c5d8aa38f2b76750c6d04bc0b9a3486c1
Tags
discordrat persistence rat rootkit stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a77388ef2a7aa231dfffce78d26fc23c5d8aa38f2b76750c6d04bc0b9a3486c1

Threat Level: Known bad

The file 3add9057e56fe6ed3826b37110946af0_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

discordrat persistence rat rootkit stealer

Discord RAT

Executes dropped EXE

Loads dropped DLL

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of FindShellTrayWindow

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-07 05:19

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-07 05:18

Reported

2024-06-07 05:22

Platform

win7-20240221-en

Max time kernel

120s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3add9057e56fe6ed3826b37110946af0_NeikiAnalytics.exe"

Signatures

Discord RAT

stealer rootkit rat persistence discordrat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\Audio.exe N/A

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\DllHost.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3add9057e56fe6ed3826b37110946af0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\3add9057e56fe6ed3826b37110946af0_NeikiAnalytics.exe"

C:\Windows\SysWOW64\DllHost.exe

C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}

C:\Users\Admin\AppData\Local\Temp\RarSFX0\Audio.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Audio.exe"

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2524 -s 596

Network

N/A

Files

memory/2468-6-0x0000000000250000-0x0000000000251000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\Audio.exe

MD5 fe5bee67891649b12d45121e6120238a
SHA1 0bb63a513cd1ce3cbdaf46cf025b59912bd4208a
SHA256 5d8777f9fc0aa00b19e084a66d3f959e8feb37d38933788ebdc0c8d8edf25791
SHA512 54021dd6ffcf7e245fecd5352ca2e6aeeeb6deaf514b16d0a4e754b3606597ff354bb568ff5a751e11c4cc2bbdf88b97eed80d2f8defb5087581be0f0a847486

memory/2524-13-0x000000013F210000-0x000000013F228000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\RarSFX0\b1f7543a267765bd182925c5d0ffe365a81bf737.png

MD5 8608b56ec181b5a2875177b2f23501a3
SHA1 4d6fd6e84e12d1573c9d1cf6835aba63079e9b90
SHA256 83c101af8f89b5dc9e15af7150a2c130d9d0ac3fd662f8d07fb8225da963db4a
SHA512 15f459062db3970cd20db8cf71f8e1ce7d7b0fe7a0c8f108afa025d7187197ffc02f8893652d0e2ea90fee2c7004db6a916fd7232260e0407b8ce1c5e800c85e

memory/2468-5-0x00000000001E0000-0x00000000001E2000-memory.dmp

memory/1904-4-0x0000000000D50000-0x0000000000D52000-memory.dmp

memory/2468-20-0x0000000000250000-0x0000000000251000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-07 05:18

Reported

2024-06-07 05:22

Platform

win10v2004-20240426-en

Max time kernel

7s

Max time network

135s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3add9057e56fe6ed3826b37110946af0_NeikiAnalytics.exe"

Signatures

Discord RAT

stealer rootkit rat persistence discordrat

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\3add9057e56fe6ed3826b37110946af0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\3add9057e56fe6ed3826b37110946af0_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\Audio.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Audio.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 gateway.discord.gg udp
US 162.159.136.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 234.136.159.162.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\RarSFX0\Audio.exe

MD5 fe5bee67891649b12d45121e6120238a
SHA1 0bb63a513cd1ce3cbdaf46cf025b59912bd4208a
SHA256 5d8777f9fc0aa00b19e084a66d3f959e8feb37d38933788ebdc0c8d8edf25791
SHA512 54021dd6ffcf7e245fecd5352ca2e6aeeeb6deaf514b16d0a4e754b3606597ff354bb568ff5a751e11c4cc2bbdf88b97eed80d2f8defb5087581be0f0a847486

memory/332-15-0x0000016D07CD0000-0x0000016D07CE8000-memory.dmp

memory/332-16-0x0000016D22400000-0x0000016D225C2000-memory.dmp

memory/332-14-0x00007FFB31EC3000-0x00007FFB31EC5000-memory.dmp

memory/332-17-0x00007FFB31EC0000-0x00007FFB32981000-memory.dmp

memory/332-18-0x0000016D22B00000-0x0000016D23028000-memory.dmp

memory/332-19-0x00007FFB31EC0000-0x00007FFB32981000-memory.dmp