Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 04:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
3 signatures
150 seconds
General
-
Target
a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
a244a3b64b61f329489bb5d283bda840
-
SHA1
30cdd35ea5e3eeb0502a641bef81b9db71762230
-
SHA256
0f8d2648166184bde6562f33b7e4b620313fe7a21746720d37594213fba7a604
-
SHA512
293fa4bd0a3b86552d25ca864b0e5f6abb9c43e5d64bea5b694197ba375d74edeb0c27215fd4939dbf04d9b0805d8d7d2cf80f822539bc3772be3becd9c0c417
-
SSDEEP
12288:cpKrcz9GQmikzLgiaYb0ZPzxwbwgyScsWMifc0FrdbH7+esjQajwROmBVe3Rac26:UAcz9EikngXP6NB8cyz73OH6k86
Malware Config
Extracted
Family
danabot
Botnet
5
C2
23.254.133.7:443
185.62.58.85:443
213.227.155.102:443
192.236.146.173:443
Attributes
-
embedded_hash
63B180866F08EFD2B286E54429F1D1E4
-
type
loader
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 3 2520 rundll32.exe 6 2520 rundll32.exe 8 2520 rundll32.exe 9 2520 rundll32.exe 10 2520 rundll32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30 PID 2236 wrote to memory of 2520 2236 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:2520
-