Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 04:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe
Resource
win7-20240508-en
3 signatures
150 seconds
General
-
Target
a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
a244a3b64b61f329489bb5d283bda840
-
SHA1
30cdd35ea5e3eeb0502a641bef81b9db71762230
-
SHA256
0f8d2648166184bde6562f33b7e4b620313fe7a21746720d37594213fba7a604
-
SHA512
293fa4bd0a3b86552d25ca864b0e5f6abb9c43e5d64bea5b694197ba375d74edeb0c27215fd4939dbf04d9b0805d8d7d2cf80f822539bc3772be3becd9c0c417
-
SSDEEP
12288:cpKrcz9GQmikzLgiaYb0ZPzxwbwgyScsWMifc0FrdbH7+esjQajwROmBVe3Rac26:UAcz9EikngXP6NB8cyz73OH6k86
Malware Config
Extracted
Family
danabot
Botnet
5
C2
23.254.133.7:443
185.62.58.85:443
213.227.155.102:443
192.236.146.173:443
Attributes
-
embedded_hash
63B180866F08EFD2B286E54429F1D1E4
-
type
loader
Signatures
-
Blocklisted process makes network request 37 IoCs
flow pid Process 41 3168 rundll32.exe 43 3168 rundll32.exe 44 3168 rundll32.exe 45 3168 rundll32.exe 46 3168 rundll32.exe 47 3168 rundll32.exe 48 3168 rundll32.exe 49 3168 rundll32.exe 50 3168 rundll32.exe 51 3168 rundll32.exe 52 3168 rundll32.exe 53 3168 rundll32.exe 54 3168 rundll32.exe 55 3168 rundll32.exe 56 3168 rundll32.exe 57 3168 rundll32.exe 60 3168 rundll32.exe 62 3168 rundll32.exe 63 3168 rundll32.exe 64 3168 rundll32.exe 65 3168 rundll32.exe 66 3168 rundll32.exe 67 3168 rundll32.exe 68 3168 rundll32.exe 69 3168 rundll32.exe 70 3168 rundll32.exe 71 3168 rundll32.exe 72 3168 rundll32.exe 73 3168 rundll32.exe 74 3168 rundll32.exe 75 3168 rundll32.exe 77 3168 rundll32.exe 78 3168 rundll32.exe 79 3168 rundll32.exe 80 3168 rundll32.exe 81 3168 rundll32.exe 85 3168 rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2928 3564 WerFault.exe 88 4024 3564 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99 PID 3564 wrote to memory of 3168 3564 a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a244a3b64b61f329489bb5d283bda840_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:3168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 6122⤵
- Program crash
PID:2928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 6842⤵
- Program crash
PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1296,i,17325488789339133686,9539570259395798500,262144 --variations-seed-version --mojo-platform-channel-handle=4440 /prefetch:81⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3564 -ip 35641⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3564 -ip 35641⤵PID:2260