Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 23:07
Behavioral task
behavioral1
Sample
c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe
-
Size
348KB
-
MD5
c15c7a39a36c7934a34a21bf0fb61d60
-
SHA1
b2a852d1ab8d615a2148a0966ac431e7979ded24
-
SHA256
7074ba04d9224b5b634c83510e09c9a3824eca919984186d897b62a47cbab32e
-
SHA512
426c17406e2c0c39f44d6873a6e7f04b9023d8b6043e8709f44e2fbbffba616f0b54518881218796be5f61a1347494d4ac39706d3187142289aa08eec53ac362
-
SSDEEP
6144:wGL3HRsM+OFZccgudb/bb1ORKSeB5L44BXFOx:vVP+MeEbARKSe/4AXkx
Malware Config
Extracted
quasar
1.3.0.0
rocket
pelopeloso-28110.portmap.host:28110
QSR_MUTEX_lGskyXvo8eJwQIPZAp
-
encryption_key
pjvltvhGpK5sPBq1UEXa
-
install_name
agentdatahelper.exe
-
log_directory
Logs
-
reconnect_delay
1
-
startup_key
Kernel32
-
subdirectory
WinDataCenter
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3700-1-0x0000000000DB0000-0x0000000000E0E000-memory.dmp family_quasar C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe family_quasar -
Executes dropped EXE 1 IoCs
Processes:
agentdatahelper.exepid process 5100 agentdatahelper.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 ip-api.com -
Drops file in System32 directory 4 IoCs
Processes:
c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exeagentdatahelper.exedescription ioc process File opened for modification C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe agentdatahelper.exe File opened for modification C:\Windows\SysWOW64\WinDataCenter agentdatahelper.exe File created C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 332 schtasks.exe 696 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exeagentdatahelper.exedescription pid process Token: SeDebugPrivilege 3700 c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe Token: SeDebugPrivilege 5100 agentdatahelper.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
agentdatahelper.exepid process 5100 agentdatahelper.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exeagentdatahelper.exedescription pid process target process PID 3700 wrote to memory of 332 3700 c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe schtasks.exe PID 3700 wrote to memory of 332 3700 c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe schtasks.exe PID 3700 wrote to memory of 332 3700 c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe schtasks.exe PID 3700 wrote to memory of 5100 3700 c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe agentdatahelper.exe PID 3700 wrote to memory of 5100 3700 c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe agentdatahelper.exe PID 3700 wrote to memory of 5100 3700 c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe agentdatahelper.exe PID 5100 wrote to memory of 696 5100 agentdatahelper.exe schtasks.exe PID 5100 wrote to memory of 696 5100 agentdatahelper.exe schtasks.exe PID 5100 wrote to memory of 696 5100 agentdatahelper.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Kernel32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe"C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Kernel32" /sc ONLOGON /tr "C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\WinDataCenter\agentdatahelper.exeFilesize
348KB
MD5c15c7a39a36c7934a34a21bf0fb61d60
SHA1b2a852d1ab8d615a2148a0966ac431e7979ded24
SHA2567074ba04d9224b5b634c83510e09c9a3824eca919984186d897b62a47cbab32e
SHA512426c17406e2c0c39f44d6873a6e7f04b9023d8b6043e8709f44e2fbbffba616f0b54518881218796be5f61a1347494d4ac39706d3187142289aa08eec53ac362
-
memory/3700-6-0x00000000064F0000-0x0000000006502000-memory.dmpFilesize
72KB
-
memory/3700-1-0x0000000000DB0000-0x0000000000E0E000-memory.dmpFilesize
376KB
-
memory/3700-3-0x0000000005810000-0x00000000058A2000-memory.dmpFilesize
584KB
-
memory/3700-4-0x0000000074E40000-0x00000000755F0000-memory.dmpFilesize
7.7MB
-
memory/3700-5-0x00000000058B0000-0x0000000005916000-memory.dmpFilesize
408KB
-
memory/3700-0-0x0000000074E4E000-0x0000000074E4F000-memory.dmpFilesize
4KB
-
memory/3700-7-0x0000000006A30000-0x0000000006A6C000-memory.dmpFilesize
240KB
-
memory/3700-2-0x0000000005CA0000-0x0000000006244000-memory.dmpFilesize
5.6MB
-
memory/3700-14-0x0000000074E40000-0x00000000755F0000-memory.dmpFilesize
7.7MB
-
memory/5100-15-0x0000000074E40000-0x00000000755F0000-memory.dmpFilesize
7.7MB
-
memory/5100-16-0x0000000074E40000-0x00000000755F0000-memory.dmpFilesize
7.7MB
-
memory/5100-18-0x0000000006310000-0x000000000631A000-memory.dmpFilesize
40KB
-
memory/5100-19-0x0000000074E40000-0x00000000755F0000-memory.dmpFilesize
7.7MB
-
memory/5100-20-0x0000000074E40000-0x00000000755F0000-memory.dmpFilesize
7.7MB