Analysis Overview
SHA256
3bbae8b9a6725590f7506c526726db3de42cd1ea0c5c7b1256a20345279c416d
Threat Level: Known bad
The file 3bbae8b9a6725590f7506c526726db3de42cd1ea0c5c7b1256a20345279c416d_NeikiAnalytics.exe was found to be: Known bad.
Malicious Activity Summary
AsyncRat
Async RAT payload
Program crash
Unsigned PE
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-06-20 05:53
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-20 05:53
Reported
2024-06-20 05:56
Platform
win10v2004-20240611-en
Max time kernel
140s
Max time network
124s
Command Line
Signatures
AsyncRat
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\3bbae8b9a6725590f7506c526726db3de42cd1ea0c5c7b1256a20345279c416d_NeikiAnalytics.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\3bbae8b9a6725590f7506c526726db3de42cd1ea0c5c7b1256a20345279c416d_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\3bbae8b9a6725590f7506c526726db3de42cd1ea0c5c7b1256a20345279c416d_NeikiAnalytics.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 708 -ip 708
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 708 -s 928
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 17.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
Files
memory/708-0-0x0000000074A1E000-0x0000000074A1F000-memory.dmp
memory/708-1-0x0000000000420000-0x000000000043A000-memory.dmp
memory/708-2-0x0000000004D30000-0x0000000004D40000-memory.dmp
memory/708-3-0x0000000004850000-0x0000000004862000-memory.dmp
memory/708-4-0x0000000074A10000-0x00000000751C0000-memory.dmp
memory/708-5-0x0000000074A10000-0x00000000751C0000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-20 05:53
Reported
2024-06-20 05:56
Platform
win7-20231129-en
Max time kernel
117s
Max time network
118s
Command Line
Signatures
AsyncRat
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\3bbae8b9a6725590f7506c526726db3de42cd1ea0c5c7b1256a20345279c416d_NeikiAnalytics.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2268 wrote to memory of 1712 | N/A | C:\Users\Admin\AppData\Local\Temp\3bbae8b9a6725590f7506c526726db3de42cd1ea0c5c7b1256a20345279c416d_NeikiAnalytics.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 2268 wrote to memory of 1712 | N/A | C:\Users\Admin\AppData\Local\Temp\3bbae8b9a6725590f7506c526726db3de42cd1ea0c5c7b1256a20345279c416d_NeikiAnalytics.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 2268 wrote to memory of 1712 | N/A | C:\Users\Admin\AppData\Local\Temp\3bbae8b9a6725590f7506c526726db3de42cd1ea0c5c7b1256a20345279c416d_NeikiAnalytics.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 2268 wrote to memory of 1712 | N/A | C:\Users\Admin\AppData\Local\Temp\3bbae8b9a6725590f7506c526726db3de42cd1ea0c5c7b1256a20345279c416d_NeikiAnalytics.exe | C:\Windows\SysWOW64\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\3bbae8b9a6725590f7506c526726db3de42cd1ea0c5c7b1256a20345279c416d_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\3bbae8b9a6725590f7506c526726db3de42cd1ea0c5c7b1256a20345279c416d_NeikiAnalytics.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 636
Network
Files
memory/2268-0-0x0000000073FDE000-0x0000000073FDF000-memory.dmp
memory/2268-1-0x00000000011B0000-0x00000000011CA000-memory.dmp
memory/2268-2-0x0000000000410000-0x0000000000420000-memory.dmp
memory/2268-3-0x0000000000460000-0x0000000000472000-memory.dmp
memory/2268-4-0x0000000073FD0000-0x00000000746BE000-memory.dmp
memory/2268-5-0x0000000073FDE000-0x0000000073FDF000-memory.dmp