Malware Analysis Report

2024-09-11 10:55

Sample ID 240621-my4j9awhjg
Target 646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe
SHA256 646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc
Tags
amadey b2c2c1 trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc

Threat Level: Known bad

The file 646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

amadey b2c2c1 trojan

Amadey

Executes dropped EXE

Loads dropped DLL

Checks computer location settings

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Program crash

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-21 10:53

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-21 10:53

Reported

2024-06-21 10:55

Platform

win7-20231129-en

Max time kernel

144s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe"

Signatures

Amadey

trojan amadey

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe N/A

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 osdhs.in.ne udp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 jkshb.su udp
MK 95.86.30.3:80 jkshb.su tcp
MK 95.86.30.3:80 jkshb.su tcp
MK 95.86.30.3:80 jkshb.su tcp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 greendag.ru udp

Files

memory/2200-1-0x0000000000590000-0x0000000000690000-memory.dmp

memory/2200-2-0x0000000000340000-0x00000000003AB000-memory.dmp

memory/2200-3-0x0000000000400000-0x0000000000470000-memory.dmp

memory/2200-5-0x0000000000400000-0x000000000047E000-memory.dmp

\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

MD5 3e30840e15905c863d3975deef294810
SHA1 925f3af7bcb75a8eb2f8a06fe0cad5a6b5f5fbf6
SHA256 646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc
SHA512 08d1b5a7af629d8e4535aeede77aaddf0d9aca07247f94c9e809c7b43f0286dd31528b39ebe4387f5c6fbad0bb7ab195be250663dbf647056d3c55483e5e5af7

memory/2200-20-0x0000000000400000-0x000000000047E000-memory.dmp

memory/2200-19-0x0000000000400000-0x0000000000470000-memory.dmp

memory/2200-18-0x0000000000340000-0x00000000003AB000-memory.dmp

memory/2532-22-0x0000000000400000-0x000000000047E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\627615824406

MD5 210a18ff21125e5664da965102165864
SHA1 16213b1886a4b0d65efbe9faed7174cf6f2899bc
SHA256 8c10cd73b42875a0a83bb343c122fb47ccf7ec25ee4d2c637b20c594a020ce84
SHA512 2e1a92d51b656eabe985b5ae7e0dfd85970371ffeeefdeccd430c510bd3b9dac553422888fab01d10183ab40ba2556578c412a3c4a6dc389788791a119b9f79d

memory/2532-32-0x0000000000400000-0x000000000047E000-memory.dmp

memory/2532-40-0x0000000000400000-0x000000000047E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-21 10:53

Reported

2024-06-21 10:55

Platform

win10v2004-20240508-en

Max time kernel

145s

Max time network

93s

Command Line

"C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe"

Signatures

Amadey

trojan amadey

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc_NeikiAnalytics.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 100 -ip 100

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 756

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 100 -ip 100

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 780

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 100 -ip 100

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 856

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 100 -ip 100

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 924

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 100 -ip 100

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 948

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 100 -ip 100

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 928

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 100 -ip 100

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 1136

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 100 -ip 100

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 1136

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 100 -ip 100

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 1236

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 100 -ip 100

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 1280

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 556

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 596

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 564

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 592

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 720

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 884

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 904

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 884

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 948

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 956

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 884

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 1184

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 1404

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 1404

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1616 -ip 1616

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 216

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3704 -ip 3704

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 440

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1752 -ip 1752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 888

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 osdhs.in.ne udp
US 8.8.8.8:53 jkshb.su udp
CO 181.52.122.51:80 jkshb.su tcp
CO 181.52.122.51:80 jkshb.su tcp
CO 181.52.122.51:80 jkshb.su tcp
US 8.8.8.8:53 51.122.52.181.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 34.56.20.217.in-addr.arpa udp

Files

memory/100-2-0x00000000006E0000-0x000000000074B000-memory.dmp

memory/100-1-0x0000000000750000-0x0000000000850000-memory.dmp

memory/100-3-0x0000000000400000-0x0000000000470000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

MD5 3e30840e15905c863d3975deef294810
SHA1 925f3af7bcb75a8eb2f8a06fe0cad5a6b5f5fbf6
SHA256 646a83e2de4cc71d8cead71580104ade9b4dc38e00fd491c658dfd5c6a9898bc
SHA512 08d1b5a7af629d8e4535aeede77aaddf0d9aca07247f94c9e809c7b43f0286dd31528b39ebe4387f5c6fbad0bb7ab195be250663dbf647056d3c55483e5e5af7

memory/100-20-0x0000000000400000-0x0000000000470000-memory.dmp

memory/100-19-0x00000000006E0000-0x000000000074B000-memory.dmp

memory/100-18-0x0000000000400000-0x000000000047E000-memory.dmp

memory/1752-22-0x0000000000400000-0x000000000047E000-memory.dmp

memory/1752-23-0x0000000000400000-0x000000000047E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\804150937214

MD5 6e9510a0874310be4ce2befaca8557a2
SHA1 ee911c8f223bea891340570bc75b77454a403996
SHA256 c182b533ffd38c53d1904b1bfb7275e569a47434546d11e701ad1d30daa1d275
SHA512 50fdd506501ec48490494cb5aad52c2110e9cf88ad5c54fb298602b0652c649c5e7b5779d8018423cb0027e3d33a48e1c148e564b4c6b005e3fb931f58644043

memory/1752-39-0x0000000000400000-0x000000000047E000-memory.dmp

memory/1616-45-0x0000000000400000-0x000000000047E000-memory.dmp

memory/1616-44-0x0000000000400000-0x000000000047E000-memory.dmp

memory/1616-46-0x0000000000400000-0x000000000047E000-memory.dmp

memory/1616-47-0x0000000000400000-0x000000000047E000-memory.dmp

memory/3704-56-0x0000000000400000-0x000000000047E000-memory.dmp