Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 10:11
Static task
static1
Behavioral task
behavioral1
Sample
5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe
-
Size
491KB
-
MD5
0a9a2b21fb2a5f8b18d925ca13ea79d0
-
SHA1
b89399f5dd81295a4177f8abdba72ceb22c57fed
-
SHA256
5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38
-
SHA512
299becfe791d0cab30d430bf4f67fe7712cd0e6240557c04a2462d592894a2ada5f69de512c1e5b2bb5c54f0873558048befe88b047ee9c04a6bbfceb26d7f56
-
SSDEEP
6144:gLQRLRusCvkjgDsxe1HfFEKZLfa/MOsqGvZN1GQOBMfjrYwiuA:gaR7Cv2gXtHLfa/M5fIQO+j
Malware Config
Extracted
amadey
4.19
8fc809
http://nudump.com
http://otyt.ru
http://selltix.org
-
install_dir
b739b37d80
-
install_file
Dctooux.exe
-
strings_key
65bac8d4c26069c29f1fd276f7af33f3
-
url_paths
/forum/index.php
/forum2/index.php
/forum3/index.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe -
Executes dropped EXE 3 IoCs
Processes:
Dctooux.exeDctooux.exeDctooux.exepid process 2212 Dctooux.exe 3864 Dctooux.exe 3752 Dctooux.exe -
Drops file in Windows directory 1 IoCs
Processes:
5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5024 2700 WerFault.exe 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe 1904 2700 WerFault.exe 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe 2928 2700 WerFault.exe 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe 4888 2700 WerFault.exe 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe 5028 2700 WerFault.exe 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe 3036 2700 WerFault.exe 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe 1248 2700 WerFault.exe 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe 4664 2700 WerFault.exe 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe 1768 2700 WerFault.exe 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe 868 2700 WerFault.exe 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe 3448 2212 WerFault.exe Dctooux.exe 1692 2212 WerFault.exe Dctooux.exe 4980 2212 WerFault.exe Dctooux.exe 3408 2212 WerFault.exe Dctooux.exe 4344 2212 WerFault.exe Dctooux.exe 1408 2212 WerFault.exe Dctooux.exe 4612 2212 WerFault.exe Dctooux.exe 5036 2212 WerFault.exe Dctooux.exe 4896 2212 WerFault.exe Dctooux.exe 5024 2212 WerFault.exe Dctooux.exe 2296 2212 WerFault.exe Dctooux.exe 1596 2212 WerFault.exe Dctooux.exe 2096 2212 WerFault.exe Dctooux.exe 1168 2212 WerFault.exe Dctooux.exe 1368 2212 WerFault.exe Dctooux.exe 1812 2212 WerFault.exe Dctooux.exe 1996 2212 WerFault.exe Dctooux.exe 3272 3864 WerFault.exe Dctooux.exe 2000 3752 WerFault.exe Dctooux.exe 4424 2212 WerFault.exe Dctooux.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exepid process 2700 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exedescription pid process target process PID 2700 wrote to memory of 2212 2700 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe Dctooux.exe PID 2700 wrote to memory of 2212 2700 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe Dctooux.exe PID 2700 wrote to memory of 2212 2700 5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe Dctooux.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 7562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 8282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 7562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 9242⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 7562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 9122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 11322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 11682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 11602⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 5603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 5603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 6243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 6323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 6403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 8043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 6323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 9243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 9643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 9843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 10163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 5883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 11483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 14083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 14363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 13563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 14083⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 6443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 7762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2700 -ip 27001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2700 -ip 27001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2700 -ip 27001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2700 -ip 27001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 2700 -ip 27001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2700 -ip 27001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2700 -ip 27001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2700 -ip 27001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2700 -ip 27001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2700 -ip 27001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2212 -ip 22121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 2212 -ip 22121⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 4402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3864 -ip 38641⤵
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 4562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 3752 -ip 37521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2212 -ip 22121⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\204450073126Filesize
83KB
MD5056634564ecb43a5f9b943330228d2a2
SHA14da306216089312e2a2e0c76fb5f187519ed21ad
SHA2560ab89d4ff49d9e09c94218ab065391401222c673893898492c43971210e0e236
SHA512be4af9eb2f3f2d5b0f1d49fde1dc567d4ff839aa5894961a8e562a3bdd930b215192f4a5ca73652f10180d1472a510dd14c2dd7a16240567dde1541446750bf6
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeFilesize
491KB
MD50a9a2b21fb2a5f8b18d925ca13ea79d0
SHA1b89399f5dd81295a4177f8abdba72ceb22c57fed
SHA2565f7c9b901567da2b14dcdab2bb4b14f80820032ef92340136368ef1a67426f38
SHA512299becfe791d0cab30d430bf4f67fe7712cd0e6240557c04a2462d592894a2ada5f69de512c1e5b2bb5c54f0873558048befe88b047ee9c04a6bbfceb26d7f56
-
memory/2212-16-0x0000000000400000-0x0000000002397000-memory.dmpFilesize
31.6MB
-
memory/2212-34-0x0000000000400000-0x0000000002397000-memory.dmpFilesize
31.6MB
-
memory/2212-35-0x0000000000400000-0x0000000002397000-memory.dmpFilesize
31.6MB
-
memory/2700-1-0x0000000002600000-0x0000000002700000-memory.dmpFilesize
1024KB
-
memory/2700-2-0x0000000003FA0000-0x000000000400F000-memory.dmpFilesize
444KB
-
memory/2700-3-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/2700-18-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/2700-17-0x0000000000400000-0x0000000002397000-memory.dmpFilesize
31.6MB
-
memory/3752-48-0x0000000000400000-0x0000000002397000-memory.dmpFilesize
31.6MB
-
memory/3864-39-0x0000000000400000-0x0000000002397000-memory.dmpFilesize
31.6MB