Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 17:34
Behavioral task
behavioral1
Sample
a2a4e83e35f7cafbc1c73fd179737e80NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
a2a4e83e35f7cafbc1c73fd179737e80NeikiAnalytics.exe
-
Size
45KB
-
MD5
a2a4e83e35f7cafbc1c73fd179737e80
-
SHA1
94f0660549221c8bf48184ea39324ece80053935
-
SHA256
5244f2ca07b186c6bd6c0ac80a5c8db94bb49ebfc920ce6b2c73e23568aff396
-
SHA512
426211ae1ee5f20f338613bc3c83afe51481110cc7f6d4fd32b869cdc5f927c831e4596de4ff60c905bc33e314ef8f64896df0681e4b4c380f34c61504ba8052
-
SSDEEP
768:VdhO/poiiUcjlJIniwzH9Xqk5nWEZ5SbTDahWI7CPW5z:rw+jjgniyH9XqcnW85SbToWI7
Malware Config
Extracted
xenorat
damizk.ddns.net
Xeno_rat_ndsszcv
-
delay
5000
-
install_path
appdata
-
port
7628
-
startup_name
nothingset
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation a2a4e83e35f7cafbc1c73fd179737e80NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 a2a4e83e35f7cafbc1c73fd179737e80NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5068 wrote to memory of 3008 5068 a2a4e83e35f7cafbc1c73fd179737e80NeikiAnalytics.exe 81 PID 5068 wrote to memory of 3008 5068 a2a4e83e35f7cafbc1c73fd179737e80NeikiAnalytics.exe 81 PID 5068 wrote to memory of 3008 5068 a2a4e83e35f7cafbc1c73fd179737e80NeikiAnalytics.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2a4e83e35f7cafbc1c73fd179737e80NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a2a4e83e35f7cafbc1c73fd179737e80NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Roaming\XenoManager\a2a4e83e35f7cafbc1c73fd179737e80NeikiAnalytics.exe"C:\Users\Admin\AppData\Roaming\XenoManager\a2a4e83e35f7cafbc1c73fd179737e80NeikiAnalytics.exe"2⤵
- Executes dropped EXE
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a2a4e83e35f7cafbc1c73fd179737e80NeikiAnalytics.exe.log
Filesize226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
45KB
MD5a2a4e83e35f7cafbc1c73fd179737e80
SHA194f0660549221c8bf48184ea39324ece80053935
SHA2565244f2ca07b186c6bd6c0ac80a5c8db94bb49ebfc920ce6b2c73e23568aff396
SHA512426211ae1ee5f20f338613bc3c83afe51481110cc7f6d4fd32b869cdc5f927c831e4596de4ff60c905bc33e314ef8f64896df0681e4b4c380f34c61504ba8052