Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 06:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fbb6ba1836914f33ecaa3cb35d51fab0_NEIKI.dll
Resource
win7-20240419-en
windows7-x64
7 signatures
150 seconds
General
-
Target
fbb6ba1836914f33ecaa3cb35d51fab0_NEIKI.dll
-
Size
445KB
-
MD5
fbb6ba1836914f33ecaa3cb35d51fab0
-
SHA1
19afb4d0600ecde28daceaa0f620a84aa49017a4
-
SHA256
0d66f94c73dcb872d635e9fd741ee6b83b39b2c06149bdf20897985a0515ede8
-
SHA512
1c56730907e62f2e25c4aacc95b92a548a3f8d5b0f84a27e360d5f3cd49b5e2abba1838057df4c2458552f89c9e8a76d87b489f537b304bc7c2664004f3ae1ee
-
SSDEEP
12288:E/q4BLbIVjQ8kitrxU3IuIjplqzHZni0i8Bz9:twbIVjQ8trxisXoZ4y
Malware Config
Signatures
-
Detect ZGRat V1 5 IoCs
resource yara_rule behavioral1/memory/1860-2-0x0000000000400000-0x000000000045C000-memory.dmp family_zgrat_v1 behavioral1/memory/1860-5-0x0000000000400000-0x000000000045C000-memory.dmp family_zgrat_v1 behavioral1/memory/1860-3-0x0000000000400000-0x000000000045C000-memory.dmp family_zgrat_v1 behavioral1/memory/1860-9-0x0000000000400000-0x000000000045C000-memory.dmp family_zgrat_v1 behavioral1/memory/1860-7-0x0000000000400000-0x000000000045C000-memory.dmp family_zgrat_v1 -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 1860 1632 rundll32.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1860 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1860 MSBuild.exe Token: SeBackupPrivilege 1860 MSBuild.exe Token: SeSecurityPrivilege 1860 MSBuild.exe Token: SeSecurityPrivilege 1860 MSBuild.exe Token: SeSecurityPrivilege 1860 MSBuild.exe Token: SeSecurityPrivilege 1860 MSBuild.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1632 2084 rundll32.exe 28 PID 2084 wrote to memory of 1632 2084 rundll32.exe 28 PID 2084 wrote to memory of 1632 2084 rundll32.exe 28 PID 2084 wrote to memory of 1632 2084 rundll32.exe 28 PID 2084 wrote to memory of 1632 2084 rundll32.exe 28 PID 2084 wrote to memory of 1632 2084 rundll32.exe 28 PID 2084 wrote to memory of 1632 2084 rundll32.exe 28 PID 1632 wrote to memory of 1860 1632 rundll32.exe 29 PID 1632 wrote to memory of 1860 1632 rundll32.exe 29 PID 1632 wrote to memory of 1860 1632 rundll32.exe 29 PID 1632 wrote to memory of 1860 1632 rundll32.exe 29 PID 1632 wrote to memory of 1860 1632 rundll32.exe 29 PID 1632 wrote to memory of 1860 1632 rundll32.exe 29 PID 1632 wrote to memory of 1860 1632 rundll32.exe 29 PID 1632 wrote to memory of 1860 1632 rundll32.exe 29 PID 1632 wrote to memory of 1860 1632 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbb6ba1836914f33ecaa3cb35d51fab0_NEIKI.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbb6ba1836914f33ecaa3cb35d51fab0_NEIKI.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-