Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 06:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fbb6ba1836914f33ecaa3cb35d51fab0_NEIKI.dll
Resource
win7-20240419-en
windows7-x64
7 signatures
150 seconds
General
-
Target
fbb6ba1836914f33ecaa3cb35d51fab0_NEIKI.dll
-
Size
445KB
-
MD5
fbb6ba1836914f33ecaa3cb35d51fab0
-
SHA1
19afb4d0600ecde28daceaa0f620a84aa49017a4
-
SHA256
0d66f94c73dcb872d635e9fd741ee6b83b39b2c06149bdf20897985a0515ede8
-
SHA512
1c56730907e62f2e25c4aacc95b92a548a3f8d5b0f84a27e360d5f3cd49b5e2abba1838057df4c2458552f89c9e8a76d87b489f537b304bc7c2664004f3ae1ee
-
SSDEEP
12288:E/q4BLbIVjQ8kitrxU3IuIjplqzHZni0i8Bz9:twbIVjQ8trxisXoZ4y
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/4856-0-0x0000000000400000-0x000000000045C000-memory.dmp family_zgrat_v1 -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4472 set thread context of 4856 4472 rundll32.exe 84 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4856 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4856 MSBuild.exe Token: SeBackupPrivilege 4856 MSBuild.exe Token: SeSecurityPrivilege 4856 MSBuild.exe Token: SeSecurityPrivilege 4856 MSBuild.exe Token: SeSecurityPrivilege 4856 MSBuild.exe Token: SeSecurityPrivilege 4856 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1608 wrote to memory of 4472 1608 rundll32.exe 83 PID 1608 wrote to memory of 4472 1608 rundll32.exe 83 PID 1608 wrote to memory of 4472 1608 rundll32.exe 83 PID 4472 wrote to memory of 4856 4472 rundll32.exe 84 PID 4472 wrote to memory of 4856 4472 rundll32.exe 84 PID 4472 wrote to memory of 4856 4472 rundll32.exe 84 PID 4472 wrote to memory of 4856 4472 rundll32.exe 84 PID 4472 wrote to memory of 4856 4472 rundll32.exe 84 PID 4472 wrote to memory of 4856 4472 rundll32.exe 84 PID 4472 wrote to memory of 4856 4472 rundll32.exe 84 PID 4472 wrote to memory of 4856 4472 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbb6ba1836914f33ecaa3cb35d51fab0_NEIKI.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbb6ba1836914f33ecaa3cb35d51fab0_NEIKI.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-