Analysis
-
max time kernel
119s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe
-
Size
2.2MB
-
MD5
ddfbc3b32cbe7636e8976d8a4aee4a00
-
SHA1
baa8bb1168d9ee2e2f57646394cdc0760a61a133
-
SHA256
7b76d9fb50dc5f83d25b339efe8dc7f66c6d645cc3b14f1e4b8091ef4220ea42
-
SHA512
76273c96d61588601194f4dd0e2557b05c45a3a6688c8d1014159bc2c6ec590bc809a9f24464e9058d2416725f944d0c412047da9360df21cb1f376eaa1f696e
-
SSDEEP
49152:ozTmfXYjqGUBL6F7+8Pu/ZF26QreE26pKdzj58oz9InwWlLoZot:IuCqmF7+FSrLadz98U9B
Malware Config
Extracted
asyncrat
0.5.8
Default
tomx.brasilia.me:6606
tomx.brasilia.me:7707
tomx.brasilia.me:8808
91.92.250.227:6606
91.92.250.227:7707
91.92.250.227:8808
vWKJAJDsDf09
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2956-2-0x0000000004B90000-0x0000000004DB0000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-3-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-8-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-10-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-4-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-6-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-18-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-20-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-16-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-22-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-14-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-24-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-12-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-32-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-44-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-26-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-28-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-30-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-34-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-42-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-50-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-60-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-66-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-64-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-62-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-58-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-56-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-52-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-54-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-48-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-46-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-40-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-38-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 behavioral1/memory/2956-36-0x0000000004B90000-0x0000000004DAA000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Iyqaqwilwoz = "C:\\Users\\Admin\\AppData\\Roaming\\Iyqaqwilwoz.exe" ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2956 set thread context of 1836 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 29 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe Token: SeDebugPrivilege 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe Token: SeDebugPrivilege 1836 AppLaunch.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2956 wrote to memory of 1836 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 29 PID 2956 wrote to memory of 1836 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 29 PID 2956 wrote to memory of 1836 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 29 PID 2956 wrote to memory of 1836 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 29 PID 2956 wrote to memory of 1836 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 29 PID 2956 wrote to memory of 1836 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 29 PID 2956 wrote to memory of 1836 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 29 PID 2956 wrote to memory of 1836 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 29 PID 2956 wrote to memory of 1836 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 29 PID 2956 wrote to memory of 1836 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 29 PID 2956 wrote to memory of 1836 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 29 PID 2956 wrote to memory of 1836 2956 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1836
-