Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 22:40
Static task
static1
Behavioral task
behavioral1
Sample
13cccb19332edc17ab4556e6926a7d50_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
13cccb19332edc17ab4556e6926a7d50_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
13cccb19332edc17ab4556e6926a7d50_NeikiAnalytics.exe
-
Size
361KB
-
MD5
13cccb19332edc17ab4556e6926a7d50
-
SHA1
9fb167b81e1da861df60359e8b76de5aecfab13a
-
SHA256
9658029f65ab4cb80f29f7d9c7787488673cb5a62478e0e3d72fc60bc9437062
-
SHA512
f370546ff077a49e8e7eb87da327e7cbd8ed1778e6d9b5e3411f4fee8852017a301e23c045b55730d9617058d0c2fdf7543446ab7e51ac0461d17ab82f0f0a99
-
SSDEEP
6144:EGDvCqltVlI1ezGpfscLczzb5hMa2668/KXrO:iqltXI1ezC0cIznMP8/K
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral2/memory/3324-4-0x0000000004B00000-0x0000000004B3C000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-6-0x0000000004E90000-0x0000000004ECA000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-71-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-69-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-67-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-65-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-63-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-61-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-59-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-55-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-53-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-51-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-49-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-47-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-45-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-41-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-39-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-37-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-35-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-33-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-31-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-29-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-27-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-25-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-23-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-21-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-19-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-17-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-15-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-13-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-11-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-9-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-8-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-57-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 behavioral2/memory/3324-43-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral2/memory/3324-4-0x0000000004B00000-0x0000000004B3C000-memory.dmp family_redline behavioral2/memory/3324-6-0x0000000004E90000-0x0000000004ECA000-memory.dmp family_redline behavioral2/memory/3324-71-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-69-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-67-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-65-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-63-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-61-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-59-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-55-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-53-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-51-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-49-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-47-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-45-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-41-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-39-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-37-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-35-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-33-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-31-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-29-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-27-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-25-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-23-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-21-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-19-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-17-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-15-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-13-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-11-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-9-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-8-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-57-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline behavioral2/memory/3324-43-0x0000000004E90000-0x0000000004EC5000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3324 13cccb19332edc17ab4556e6926a7d50_NeikiAnalytics.exe