Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 03:11

General

  • Target

    dacdc4204974035b495698e1e6de02e0_NEIKI.exe

  • Size

    5.9MB

  • MD5

    dacdc4204974035b495698e1e6de02e0

  • SHA1

    ee3f46e8f9e7539cbee614faaf15af6ec3180f07

  • SHA256

    6badfc713ecea281aecb89bdcddafea95465e94098557bc679cdb85a70d67555

  • SHA512

    cb967f8049017233e24cd5397454593d256c716534fb820cc9e9e9be581807af5993c15711dc91cf611a0cf4759e5c7b07a4e29daf2e67d433ce6e480bcc46e9

  • SSDEEP

    98304:t/TX7JvnzWR4DNnbx5SoesNLWE4iMgFWEWqFGIBGKKDO9uAqB/Ob1R/CHpS2q:tr5niaDVbx5p1Rqi+FqkkrUAqw

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • .NET Reactor proctector 3 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Loads dropped DLL 4 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dacdc4204974035b495698e1e6de02e0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\dacdc4204974035b495698e1e6de02e0_NEIKI.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AvCmMsg.ini

    Filesize

    1KB

    MD5

    1f4b8e7405456dc2f2250d5fbbad7486

    SHA1

    efea299772b2f82610af2fb4aaf0afb05b3ac00d

    SHA256

    96015f0063145199f15f084e31e79ff77493591bd340a29895edb0783fb132b4

    SHA512

    69867da84b22249373f675c8cc84bf19968c6dc4bee23d505a52447dd27563ea39330804cb17e5967cfd0ee57c845f704a8f98912d9c5d082eca192fb521905e

  • C:\Users\Admin\AppData\Local\Temp\AvCryptSvc.exe

    Filesize

    611KB

    MD5

    79758f40946119b9dbdfe1d3f0d013ab

    SHA1

    cf80ca05cf992bc875defa1f301adf8240bd9cf3

    SHA256

    cc541615455783965444ec82aff7bda49262123d165f8c8c3ceb7110339c9f33

    SHA512

    d505e796af2a061284c234afcc7cc7243e8553cab487d467c8c752ab35298422cfbac8ced565a9c7fe48c8663d8dc3e1909dcba9f67f66fe2390a6646ba32b51

  • C:\Users\Admin\AppData\Local\Temp\AvCryptSvc.ini

    Filesize

    2KB

    MD5

    0677d433a47449d66395bc690c20ef68

    SHA1

    80feca271ddebad5b10cb8c8714c6c2aa386fa32

    SHA256

    e07b900ffa34af1c388ce75b3820f6f3d3d247ee72a9961eecd1425b66f6f1f3

    SHA512

    2c013b88bcb314a26e1e297a038a7b91e28135d2ff4b8b4aa170f035d70c69cb96d04c43331cbc9b6868d4279b30f49d7c8af8afdb8ca1469ee174797811c435

  • memory/1760-4-0x0000000074920000-0x00000000750D0000-memory.dmp

    Filesize

    7.7MB

  • memory/1760-2-0x0000000074920000-0x00000000750D0000-memory.dmp

    Filesize

    7.7MB

  • memory/1760-5-0x0000000005BB0000-0x0000000005C42000-memory.dmp

    Filesize

    584KB

  • memory/1760-6-0x0000000005C50000-0x0000000005C5A000-memory.dmp

    Filesize

    40KB

  • memory/1760-7-0x000000000B4B0000-0x000000000BAA2000-memory.dmp

    Filesize

    5.9MB

  • memory/1760-3-0x0000000006280000-0x0000000006824000-memory.dmp

    Filesize

    5.6MB

  • memory/1760-74-0x0000000006220000-0x0000000006242000-memory.dmp

    Filesize

    136KB

  • memory/1760-0-0x000000007492E000-0x000000007492F000-memory.dmp

    Filesize

    4KB

  • memory/1760-81-0x00000000071C0000-0x000000000725E000-memory.dmp

    Filesize

    632KB

  • memory/1760-92-0x0000000074920000-0x00000000750D0000-memory.dmp

    Filesize

    7.7MB

  • memory/1760-1-0x0000000000B60000-0x000000000114A000-memory.dmp

    Filesize

    5.9MB

  • memory/1760-104-0x000000007492E000-0x000000007492F000-memory.dmp

    Filesize

    4KB

  • memory/1760-105-0x0000000074920000-0x00000000750D0000-memory.dmp

    Filesize

    7.7MB

  • memory/1760-106-0x0000000074920000-0x00000000750D0000-memory.dmp

    Filesize

    7.7MB