Analysis
-
max time kernel
130s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 15:56
Behavioral task
behavioral1
Sample
7dcea724fda3fd345207c7d539924ef0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
7dcea724fda3fd345207c7d539924ef0_NeikiAnalytics.exe
-
Size
2.2MB
-
MD5
7dcea724fda3fd345207c7d539924ef0
-
SHA1
2b5a82f17a5da662e3cc246ab9b9b480de4df3d4
-
SHA256
5430f89081787db94574aa0765ce42d6ede7c47df351481f44d8bdb0987607ca
-
SHA512
016ef2257f38653659d9e1b963364d80b0e91ff6522305832e48abe6eaccb57be2c6d5f9801d1f26dd2d7b5e55215f379fbccb21865df26b5524c91cc4703492
-
SSDEEP
24576:2TbBv5rUyXVwmEg9jD2GDFZOOS9RxVGS8+4zhotSUz68Sh0+w7GNmG+vVxfmjyqR:IBJw5OS9Rp8fJUzaNbIG0m
Malware Config
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral1/files/0x0037000000015653-9.dat family_zgrat_v1 behavioral1/memory/2728-13-0x0000000000AE0000-0x0000000000CCE000-memory.dmp family_zgrat_v1 behavioral1/memory/1696-44-0x0000000001110000-0x00000000012FE000-memory.dmp family_zgrat_v1 -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 2728 refsvc.exe 1696 sppsvc.exe -
Loads dropped DLL 2 IoCs
pid Process 2584 cmd.exe 2584 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2700 reg.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1696 sppsvc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe 2728 refsvc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1696 sppsvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2728 refsvc.exe Token: SeDebugPrivilege 1696 sppsvc.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1192 2128 7dcea724fda3fd345207c7d539924ef0_NeikiAnalytics.exe 28 PID 2128 wrote to memory of 1192 2128 7dcea724fda3fd345207c7d539924ef0_NeikiAnalytics.exe 28 PID 2128 wrote to memory of 1192 2128 7dcea724fda3fd345207c7d539924ef0_NeikiAnalytics.exe 28 PID 2128 wrote to memory of 1192 2128 7dcea724fda3fd345207c7d539924ef0_NeikiAnalytics.exe 28 PID 1192 wrote to memory of 2584 1192 WScript.exe 29 PID 1192 wrote to memory of 2584 1192 WScript.exe 29 PID 1192 wrote to memory of 2584 1192 WScript.exe 29 PID 1192 wrote to memory of 2584 1192 WScript.exe 29 PID 2584 wrote to memory of 2700 2584 cmd.exe 31 PID 2584 wrote to memory of 2700 2584 cmd.exe 31 PID 2584 wrote to memory of 2700 2584 cmd.exe 31 PID 2584 wrote to memory of 2700 2584 cmd.exe 31 PID 2584 wrote to memory of 2728 2584 cmd.exe 32 PID 2584 wrote to memory of 2728 2584 cmd.exe 32 PID 2584 wrote to memory of 2728 2584 cmd.exe 32 PID 2584 wrote to memory of 2728 2584 cmd.exe 32 PID 2728 wrote to memory of 2512 2728 refsvc.exe 33 PID 2728 wrote to memory of 2512 2728 refsvc.exe 33 PID 2728 wrote to memory of 2512 2728 refsvc.exe 33 PID 2512 wrote to memory of 2936 2512 cmd.exe 35 PID 2512 wrote to memory of 2936 2512 cmd.exe 35 PID 2512 wrote to memory of 2936 2512 cmd.exe 35 PID 2512 wrote to memory of 2308 2512 cmd.exe 36 PID 2512 wrote to memory of 2308 2512 cmd.exe 36 PID 2512 wrote to memory of 2308 2512 cmd.exe 36 PID 2512 wrote to memory of 1696 2512 cmd.exe 37 PID 2512 wrote to memory of 1696 2512 cmd.exe 37 PID 2512 wrote to memory of 1696 2512 cmd.exe 37 PID 2512 wrote to memory of 1696 2512 cmd.exe 37 PID 2512 wrote to memory of 1696 2512 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dcea724fda3fd345207c7d539924ef0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7dcea724fda3fd345207c7d539924ef0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\svc_host\LLtHD6KyksTtn9xrvTjsqO9gPW0zdCW69vHytT.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\svc_host\o6N3MULqHjrpw5R3dKMVsIOofJS2K8wQZ2DqcVD.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
PID:2700
-
-
C:\svc_host\refsvc.exe"C:\svc_host/refsvc.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cd4bcaTvCp.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:2936
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2308
-
-
C:\Recovery\5b7985c2-d100-11ee-bb00-c695cbc44580\sppsvc.exe"C:\Recovery\5b7985c2-d100-11ee-bb00-c695cbc44580\sppsvc.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235B
MD51fa448101a061efe242acbd49733de19
SHA1cd110ab05a328ef63e2043e3debcb4fa5f75d0a7
SHA256d086efd84a8f33098f920e91b945370888769cb0447e47b87d979e02521d265f
SHA5121b1e3422dccff3c7ab260677dd8729a9bc9072038b6e0fd3f0b6533c92082afc8e3af235f561c6e970b5d6a50e69ee2cafb992f8a5512eb905e9539fbf93c859
-
Filesize
225B
MD50999aa302043250c87205f71c9ae2124
SHA190a26bb66c737ee925282bd427fc40b5a76e00f8
SHA25673148262eff9aca1d1624e72983e2466ec6e69987561c587c69715e5dcd97efb
SHA51251a794adba929c73413e15633d093e10924fc3c02ccd6c193c7f4d3b15cb5a85c52725d7ae94705245ad928b3c5d18d721789712b3895ad7c259f0b6c92d10e9
-
Filesize
177B
MD52bc7ba1d121bab2aaa3daeb4b82da7ae
SHA100eeaa69ea9f2b0cd99a478e76b47d090af77fc3
SHA256bf91299f8c63b91a89e661d3a29f67591bc6d73539e55d3a9265d7d5c4dd9a3e
SHA512ca9c5f796aeba7c6153357749b300a3b3a95e84c675210db98bf05d995bbc73e0b4b6a97bc7e84f666d29826f74c799f02a2a0841e4b0c48c671f3a8d0ea4c48
-
Filesize
1.9MB
MD5e91a72e040145056f9aa92a0653c5884
SHA15d3e149f8e8d8cd7e695c6ffd58997af16ea41e0
SHA25674e6ef57d2cec172f217a48f5e013a644588a9f4ec25a1a5e05d0f3c04c6b922
SHA5123650052c5ee1141290e2ef4d0ce42c1b6596740439ba9b91ac33ccefc2696664bf03f2712a558a819a7e186fbce66c7782e4d904ff8f9099f17180d78c1d544d