Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 10:53

General

  • Target

    c98189fd53d9844b044ae7a0ffb44550_NeikiAnalytics.exe

  • Size

    409KB

  • MD5

    c98189fd53d9844b044ae7a0ffb44550

  • SHA1

    8d105aee7085a7a775c3c3c1fee72b8c4ae4a51a

  • SHA256

    0a8a032701e715c514d3d6bea55c1e738c2c137473a011922d88fe70c95186a0

  • SHA512

    ddd868b3b643ccc02ef4cee58270722494f34ac8a88cb201c3bd72f22a72f8d58f908e1cbde51b5779026c06e77e04e5ed34de0be85dbd7f11ebbb3787b4ce82

  • SSDEEP

    6144:5FQp0yN90QEbYpi67YD/iyjS+iKHiMGoV2I1Vz4pfsBLIzzb5hMa266AyT5:Fy905YpZ7+id+xHYI1Vz40BsznMPAQ5

Malware Config

Signatures

  • Detect ZGRat V1 35 IoCs
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c98189fd53d9844b044ae7a0ffb44550_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c98189fd53d9844b044ae7a0ffb44550_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\07153565.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\07153565.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kp193337.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kp193337.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\07153565.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kp193337.exe

    Filesize

    361KB

    MD5

    a786d7526bf8c5e1eea9fcfc88fca41a

    SHA1

    a3316e1883b08161c263c57cf9b5f7dc6168a838

    SHA256

    3f69f507db09126f17ee2cf790689703c8e0f9ef71495b145fff81801a48c40c

    SHA512

    52b9d9f5204568e82584a5f2180e7c6dfd5ee38b2b2763251ddef3cedbf3248d98188849f7b0a06e46f19b407c2473b81e57cd22aab5596198144a3327e64658

  • memory/4616-14-0x0000000002E10000-0x0000000002F10000-memory.dmp

    Filesize

    1024KB

  • memory/4616-15-0x0000000002D20000-0x0000000002D66000-memory.dmp

    Filesize

    280KB

  • memory/4616-16-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/4616-17-0x0000000004CE0000-0x0000000004D1C000-memory.dmp

    Filesize

    240KB

  • memory/4616-18-0x0000000007280000-0x0000000007824000-memory.dmp

    Filesize

    5.6MB

  • memory/4616-19-0x00000000071D0000-0x000000000720A000-memory.dmp

    Filesize

    232KB

  • memory/4616-20-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-43-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-84-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-79-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-77-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-75-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-73-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-71-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-69-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-65-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-63-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-61-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-59-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-57-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-55-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-53-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-51-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-49-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-47-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-45-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-41-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-39-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-37-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-35-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-33-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-31-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-29-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-27-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-25-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-23-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-81-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-21-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-67-0x00000000071D0000-0x0000000007205000-memory.dmp

    Filesize

    212KB

  • memory/4616-812-0x0000000009CB0000-0x000000000A2C8000-memory.dmp

    Filesize

    6.1MB

  • memory/4616-813-0x000000000A350000-0x000000000A362000-memory.dmp

    Filesize

    72KB

  • memory/4616-814-0x000000000A370000-0x000000000A47A000-memory.dmp

    Filesize

    1.0MB

  • memory/4616-815-0x000000000A490000-0x000000000A4CC000-memory.dmp

    Filesize

    240KB

  • memory/4616-816-0x0000000004900000-0x000000000494C000-memory.dmp

    Filesize

    304KB

  • memory/4616-819-0x0000000002E10000-0x0000000002F10000-memory.dmp

    Filesize

    1024KB

  • memory/4616-820-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/5100-8-0x0000000000AF0000-0x0000000000AFA000-memory.dmp

    Filesize

    40KB

  • memory/5100-7-0x00007FFCC0113000-0x00007FFCC0115000-memory.dmp

    Filesize

    8KB