Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 03:31
Static task
static1
Behavioral task
behavioral1
Sample
63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
63d74b4d5b18373ba3230ed473922c70
-
SHA1
96dd293df1e4d4f7972d3c2d647195b81a1699d8
-
SHA256
328e70cca6f607ee5e124be316cbd024fa84f61b874c0568366516a8222675aa
-
SHA512
c43d222acef5f5581ad1923431aa66a39161da2e69a02afc64aeb901e3c7465c392d11bad5d14662b66f79e90adc3ef843e78887591a4794486350aa0ba6f512
-
SSDEEP
24576:0qDEvCTbMWu7rQYlBQcBiT6rprG8amzNiCDJjKJ7ypNh1:0TvC/MTQYxsWR7amgUJI2
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 33 IoCs
resource yara_rule behavioral1/memory/1648-28-0x0000000000270000-0x00000000002C4000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-29-0x0000000000C30000-0x0000000000C82000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-52-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-92-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-90-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-88-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-84-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-82-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-80-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-78-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-76-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-74-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-72-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-70-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-68-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-66-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-64-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-62-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-60-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-58-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-56-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-54-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-50-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-48-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-46-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-86-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-44-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-42-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-40-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-38-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-36-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-34-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 behavioral1/memory/1648-33-0x0000000000C30000-0x0000000000C7D000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\skyT = "C:\\Users\\Admin\\AppData\\Roaming\\skyT\\skyT.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2016 set thread context of 1648 2016 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1648 RegSvcs.exe 1648 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 2016 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1648 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 2016 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 2016 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 2016 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 2016 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1648 RegSvcs.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1432 wrote to memory of 2544 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 28 PID 1432 wrote to memory of 2544 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 28 PID 1432 wrote to memory of 2544 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 28 PID 1432 wrote to memory of 2544 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 28 PID 1432 wrote to memory of 2544 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 28 PID 1432 wrote to memory of 2544 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 28 PID 1432 wrote to memory of 2544 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 28 PID 1432 wrote to memory of 2016 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 29 PID 1432 wrote to memory of 2016 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 29 PID 1432 wrote to memory of 2016 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 29 PID 1432 wrote to memory of 2016 1432 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 29 PID 2016 wrote to memory of 1648 2016 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 30 PID 2016 wrote to memory of 1648 2016 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 30 PID 2016 wrote to memory of 1648 2016 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 30 PID 2016 wrote to memory of 1648 2016 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 30 PID 2016 wrote to memory of 1648 2016 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 30 PID 2016 wrote to memory of 1648 2016 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 30 PID 2016 wrote to memory of 1648 2016 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 30 PID 2016 wrote to memory of 1648 2016 63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe"2⤵PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\63d74b4d5b18373ba3230ed473922c70_NeikiAnalytics.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5eafe8751898e0b3c1ea7f59f88dbb724
SHA13e94472d4b13544dccf63cae2b695b486458f40c
SHA256f6efb701356255d6b13eb6a66d405337a30d1d1b2d1263c382fab079ccc34df9
SHA512575e8c115202394c75910021ffbd7d7c0519f9ffb3777bcf5107179267c02ba3b3aa59a0116d839a3a5aea73e152bd053fccd5b83a421f2a3dc0332c39a1bd28