Analysis

  • max time kernel
    148s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2024 23:23

General

  • Target

    34f10ff655b73c34bb13f79f7f7e4220_NeikiAnalytics.exe

  • Size

    3.8MB

  • MD5

    34f10ff655b73c34bb13f79f7f7e4220

  • SHA1

    56fb9f28c0fdf5abd9cfbe598dd38e06ac346afa

  • SHA256

    ce5f772f0350f2d6865071c10b5fd832b76f4fa3a63d8aa6ffa494c302335ecc

  • SHA512

    1f6cad1af1ad5e9a637383f62af7dd427020017ba7b86f7c77c676947c74e579e2eee574ea6ebfe5fd7168179c73771c0c665f840a8cdc0c0e71c9c09ba37228

  • SSDEEP

    49152:qQiJrlduJpoX7mzpzOd3BI9tpqTVgG4MZ3PnPzl2/NLHRibD01BTQJuePj3x2Q7b:IJrl4pjzOBogB/nbqZHRi3eKJ/PTMQ7

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://glossydecentjuskwos.shop/api

https://acceptabledcooeprs.shop/api

https://obsceneclassyjuwks.shop/api

https://zippyfinickysofwps.shop/api

https://miniaturefinerninewjs.shop/api

https://plaintediousidowsko.shop/api

https://sweetsquarediaslw.shop/api

https://holicisticscrarws.shop/api

https://boredimperissvieos.shop/api

Signatures

  • Detect ZGRat V1 1 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34f10ff655b73c34bb13f79f7f7e4220_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\34f10ff655b73c34bb13f79f7f7e4220_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
      2⤵
        PID:2056
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 1016
        2⤵
        • Program crash
        PID:932
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1468 -ip 1468
      1⤵
        PID:4480

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

        Filesize

        742KB

        MD5

        544cd51a596619b78e9b54b70088307d

        SHA1

        4769ddd2dbc1dc44b758964ed0bd231b85880b65

        SHA256

        dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd

        SHA512

        f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719

      • memory/1468-10-0x0000000005C60000-0x0000000005C70000-memory.dmp

        Filesize

        64KB

      • memory/1468-12-0x0000000074890000-0x0000000075040000-memory.dmp

        Filesize

        7.7MB

      • memory/1468-3-0x0000000074890000-0x0000000075040000-memory.dmp

        Filesize

        7.7MB

      • memory/1468-4-0x0000000005EC0000-0x0000000006052000-memory.dmp

        Filesize

        1.6MB

      • memory/1468-1-0x0000000000F10000-0x00000000012DA000-memory.dmp

        Filesize

        3.8MB

      • memory/1468-0-0x000000007489E000-0x000000007489F000-memory.dmp

        Filesize

        4KB

      • memory/1468-11-0x0000000074890000-0x0000000075040000-memory.dmp

        Filesize

        7.7MB

      • memory/1468-2-0x0000000005D20000-0x0000000005DBC000-memory.dmp

        Filesize

        624KB

      • memory/1468-20-0x0000000074890000-0x0000000075040000-memory.dmp

        Filesize

        7.7MB

      • memory/1468-14-0x0000000074890000-0x0000000075040000-memory.dmp

        Filesize

        7.7MB

      • memory/1468-18-0x0000000074890000-0x0000000075040000-memory.dmp

        Filesize

        7.7MB

      • memory/2056-17-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/2056-19-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/2056-13-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB