Analysis
-
max time kernel
124s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 04:26
Behavioral task
behavioral1
Sample
7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe
-
Size
1.7MB
-
MD5
7c12d48df8f08a95701197c514269a50
-
SHA1
4f99360c54ad2cce0afe14ddb37697f6777795c8
-
SHA256
6ef54df3017339537b7649647096dcbc2b9fefea5b49776d8c80c38726b3698f
-
SHA512
37ed65a444ceba50af00e7570856cf3ae275bdbcb2acf6b72e0c3d3a6ba0361f0e1bf93ef1ae7a011dfc670c9840c43d88978c114f9f688bac1eff8f6d83b80d
-
SSDEEP
24576:YciyxcGgPmGJ5CNvo3h9Uzt/RUr0YOnWiqj+7A/X0Vp6W5GuqSD5bdGjPIT9z:YsgB2yoQ4k/ECW5Gu5xdGjPIT9
Malware Config
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral1/memory/2256-1-0x0000000000D10000-0x0000000000EC2000-memory.dmp family_zgrat_v1 behavioral1/files/0x0008000000015fd4-16.dat family_zgrat_v1 behavioral1/memory/2672-26-0x0000000000FC0000-0x0000000001172000-memory.dmp family_zgrat_v1 -
Executes dropped EXE 1 IoCs
pid Process 2672 winlogon.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\SpeechEngines\Microsoft\7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe File created C:\Program Files\Common Files\SpeechEngines\Microsoft\cdbf6a1f35c883 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2744 PING.EXE -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe 2672 winlogon.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2672 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe Token: SeDebugPrivilege 2672 winlogon.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2604 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 28 PID 2256 wrote to memory of 2604 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 28 PID 2256 wrote to memory of 2604 2256 7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe 28 PID 2604 wrote to memory of 2712 2604 cmd.exe 30 PID 2604 wrote to memory of 2712 2604 cmd.exe 30 PID 2604 wrote to memory of 2712 2604 cmd.exe 30 PID 2604 wrote to memory of 2744 2604 cmd.exe 31 PID 2604 wrote to memory of 2744 2604 cmd.exe 31 PID 2604 wrote to memory of 2744 2604 cmd.exe 31 PID 2604 wrote to memory of 2672 2604 cmd.exe 32 PID 2604 wrote to memory of 2672 2604 cmd.exe 32 PID 2604 wrote to memory of 2672 2604 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uMxftNTFwp.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2712
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:2744
-
-
C:\Users\Default\Music\winlogon.exe"C:\Users\Default\Music\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\SpeechEngines\Microsoft\7c12d48df8f08a95701197c514269a50_NeikiAnalytics.exe
Filesize1.7MB
MD57c12d48df8f08a95701197c514269a50
SHA14f99360c54ad2cce0afe14ddb37697f6777795c8
SHA2566ef54df3017339537b7649647096dcbc2b9fefea5b49776d8c80c38726b3698f
SHA51237ed65a444ceba50af00e7570856cf3ae275bdbcb2acf6b72e0c3d3a6ba0361f0e1bf93ef1ae7a011dfc670c9840c43d88978c114f9f688bac1eff8f6d83b80d
-
Filesize
163B
MD586d4463f3a3d594db74c6b2d70cca6ad
SHA114c967a34381795944a7050a14af33e808dfea6f
SHA25621f2fe20a1aecc3800e44c6faf1027fa695c94cfbcd6c1dddf27721411940b4e
SHA512e250b9a2ae578068f295f9b2cbe4c486dbea3cb90e8caae1e4a08c945ee5be4a5afe584ef2fe1839127115964966e3c905fde84dc0f17d717550a73e6623e542