Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 05:48
Behavioral task
behavioral1
Sample
8efdaa1c26961e288337f6cbd7ea1d10_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8efdaa1c26961e288337f6cbd7ea1d10_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
8efdaa1c26961e288337f6cbd7ea1d10_NeikiAnalytics.exe
-
Size
2.0MB
-
MD5
8efdaa1c26961e288337f6cbd7ea1d10
-
SHA1
3c22c191b7868ae0113ccae3a04b21c101178d63
-
SHA256
2977b49435cf94d6712ff27c2551b28c0de991518195ab979647e1bda6b355dc
-
SHA512
c2f0c2a72a6ce1f1ab53e83f79d9dd80c673fa64ad0275246b0cd7b781423e81502f6319f0fb63ff10d308bafd05431b39d00833463c041e7e2c3ade4ae63c5c
-
SSDEEP
49152:7rYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:7dxVJC9UqRzsu+8N
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Processes:
resource yara_rule behavioral2/memory/2024-1-0x0000000000A90000-0x0000000000C9A000-memory.dmp dcrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8efdaa1c26961e288337f6cbd7ea1d10_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 2024 8efdaa1c26961e288337f6cbd7ea1d10_NeikiAnalytics.exe