Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 08:43
Behavioral task
behavioral1
Sample
cb8a2d43dd88c97713fbeb25dd991710_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb8a2d43dd88c97713fbeb25dd991710_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
cb8a2d43dd88c97713fbeb25dd991710_NeikiAnalytics.exe
-
Size
2.0MB
-
MD5
cb8a2d43dd88c97713fbeb25dd991710
-
SHA1
cbf20845a4e8979b1d649eac952c69eee12369a2
-
SHA256
de17d3cae2561409bdf3c069d9e3945fa5d8795cf4a3886ca3aa30fd550839e0
-
SHA512
960655895c7bb66c1047fbb8b58e71d656294ddf973efc57b2d895f4eb96846fa2d81f94834d9a7f7e15f5969ad99371ddab6a192d4544e8de2aa0731690468d
-
SSDEEP
49152:brYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:bdxVJC9UqRzsu+8N
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Processes:
resource yara_rule behavioral1/memory/1928-1-0x0000000000360000-0x000000000056A000-memory.dmp dcrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
cb8a2d43dd88c97713fbeb25dd991710_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 1928 cb8a2d43dd88c97713fbeb25dd991710_NeikiAnalytics.exe