Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 21:45
Behavioral task
behavioral1
Sample
41bd68b9e01c2019478cb811b44cffb0_NEIKI.exe
Resource
win7-20240215-en
General
-
Target
41bd68b9e01c2019478cb811b44cffb0_NEIKI.exe
-
Size
119KB
-
MD5
41bd68b9e01c2019478cb811b44cffb0
-
SHA1
6fa177eb529a76f734361fc321854a4b0d938fad
-
SHA256
c83adba97cd5425d70aa5f5cc452554573e61312c835e18d9d050edf84924fc5
-
SHA512
e4134d34f2fe34f6cd630547abe82f868646d6ee72a173c90280847eaa6caad6297f94e0f285de340a90a1717e0f40bb7d2297a53c8b2395e8a74628b72f9812
-
SSDEEP
3072:ZaztXZwwoPpqDecIIbxqH4QWVzCrAZuD4x:U1nDeBIbUk
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7005624592:AAFT1GroRFjOnavaa8nJipFR-iCuYT3f2xQ/sendMessage?chat_id=6235796510
Signatures
-
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2496 rat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2692 schtasks.exe 2132 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2600 timeout.exe 2460 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2724 tasklist.exe 2544 tasklist.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2496 rat.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2496 rat.exe 2496 rat.exe 2496 rat.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2700 41bd68b9e01c2019478cb811b44cffb0_NEIKI.exe Token: SeDebugPrivilege 2724 tasklist.exe Token: SeDebugPrivilege 2544 tasklist.exe Token: SeDebugPrivilege 2496 rat.exe Token: SeDebugPrivilege 2496 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2496 rat.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2692 2700 41bd68b9e01c2019478cb811b44cffb0_NEIKI.exe 30 PID 2700 wrote to memory of 2692 2700 41bd68b9e01c2019478cb811b44cffb0_NEIKI.exe 30 PID 2700 wrote to memory of 2692 2700 41bd68b9e01c2019478cb811b44cffb0_NEIKI.exe 30 PID 2700 wrote to memory of 2752 2700 41bd68b9e01c2019478cb811b44cffb0_NEIKI.exe 32 PID 2700 wrote to memory of 2752 2700 41bd68b9e01c2019478cb811b44cffb0_NEIKI.exe 32 PID 2700 wrote to memory of 2752 2700 41bd68b9e01c2019478cb811b44cffb0_NEIKI.exe 32 PID 2752 wrote to memory of 2724 2752 cmd.exe 34 PID 2752 wrote to memory of 2724 2752 cmd.exe 34 PID 2752 wrote to memory of 2724 2752 cmd.exe 34 PID 2752 wrote to memory of 2720 2752 cmd.exe 35 PID 2752 wrote to memory of 2720 2752 cmd.exe 35 PID 2752 wrote to memory of 2720 2752 cmd.exe 35 PID 2752 wrote to memory of 2600 2752 cmd.exe 36 PID 2752 wrote to memory of 2600 2752 cmd.exe 36 PID 2752 wrote to memory of 2600 2752 cmd.exe 36 PID 2752 wrote to memory of 2544 2752 cmd.exe 37 PID 2752 wrote to memory of 2544 2752 cmd.exe 37 PID 2752 wrote to memory of 2544 2752 cmd.exe 37 PID 2752 wrote to memory of 2044 2752 cmd.exe 38 PID 2752 wrote to memory of 2044 2752 cmd.exe 38 PID 2752 wrote to memory of 2044 2752 cmd.exe 38 PID 2752 wrote to memory of 2460 2752 cmd.exe 39 PID 2752 wrote to memory of 2460 2752 cmd.exe 39 PID 2752 wrote to memory of 2460 2752 cmd.exe 39 PID 2752 wrote to memory of 2496 2752 cmd.exe 40 PID 2752 wrote to memory of 2496 2752 cmd.exe 40 PID 2752 wrote to memory of 2496 2752 cmd.exe 40 PID 2496 wrote to memory of 2132 2496 rat.exe 42 PID 2496 wrote to memory of 2132 2496 rat.exe 42 PID 2496 wrote to memory of 2132 2496 rat.exe 42 PID 2496 wrote to memory of 1140 2496 rat.exe 44 PID 2496 wrote to memory of 1140 2496 rat.exe 44 PID 2496 wrote to memory of 1140 2496 rat.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\41bd68b9e01c2019478cb811b44cffb0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\41bd68b9e01c2019478cb811b44cffb0_NEIKI.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Creates scheduled task(s)
PID:2692
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpDF5.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpDF5.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2700"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2720
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2600
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2700"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2044
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2460
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Creates scheduled task(s)
PID:2132
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2496 -s 17284⤵PID:1140
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215B
MD5406306f5f2cf2a80a46685e3450becc4
SHA189497b2f497e11a74ca109a696764c4ca2033e93
SHA256f06144d4f8ea3d785cbd839dc2115bfefe6b0c8a6678aa323019748d86adbf01
SHA512acb03b79b9004444492efea0d8dc98e54fa47e62e6112f906301344363b8a23671e6025792482073ee29850656264514af134bb30881cfffd042a28369e2c273
-
Filesize
119KB
MD541bd68b9e01c2019478cb811b44cffb0
SHA16fa177eb529a76f734361fc321854a4b0d938fad
SHA256c83adba97cd5425d70aa5f5cc452554573e61312c835e18d9d050edf84924fc5
SHA512e4134d34f2fe34f6cd630547abe82f868646d6ee72a173c90280847eaa6caad6297f94e0f285de340a90a1717e0f40bb7d2297a53c8b2395e8a74628b72f9812