Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 23:03
Static task
static1
Behavioral task
behavioral1
Sample
5ce626cc979bced4df80a332aa794800_NEIKI.dll
Resource
win7-20240221-en
General
-
Target
5ce626cc979bced4df80a332aa794800_NEIKI.dll
-
Size
1.8MB
-
MD5
5ce626cc979bced4df80a332aa794800
-
SHA1
31f289af6916a9e20780333e928710df52da459d
-
SHA256
445accea40bee73a661f478c9bfd5c9129b49ad86971a3cb25dae06f1a572a14
-
SHA512
40473c862c21c3cd44aabdc8ee4b232be2ffb20973049f7deebe792816d43b7e27788d89197a50ff5a9d5f282374a1fd830c0f8f2fdf6663864c853b06cd5090
-
SSDEEP
12288:m38uea4w46+K1FZPfxyMs2SRXTajPomqkpyrJXy6mfvHELWUbxdewWRa7Ckhkgjj:M8uea4w467D5/0ypyFYELW8xFZmMXJZ
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1176-4-0x0000000002200000-0x0000000002201000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/1280-1-0x0000000140000000-0x00000001401D9000-memory.dmp dridex_payload behavioral1/memory/1176-37-0x0000000140000000-0x00000001401D9000-memory.dmp dridex_payload behavioral1/memory/1176-50-0x0000000140000000-0x00000001401D9000-memory.dmp dridex_payload behavioral1/memory/1176-48-0x0000000140000000-0x00000001401D9000-memory.dmp dridex_payload behavioral1/memory/1280-57-0x0000000140000000-0x00000001401D9000-memory.dmp dridex_payload behavioral1/memory/2520-66-0x0000000140000000-0x00000001401DB000-memory.dmp dridex_payload behavioral1/memory/2520-69-0x0000000140000000-0x00000001401DB000-memory.dmp dridex_payload behavioral1/memory/888-89-0x0000000140000000-0x00000001401DA000-memory.dmp dridex_payload behavioral1/memory/888-93-0x0000000140000000-0x00000001401DA000-memory.dmp dridex_payload behavioral1/memory/2852-105-0x0000000140000000-0x000000014020D000-memory.dmp dridex_payload behavioral1/memory/2852-109-0x0000000140000000-0x000000014020D000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
mmc.exepsr.exemsdt.exepid process 2520 mmc.exe 888 psr.exe 2852 msdt.exe -
Loads dropped DLL 7 IoCs
Processes:
mmc.exepsr.exemsdt.exepid process 1176 2520 mmc.exe 1176 888 psr.exe 1176 2852 msdt.exe 1176 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uxhwu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\bQen9PW3to\\psr.exe" -
Processes:
msdt.exerundll32.exemmc.exepsr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mmc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1280 rundll32.exe 1280 rundll32.exe 1280 rundll32.exe 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 1176 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1176 wrote to memory of 2444 1176 mmc.exe PID 1176 wrote to memory of 2444 1176 mmc.exe PID 1176 wrote to memory of 2444 1176 mmc.exe PID 1176 wrote to memory of 2520 1176 mmc.exe PID 1176 wrote to memory of 2520 1176 mmc.exe PID 1176 wrote to memory of 2520 1176 mmc.exe PID 1176 wrote to memory of 1496 1176 psr.exe PID 1176 wrote to memory of 1496 1176 psr.exe PID 1176 wrote to memory of 1496 1176 psr.exe PID 1176 wrote to memory of 888 1176 psr.exe PID 1176 wrote to memory of 888 1176 psr.exe PID 1176 wrote to memory of 888 1176 psr.exe PID 1176 wrote to memory of 928 1176 msdt.exe PID 1176 wrote to memory of 928 1176 msdt.exe PID 1176 wrote to memory of 928 1176 msdt.exe PID 1176 wrote to memory of 2852 1176 msdt.exe PID 1176 wrote to memory of 2852 1176 msdt.exe PID 1176 wrote to memory of 2852 1176 msdt.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ce626cc979bced4df80a332aa794800_NEIKI.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe1⤵
-
C:\Users\Admin\AppData\Local\fG6h\mmc.exeC:\Users\Admin\AppData\Local\fG6h\mmc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵
-
C:\Users\Admin\AppData\Local\7wx4oZsu\psr.exeC:\Users\Admin\AppData\Local\7wx4oZsu\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵
-
C:\Users\Admin\AppData\Local\FwAQIJCp\msdt.exeC:\Users\Admin\AppData\Local\FwAQIJCp\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\7wx4oZsu\XmlLite.dllFilesize
1.9MB
MD5a4a6d24c1292ef3aa2ba391585738850
SHA17a074a19dec67f544617c59b327fb0144bcec24a
SHA25669cee235ea4acfaf51c8eadbdb4e25f2b6d6683930f4c03e69fa040de2ab4ecc
SHA5123d67992a71b1b8f32665ee4261405fb60c2ee099bd4e35c9bc64c8cbb0b313dcff3906fe62181c4ac04e1be19afcc5058f0390f84db99742a63b105daf88c1a6
-
C:\Users\Admin\AppData\Local\FwAQIJCp\DUI70.dllFilesize
2.1MB
MD557a05f9fafce655812e384f58e11a69c
SHA15275e813fcaf15bb6f6cf316fa2d3c2fb874d8ce
SHA2561242ce5731a316b77fe57828a46ec4cc236b5ef402847fab981fd78a78e20b4b
SHA512c712ac2ab336cd79cf2383c386eee55ff2d1ab0db4d30d387db661b0eca772463683b40f373b70024518bbf0f205c18c0bfb13ede06141e17655449a2a0bdf72
-
C:\Users\Admin\AppData\Local\fG6h\mmcbase.DLLFilesize
1.9MB
MD56ce7732b811506c071ab07aa73306008
SHA10e5b0be3d9864ec4322a0e2a9759655b343517f2
SHA256901d2354624d2321358cb38cace44465f676bb04283a09466866f76829db838b
SHA512b190d27883f73fcd0bccb94e6e454ee7ea4a6cb19717e2d9848e574fa9f9a65fc496015be5c79d37e0a64a1e4f645f23e4df550078a379bfeec8553bed6b079b
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Dgsmy.lnkFilesize
1KB
MD505236a37bedc3b5e10e6dc6ee4c96bbc
SHA156943d8b32aeeceead4ac7a45c6ff7a90059058c
SHA2561dd4ce1e7dbb08b7b635f845ce8096ef00509e65f23480e491f6cc8603fb2bc6
SHA5121c190a1804fbc67444aa340b5e8a01e5e1517e2e08fa58897d3f61154ba8c0d5e7337d6a6a8fa6766ddb1c37888d2c1bab992236dde553af02b481cd2b11cff1
-
\Users\Admin\AppData\Local\7wx4oZsu\psr.exeFilesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
\Users\Admin\AppData\Local\FwAQIJCp\msdt.exeFilesize
1.0MB
MD5aecb7b09566b1f83f61d5a4b44ae9c7e
SHA13a4a2338c6b5ac833dc87497e04fe89c5481e289
SHA256fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5
SHA5126e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746
-
\Users\Admin\AppData\Local\fG6h\mmc.exeFilesize
2.0MB
MD59fea051a9585f2a303d55745b4bf63aa
SHA1f5dc12d658402900a2b01af2f018d113619b96b8
SHA256b212e59e4c7fe77f6f189138d9d8b151e50eb83a35d6eadfb1e4bb0b4262c484
SHA512beba79f0b6710929871fbdf378d3c0a41f230ac30cbfa87173f7b77c35e06425f48db42ed3b16d5d9bcb7ef0098dffcd0d2947da8fb7ec1136ea62205f1afc76
-
memory/888-93-0x0000000140000000-0x00000001401DA000-memory.dmpFilesize
1.9MB
-
memory/888-89-0x0000000140000000-0x00000001401DA000-memory.dmpFilesize
1.9MB
-
memory/888-88-0x00000000000F0000-0x00000000000F7000-memory.dmpFilesize
28KB
-
memory/1176-16-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-36-0x00000000021E0000-0x00000000021E7000-memory.dmpFilesize
28KB
-
memory/1176-15-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-14-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-37-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-27-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-26-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-24-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-23-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-22-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-21-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-20-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-19-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-17-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-7-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-13-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-12-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-11-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-9-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-8-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-39-0x0000000077630000-0x0000000077632000-memory.dmpFilesize
8KB
-
memory/1176-38-0x0000000077600000-0x0000000077602000-memory.dmpFilesize
8KB
-
memory/1176-50-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-48-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-3-0x0000000077396000-0x0000000077397000-memory.dmpFilesize
4KB
-
memory/1176-4-0x0000000002200000-0x0000000002201000-memory.dmpFilesize
4KB
-
memory/1176-10-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-18-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-25-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-28-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-6-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1176-87-0x0000000077396000-0x0000000077397000-memory.dmpFilesize
4KB
-
memory/1280-57-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1280-1-0x0000000140000000-0x00000001401D9000-memory.dmpFilesize
1.8MB
-
memory/1280-2-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/2520-65-0x0000000000410000-0x0000000000417000-memory.dmpFilesize
28KB
-
memory/2520-66-0x0000000140000000-0x00000001401DB000-memory.dmpFilesize
1.9MB
-
memory/2520-69-0x0000000140000000-0x00000001401DB000-memory.dmpFilesize
1.9MB
-
memory/2852-105-0x0000000140000000-0x000000014020D000-memory.dmpFilesize
2.1MB
-
memory/2852-109-0x0000000140000000-0x000000014020D000-memory.dmpFilesize
2.1MB