Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 23:17
Static task
static1
Behavioral task
behavioral1
Sample
61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe
-
Size
4.1MB
-
MD5
61e73e8a4d1b219b81781c5c4a750a30
-
SHA1
f7b9d3e26f946e2a976eb465683274496bab227c
-
SHA256
53c9d4a01e8909b1ee0a76993aa8f7da8cc3b539f16b2fce2ebf3d5d2569afd1
-
SHA512
8557a29364eaf395d3356240a5d356f8863c8e07ac87cc3f151c33b859bd4a5259dcb7cf681af14c1fc5d2cd825cf3433a9c4d61963e47fc012809cbe365bbf9
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpH4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmc5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2488 abodsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot1R\\abodsys.exe" 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Mint8C\\dobdevsys.exe" 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 2488 abodsys.exe 2488 abodsys.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4888 wrote to memory of 2488 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 91 PID 4888 wrote to memory of 2488 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 91 PID 4888 wrote to memory of 2488 4888 61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\61e73e8a4d1b219b81781c5c4a750a30_NEIKI.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\UserDot1R\abodsys.exeC:\UserDot1R\abodsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD52a66be02c3c27b489db2b8f5953bfa44
SHA1242635a3ee1d142a92bde39c7a1cc5f12f53958b
SHA25603c57c4403a457ba972b4a8fdf0a50876ef50b8a586b9366482ff3c6b84629f8
SHA5128aaf81d458a35a958dddb5bc34416bc1e466d0c165d37c2b731745a84fe3083d42dafb1a1f3ef64045127ac64eba2d82205268cb3b08604e71997aec0d2ce625
-
Filesize
4.1MB
MD59cef56cc4094f380367808a9cbabc532
SHA1c01ff5251418c07fd08c91f957a060e074f034a7
SHA256f1cbd31334d7601fd4aa05506c9d180a31ec30fd40011414408ef1e4c6428070
SHA5122abeda03c1108b745e8218b9d1af8152e58d2bc2e540945700dcdb98b5515deafb3f75cd511ff986d0ed3439a02de7eae579bd5d234108449e27a40a82d0b6ef
-
Filesize
4.1MB
MD5326643f4e7559b5a9639c4a654ae0599
SHA153b6df7e7348c42188e734fc3019d9523ee1f167
SHA256d03b0a3d03f744448f7e65cc3ee4514525ab09498aaf5f9c032a52e948793b09
SHA512a866b593c73b6e58c5497b4240f3d9630d3bd61eca902138d0c67d09f26872e1e2dd876fc6c571a1ac7e8a52c6b6cfa9ce946ce4a5cdc27002414ff9fd1e758c
-
Filesize
206B
MD5dd204b3ade71543651e046f5feb99437
SHA11430a398a8f37e47f83193d3e5cb9794ae66cd8a
SHA2566e0db0efcfc1d8e91c5794ca6120c233faae8cecfad72b259fbadce77f1122be
SHA512495239fe4084643aeb4da9f98ad078d6cbae492e8754665a037a3e8b0ce6fb7373a46a83821cfa030c1dc71db80a35ec89e45f25cc22efea4cf5403c7b5eee43