Analysis

  • max time kernel
    23s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 22:53

General

  • Target

    5961c69cbc93fd9108c4c1cd712d37f0_NEIKI.exe

  • Size

    115KB

  • MD5

    5961c69cbc93fd9108c4c1cd712d37f0

  • SHA1

    12fffb063f5d873e815e699134402e3877a4025a

  • SHA256

    68557a0d7550d0b92a1032bae395b16752706dbc409d046327679afd8a959f28

  • SHA512

    30b26cba58210619c07856660f6fb96db0ece4a78725e1c317efdd3433453baa0b997e75015e4a49db4fdfcb4004b1f9a72efca028a1c608497777a79c191c87

  • SSDEEP

    3072:HQC/yj5JO3MnOG+Hu54Fx4xE8KoN5Cfsa:wlj7cMnf+OEX1O50

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5961c69cbc93fd9108c4c1cd712d37f0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\5961c69cbc93fd9108c4c1cd712d37f0_NEIKI.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:396
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1964
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev3875.tmp!C:\Users\Admin\AppData\Local\Temp\5961c69cbc93fd9108c4c1cd712d37f0_NEIKI.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Users\Admin\AppData\Local\Temp\5961C69CBC93FD9108C4C1CD712D37F0_NEIKI.EXE
        3⤵
        • Executes dropped EXE
        PID:4272
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev3875.tmp!C:\Users\Admin\AppData\Local\Temp\5961C69CBC93FD9108C4C1CD712D37F0_NEIKI.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1772

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5961c69cbc93fd9108c4c1cd712d37f0_NEIKI.exe

          Filesize

          115KB

          MD5

          444972e74177c951a6604a048c55a221

          SHA1

          244c525ee0957587377c29ebbed6a79058c419f6

          SHA256

          e0944d9bf6b36953ca62ba6fb854fa1b527a3563c8691ee1c24ebb51691db00c

          SHA512

          b255b6ba0c85a4e550aef982f7ec65116e02e0c3bfb9ab66c45387c66ae6c300f91b85b233287fa571f2b44746159fc2aceb5202851d937c8ac9cba0d9bdb022

        • C:\Windows\MSWDM.EXE

          Filesize

          80KB

          MD5

          a188be975f50da7944d1ca6c25704225

          SHA1

          88ea7c4e26a13883c3bfa4bdf198e31b9dabbce0

          SHA256

          a64d566dd3b6d909d66f8bdaa88d988d88377b44d8b1ef2a603aa4972a213c9a

          SHA512

          6aada9e74ced47386eed3b752fe8f03e1e8900f570cb9b7501be3305f64497c8657519eca06f7e965d165b4b3f84d1d753e99f90eb16b00e213d5a575bbfb536

        • C:\Windows\dev3875.tmp

          Filesize

          35KB

          MD5

          6a7c4dc0fe5a8a33154566b5071b47c4

          SHA1

          265a1bcc6b6a6be7a7ad35194fb4984d7bb7ef88

          SHA256

          152944690bb39772fc594430205be704f7068c7a4bbcbe58074ebceab9911cf4

          SHA512

          8340ed45634757d05c95031541e8f655aabc7c7f4eab2caaf623c8b34bd0b2b08bb2c30f5f34faaee176b18730607308d492b1be10e098837fb6a450f344cf3e

        • memory/396-0-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/396-8-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1772-19-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1964-10-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/1964-24-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2728-11-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2728-23-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB