Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
6d929c9463093aa3e5d926e6022279e0_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6d929c9463093aa3e5d926e6022279e0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
6d929c9463093aa3e5d926e6022279e0_NEIKI.exe
-
Size
4.1MB
-
MD5
6d929c9463093aa3e5d926e6022279e0
-
SHA1
04d41ef376437fa452bc9ae6a11da425f73ba4f8
-
SHA256
66aa2cbfbadbbdca164b6fa629db85d941543e3f8dee68663482d9f7a56d78df
-
SHA512
c8990ae2fbcba7ddc319ffb1bb674b11d82c96f36304f44a95ecd7bf4e37664d21ab1502cf576a5370fad9bda259e758559525abbde56f09bde075a4c64e5def
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSp84ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdm75n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2464 aoptiloc.exe -
Loads dropped DLL 1 IoCs
pid Process 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDotRR\\aoptiloc.exe" 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintUW\\optialoc.exe" 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2464 aoptiloc.exe 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2464 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 28 PID 2080 wrote to memory of 2464 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 28 PID 2080 wrote to memory of 2464 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 28 PID 2080 wrote to memory of 2464 2080 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d929c9463093aa3e5d926e6022279e0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\6d929c9463093aa3e5d926e6022279e0_NEIKI.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\UserDotRR\aoptiloc.exeC:\UserDotRR\aoptiloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5037712a535eb77bbdb0116bf33ca07d2
SHA11ab87227fb05adef4f1c5f6e9022749e75010c6a
SHA25617aa80ce4e93ac0e3034b67cdfe21761d83062f20c737ba9baa82de985542607
SHA5129ecf39b156949f260cdc77c4d0eff47075b94e1883ddafebe41e58945402dc61b283441c3571a12620c1d190367d8097b0e1f7cd89254ab65d9d1980f945c066
-
Filesize
205B
MD554b1c4b2b7d13f6d3c8cc18fa24f247e
SHA126296b245a60fce8f232f3030748a5e1d5377a95
SHA25654b5da9a59c4e50faa09c9ed51ed4b859a41e686b9c1f282cbe361a8e1eb763d
SHA512a7cb2b27fefc093a8fed1107b5d28ada7463db4b41586ed00c661278898667c7824e7a6c2391e45da99c353988da4cb94e5c14e9bb746cf978f3a05af491a422
-
Filesize
4.1MB
MD55dbcf960fb9dfd0a51cf3780722c90a8
SHA18be5b6d305e4b29fefa3fb3f81c44a3d213bd599
SHA256c78402327b83af216057d00e8389b88bfc9ed5c5b9a8a86d610bb09e5d103d67
SHA51227417a05186b9a647be4ee35a869b74885a008d57c5eb41db529deb9fbd24c6ee5dcd78b311a03216447f64f4c12452dfc2fac988e7abcb074b3da7c6ff66e9a