Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 23:51

General

  • Target

    6d929c9463093aa3e5d926e6022279e0_NEIKI.exe

  • Size

    4.1MB

  • MD5

    6d929c9463093aa3e5d926e6022279e0

  • SHA1

    04d41ef376437fa452bc9ae6a11da425f73ba4f8

  • SHA256

    66aa2cbfbadbbdca164b6fa629db85d941543e3f8dee68663482d9f7a56d78df

  • SHA512

    c8990ae2fbcba7ddc319ffb1bb674b11d82c96f36304f44a95ecd7bf4e37664d21ab1502cf576a5370fad9bda259e758559525abbde56f09bde075a4c64e5def

  • SSDEEP

    98304:+R0pI/IQlUoMPdmpSp84ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdm75n9klRKN41v

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d929c9463093aa3e5d926e6022279e0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\6d929c9463093aa3e5d926e6022279e0_NEIKI.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\UserDotRR\aoptiloc.exe
      C:\UserDotRR\aoptiloc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MintUW\optialoc.exe

    Filesize

    4.1MB

    MD5

    037712a535eb77bbdb0116bf33ca07d2

    SHA1

    1ab87227fb05adef4f1c5f6e9022749e75010c6a

    SHA256

    17aa80ce4e93ac0e3034b67cdfe21761d83062f20c737ba9baa82de985542607

    SHA512

    9ecf39b156949f260cdc77c4d0eff47075b94e1883ddafebe41e58945402dc61b283441c3571a12620c1d190367d8097b0e1f7cd89254ab65d9d1980f945c066

  • C:\Users\Admin\253086396416_6.1_Admin.ini

    Filesize

    205B

    MD5

    54b1c4b2b7d13f6d3c8cc18fa24f247e

    SHA1

    26296b245a60fce8f232f3030748a5e1d5377a95

    SHA256

    54b5da9a59c4e50faa09c9ed51ed4b859a41e686b9c1f282cbe361a8e1eb763d

    SHA512

    a7cb2b27fefc093a8fed1107b5d28ada7463db4b41586ed00c661278898667c7824e7a6c2391e45da99c353988da4cb94e5c14e9bb746cf978f3a05af491a422

  • \UserDotRR\aoptiloc.exe

    Filesize

    4.1MB

    MD5

    5dbcf960fb9dfd0a51cf3780722c90a8

    SHA1

    8be5b6d305e4b29fefa3fb3f81c44a3d213bd599

    SHA256

    c78402327b83af216057d00e8389b88bfc9ed5c5b9a8a86d610bb09e5d103d67

    SHA512

    27417a05186b9a647be4ee35a869b74885a008d57c5eb41db529deb9fbd24c6ee5dcd78b311a03216447f64f4c12452dfc2fac988e7abcb074b3da7c6ff66e9a