Analysis
-
max time kernel
149s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
6d929c9463093aa3e5d926e6022279e0_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6d929c9463093aa3e5d926e6022279e0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
6d929c9463093aa3e5d926e6022279e0_NEIKI.exe
-
Size
4.1MB
-
MD5
6d929c9463093aa3e5d926e6022279e0
-
SHA1
04d41ef376437fa452bc9ae6a11da425f73ba4f8
-
SHA256
66aa2cbfbadbbdca164b6fa629db85d941543e3f8dee68663482d9f7a56d78df
-
SHA512
c8990ae2fbcba7ddc319ffb1bb674b11d82c96f36304f44a95ecd7bf4e37664d21ab1502cf576a5370fad9bda259e758559525abbde56f09bde075a4c64e5def
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSp84ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdm75n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3840 xoptiloc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesDS\\xoptiloc.exe" 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintGH\\dobaec.exe" 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 3840 xoptiloc.exe 3840 xoptiloc.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2540 wrote to memory of 3840 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 91 PID 2540 wrote to memory of 3840 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 91 PID 2540 wrote to memory of 3840 2540 6d929c9463093aa3e5d926e6022279e0_NEIKI.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d929c9463093aa3e5d926e6022279e0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\6d929c9463093aa3e5d926e6022279e0_NEIKI.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\FilesDS\xoptiloc.exeC:\FilesDS\xoptiloc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5961874f8f85bda0f75f3e203933c0c00
SHA129162f4573ec6cbb3a27f4d7485725881e91ea47
SHA25632735afc5f8a192d37c53e8c822dc737d19493fe9a789a10a780f245c27dcb9a
SHA512aef5858ce1e35bcf6e5a8565a459f5433e9a5bf8d00db0cfa60e450e741a1a2a6451d009a5dc8e9cc09a3be0db386bd4cada0bd842bbb86600c74cfd55ab514d
-
Filesize
4.1MB
MD5015a5e62cc948a4001bee1671a6d0697
SHA163ff1cd1756393c78f1e8641f19f085158300419
SHA25685e5926e933851b4a425b78731894b601c5eed6f5ce52e9c0264811e95c20c8d
SHA5124a188fbcb203503b42ec4ede5122e0394ffdfe65e1d22155f0a1ca74037e706e20f4ee38e02f2d09a755d16fa793ddb535ab37186ba4d70fe520501928fadbe4
-
Filesize
200B
MD59e3bbfb13729093c8e33ee61263768d2
SHA1950b562f689e01a9560a976aae44afa440892bce
SHA2561c05c66ea4a2b0a9c96333c9988c45c61c23b1dbac9e3143e5522f06a7ce0cb6
SHA512cbeb1c622a0d605da9e4b564c50d1813c4ae5bada9fd8678def3a25a2fbb6fed43c8ebb8858edf39b69c8ef40227771e461ad5ce94358c21523f7cc342bdd7b4