Analysis

  • max time kernel
    149s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 23:51

General

  • Target

    6d929c9463093aa3e5d926e6022279e0_NEIKI.exe

  • Size

    4.1MB

  • MD5

    6d929c9463093aa3e5d926e6022279e0

  • SHA1

    04d41ef376437fa452bc9ae6a11da425f73ba4f8

  • SHA256

    66aa2cbfbadbbdca164b6fa629db85d941543e3f8dee68663482d9f7a56d78df

  • SHA512

    c8990ae2fbcba7ddc319ffb1bb674b11d82c96f36304f44a95ecd7bf4e37664d21ab1502cf576a5370fad9bda259e758559525abbde56f09bde075a4c64e5def

  • SSDEEP

    98304:+R0pI/IQlUoMPdmpSp84ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdm75n9klRKN41v

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d929c9463093aa3e5d926e6022279e0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\6d929c9463093aa3e5d926e6022279e0_NEIKI.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\FilesDS\xoptiloc.exe
      C:\FilesDS\xoptiloc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\FilesDS\xoptiloc.exe

    Filesize

    4.1MB

    MD5

    961874f8f85bda0f75f3e203933c0c00

    SHA1

    29162f4573ec6cbb3a27f4d7485725881e91ea47

    SHA256

    32735afc5f8a192d37c53e8c822dc737d19493fe9a789a10a780f245c27dcb9a

    SHA512

    aef5858ce1e35bcf6e5a8565a459f5433e9a5bf8d00db0cfa60e450e741a1a2a6451d009a5dc8e9cc09a3be0db386bd4cada0bd842bbb86600c74cfd55ab514d

  • C:\MintGH\dobaec.exe

    Filesize

    4.1MB

    MD5

    015a5e62cc948a4001bee1671a6d0697

    SHA1

    63ff1cd1756393c78f1e8641f19f085158300419

    SHA256

    85e5926e933851b4a425b78731894b601c5eed6f5ce52e9c0264811e95c20c8d

    SHA512

    4a188fbcb203503b42ec4ede5122e0394ffdfe65e1d22155f0a1ca74037e706e20f4ee38e02f2d09a755d16fa793ddb535ab37186ba4d70fe520501928fadbe4

  • C:\Users\Admin\253086396416_10.0_Admin.ini

    Filesize

    200B

    MD5

    9e3bbfb13729093c8e33ee61263768d2

    SHA1

    950b562f689e01a9560a976aae44afa440892bce

    SHA256

    1c05c66ea4a2b0a9c96333c9988c45c61c23b1dbac9e3143e5522f06a7ce0cb6

    SHA512

    cbeb1c622a0d605da9e4b564c50d1813c4ae5bada9fd8678def3a25a2fbb6fed43c8ebb8858edf39b69c8ef40227771e461ad5ce94358c21523f7cc342bdd7b4