Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
22d923c6112dff9b77a9415e5a828360_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22d923c6112dff9b77a9415e5a828360_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
22d923c6112dff9b77a9415e5a828360_NEIKI.exe
-
Size
480KB
-
MD5
22d923c6112dff9b77a9415e5a828360
-
SHA1
fb53bf4d6e739b075d86751496f09b6132b4e96f
-
SHA256
e25bf80b85b938e1cb224183bac52094a55b0a12f75e806c980f8a92c0a745cc
-
SHA512
ac5b2cf2103c12d0e4fed97825c6ea1d5ae1d969f2e976cfbffd76cb8cea0bdb16e0f823e09fec08c5ad6027eff09280e94092c6c27288fb7765326be99bb293
-
SSDEEP
6144:AjlYKRF/LReWAsUySBaIL6GUDfz3Cv2c8wkZdlZCGugvrcjHqLzgzId+KBtccqd:AjauDReWEpL6GCDCmrlZCxKLzznp6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1328 ghjifh.exe -
Loads dropped DLL 2 IoCs
pid Process 2336 22d923c6112dff9b77a9415e5a828360_NEIKI.exe 2336 22d923c6112dff9b77a9415e5a828360_NEIKI.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\ghjifh.exe" ghjifh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1328 2336 22d923c6112dff9b77a9415e5a828360_NEIKI.exe 30 PID 2336 wrote to memory of 1328 2336 22d923c6112dff9b77a9415e5a828360_NEIKI.exe 30 PID 2336 wrote to memory of 1328 2336 22d923c6112dff9b77a9415e5a828360_NEIKI.exe 30 PID 2336 wrote to memory of 1328 2336 22d923c6112dff9b77a9415e5a828360_NEIKI.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\22d923c6112dff9b77a9415e5a828360_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\22d923c6112dff9b77a9415e5a828360_NEIKI.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\ProgramData\ghjifh.exe"C:\ProgramData\ghjifh.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD5bf47fa400ba8ef8261e39bf10a4df7d1
SHA1b30e39e113ffa3927c50336848c5f78800d73e73
SHA256d28730b75c617742cf4d2da71c4b155354e1368c3a57d546b687e40d0aed4ef5
SHA51251c51b0984326d6898482a18b24bbe58b09cfde98e2f971f9abf3e40782b825c24da718722b49110f5736b12147c0cf0154c1904a5f4560e326a7b8cbd089538
-
Filesize
136KB
MD52bd01b99551cc639ddb5cb66914904a6
SHA150beb8bab8be15271951130ac833eb19566f9333
SHA2569764e531dd52e37a454c7f052a17fe7b68821dc3570286aab7bb4706639efe40
SHA512374436459d62bdd62fc79b779e5aef155d7b8817e3d64e53639130be49d061a251d04a3882d403c1cacf890f91fa53e9137e551f3f6479341e09fe97c7bf2390
-
Filesize
343KB
MD5559be78f838b7a2227d30fe2bf996ca8
SHA1c891be5c0cace7be891c8d693e2ffc667a07cae5
SHA25602bc8e185849b08b4b6749e6a300e902d4fc1cf7e0a3cdbe18f83d72fc2a2827
SHA512cddf3c7a80dee0c9ceaa733a294c43747520d8a10cc1e3a57c227e3282b8912d422bdff8815c4031401d9105e66814c84af6136ec20bb618118a879540492815