Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
14833395ea230080ad5aca2b6da2b710_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
14833395ea230080ad5aca2b6da2b710_NEIKI.exe
Resource
win10v2004-20240226-en
General
-
Target
14833395ea230080ad5aca2b6da2b710_NEIKI.exe
-
Size
244KB
-
MD5
14833395ea230080ad5aca2b6da2b710
-
SHA1
b8eb74180f867d6754949b03ed2823d00e784833
-
SHA256
effeeedc63e4fe3b11f548b400de5a37dd36474db2bc4d7ecc135d8ca1f1f2b3
-
SHA512
bcb1129eb69e736ee3a2db6e5590ef1bb84182bad729e0efa265d04f95e7bca06544f7021d1f92de532d950d9fb8cdf19e09ed9262fcdca917bebeaa0b62d20e
-
SSDEEP
6144:UEXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:hAylvv5YRwh9HYd61xhmX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3016 svchost.exe -
Loads dropped DLL 7 IoCs
pid Process 2360 14833395ea230080ad5aca2b6da2b710_NEIKI.exe 2360 14833395ea230080ad5aca2b6da2b710_NEIKI.exe 2648 WerFault.exe 2648 WerFault.exe 2648 WerFault.exe 2648 WerFault.exe 2648 WerFault.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c9614844 = "C:\\Windows\\apppatch\\svchost.exe" 14833395ea230080ad5aca2b6da2b710_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c9614844 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe 14833395ea230080ad5aca2b6da2b710_NEIKI.exe File created C:\Windows\apppatch\svchost.exe 14833395ea230080ad5aca2b6da2b710_NEIKI.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2648 3016 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3016 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2360 14833395ea230080ad5aca2b6da2b710_NEIKI.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2360 wrote to memory of 3016 2360 14833395ea230080ad5aca2b6da2b710_NEIKI.exe 28 PID 2360 wrote to memory of 3016 2360 14833395ea230080ad5aca2b6da2b710_NEIKI.exe 28 PID 2360 wrote to memory of 3016 2360 14833395ea230080ad5aca2b6da2b710_NEIKI.exe 28 PID 2360 wrote to memory of 3016 2360 14833395ea230080ad5aca2b6da2b710_NEIKI.exe 28 PID 3016 wrote to memory of 2648 3016 svchost.exe 29 PID 3016 wrote to memory of 2648 3016 svchost.exe 29 PID 3016 wrote to memory of 2648 3016 svchost.exe 29 PID 3016 wrote to memory of 2648 3016 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\14833395ea230080ad5aca2b6da2b710_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\14833395ea230080ad5aca2b6da2b710_NEIKI.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 3563⤵
- Loads dropped DLL
- Program crash
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5a59d07fb6a8d4626a34adc2187a3ddce
SHA113c65aef86e89a0443c7304ebc35b340349f25c9
SHA2568c3d261e31487e08c074fa1facb6204493fa5365d21be74e858a3c5b1d35aaba
SHA512cb1903805217d8214b3a6d37af15e5f47a67aad043185288866ec18dcb561ecf59abe7a01c13ddb2a8e891c9b8613ce1a005f266a8a655464d583b8e25a208d9