Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 20:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1e568f27b476f44968a69da09a28c0f0_NEIKI.exe
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1e568f27b476f44968a69da09a28c0f0_NEIKI.exe
Resource
win10v2004-20240426-en
5 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
1e568f27b476f44968a69da09a28c0f0_NEIKI.exe
-
Size
306KB
-
MD5
1e568f27b476f44968a69da09a28c0f0
-
SHA1
0548fad9cb7d4d1b8afb6b91e37f5370a0d759ee
-
SHA256
dc72f876e1ca1638c9e1655c8447b698cc7baab5feaebc0d1d86d3ea9c6f494a
-
SHA512
58fcbee87abeb1c47b571d1b70336d4a8d435b525abbaff1a3ec815399a77ab318007141d4105124580aa7fa6974e5855620ba7cd5b0f28e4f865f271f08c4f5
-
SSDEEP
6144:61Pbwc2BVX/fGhQ/jyMtRrEHUmU54q0px9YuJ2i1yRV:0bwvDfGhQWM/OU541x9YuJ24W
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\VSPCleanup.log 1e568f27b476f44968a69da09a28c0f0_NEIKI.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2064 1e568f27b476f44968a69da09a28c0f0_NEIKI.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2064 1e568f27b476f44968a69da09a28c0f0_NEIKI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e568f27b476f44968a69da09a28c0f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\1e568f27b476f44968a69da09a28c0f0_NEIKI.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2572
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2440