Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
3542526aa24ade786a668c9ef79e0f90_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3542526aa24ade786a668c9ef79e0f90_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
3542526aa24ade786a668c9ef79e0f90_NEIKI.exe
-
Size
228KB
-
MD5
3542526aa24ade786a668c9ef79e0f90
-
SHA1
e58538b01ebcb985d0deea828d31313b06eb5087
-
SHA256
6112a3d8e9d9ab30fedc0305e807cc3b6b6f4190c4902e54a8cb86a88164d222
-
SHA512
0d6c6b83ae86f861d4d116c9057b7fbea0f677f7198d81f5cd648d78aa04dbd3410af251ba434f67518879a976822f4f84d83ee62e8113e9ccf911a389e1c3e7
-
SSDEEP
6144:VKJS9O3dwqsNy5ibpNjl4EqxF6snji81RUinKICun:gJS98dQxly
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 3542526aa24ade786a668c9ef79e0f90_NEIKI.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" raejo.exe -
Executes dropped EXE 1 IoCs
pid Process 3032 raejo.exe -
Loads dropped DLL 2 IoCs
pid Process 2528 3542526aa24ade786a668c9ef79e0f90_NEIKI.exe 2528 3542526aa24ade786a668c9ef79e0f90_NEIKI.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /l" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /x" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /a" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /g" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /e" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /z" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /r" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /i" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /q" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /p" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /k" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /v" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /f" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /h" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /u" 3542526aa24ade786a668c9ef79e0f90_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /o" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /u" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /t" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /j" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /b" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /d" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /s" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /m" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /y" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /w" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /c" raejo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\raejo = "C:\\Users\\Admin\\raejo.exe /n" raejo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2528 3542526aa24ade786a668c9ef79e0f90_NEIKI.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe 3032 raejo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2528 3542526aa24ade786a668c9ef79e0f90_NEIKI.exe 3032 raejo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 3032 2528 3542526aa24ade786a668c9ef79e0f90_NEIKI.exe 28 PID 2528 wrote to memory of 3032 2528 3542526aa24ade786a668c9ef79e0f90_NEIKI.exe 28 PID 2528 wrote to memory of 3032 2528 3542526aa24ade786a668c9ef79e0f90_NEIKI.exe 28 PID 2528 wrote to memory of 3032 2528 3542526aa24ade786a668c9ef79e0f90_NEIKI.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3542526aa24ade786a668c9ef79e0f90_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3542526aa24ade786a668c9ef79e0f90_NEIKI.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\raejo.exe"C:\Users\Admin\raejo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD52d27c50886aec3be46fb2905f324d70d
SHA18f059af1f63a5c8943e80aecaa279f2500c22e33
SHA256a77b699194d5998d01351bde56ecd6a399f8926639adf972766c957cb93a4773
SHA512bcae058f999d57a7357bd09b107ce7e25f798545b0a7d59e8ceb859703e0fa6d405e89f88b3e3d30351866d079ef4433720e2aa67685786dca6402416ab28cc5