Analysis
-
max time kernel
11s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
3afc1f9c32d297eaf86532e750c873c0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3afc1f9c32d297eaf86532e750c873c0_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
3afc1f9c32d297eaf86532e750c873c0_NEIKI.exe
-
Size
43KB
-
MD5
3afc1f9c32d297eaf86532e750c873c0
-
SHA1
320a51494021a521e0d3a550b7ab2f3e867e7e50
-
SHA256
d7006f65bc5d0b88573067eaae19b5a60920f2c2017d5987755f6c75c8dfa29b
-
SHA512
c4591ab549ba734679b5dcb4049d37f7edcf6c0ffaece84413676c9e6bb67d77212df1e6f95bd38956e5b9d5721f53cc4eec369a9fa12e38036504e07da102d9
-
SSDEEP
768:b/yC4GyNM01GuQMNXw2PSjHPbSuYlW8PAwW:b/pYayGig5HjS3NPA/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2504 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 1904 3afc1f9c32d297eaf86532e750c873c0_NEIKI.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1904 3afc1f9c32d297eaf86532e750c873c0_NEIKI.exe 2504 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2504 1904 3afc1f9c32d297eaf86532e750c873c0_NEIKI.exe 28 PID 1904 wrote to memory of 2504 1904 3afc1f9c32d297eaf86532e750c873c0_NEIKI.exe 28 PID 1904 wrote to memory of 2504 1904 3afc1f9c32d297eaf86532e750c873c0_NEIKI.exe 28 PID 1904 wrote to memory of 2504 1904 3afc1f9c32d297eaf86532e750c873c0_NEIKI.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3afc1f9c32d297eaf86532e750c873c0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3afc1f9c32d297eaf86532e750c873c0_NEIKI.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD56eeb32242726f85d048fc86f5e9155db
SHA12f67bd72cdb1591e5d1e3ebb3e04fa2e12734c19
SHA2568cf0ac8f42e23bd480e6742bd11aa0618027ff60fbd60236c6f5064606dcae82
SHA5120fc7baf0a1cdd90a4a90831e6671c97ee077e912446c5a8b0466daabd9214e59fd4ce9f9c999e44f4f90d90f0dfcd14cb368aa6a9c4bff1d98c5854490776a9d