Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 20:37
Static task
static1
Behavioral task
behavioral1
Sample
294e623eb5ad569622550730ce2d9c20_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
294e623eb5ad569622550730ce2d9c20_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
294e623eb5ad569622550730ce2d9c20_NEIKI.exe
-
Size
4.1MB
-
MD5
294e623eb5ad569622550730ce2d9c20
-
SHA1
d22bd803918ca74032b738e1dc42234f59eaa3f3
-
SHA256
166ee4beab5528a6e46112bdb8e0355270aa9429650d96d3dc86fb4466eb6a8b
-
SHA512
11304a0a4afcc9446a2402f4461f0f2e1fb98e53af749e26f1f0991791b46031f550bd40cfef85fbe4b5d639918ef082281ba818834c3749869716b722a8bbf1
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpC4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmN5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4172 devoptisys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Adobe3A\\devoptisys.exe" 294e623eb5ad569622550730ce2d9c20_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVBAN\\bodxec.exe" 294e623eb5ad569622550730ce2d9c20_NEIKI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4172 devoptisys.exe 4172 devoptisys.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4812 wrote to memory of 4172 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 92 PID 4812 wrote to memory of 4172 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 92 PID 4812 wrote to memory of 4172 4812 294e623eb5ad569622550730ce2d9c20_NEIKI.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\294e623eb5ad569622550730ce2d9c20_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\294e623eb5ad569622550730ce2d9c20_NEIKI.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Adobe3A\devoptisys.exeC:\Adobe3A\devoptisys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5b5dc3fd1006e463b0e755e1e0f167f93
SHA15cb93384b98bf3e4a9e64aa5e005f785d098fff5
SHA25693d10df0a953756ec42aa23fe31ac04fe412ebe2bd1a0055adca1e30e44fc12d
SHA5120b0062af9bf3b6f7b7badd21edf55c86130e24efa815bfbf81be5ed44760da7a3c318e2767f274fab1932ad6edd7ad48b5b6b240a58e1f0acad0634cd4b5de98
-
Filesize
4.1MB
MD55be1a168f6f14ae33712b78187bbcb43
SHA18f8e2e7544c6b7ed19c5f8b4a4e134448d8331de
SHA2566b139f04ffee7f3815f0e21d756be82ecd507e71c525721d3eb5d38f03988153
SHA5125385a0eb9b98199a45a7281e25b6de999fd04b5f9c23a95b9950f71caf2364fc9f220468f3c95ede9c90434f94a6dabd60f32facbbdd568b4d647a34d84f837d
-
Filesize
203B
MD5b600d99312808858ba60ad8a36779830
SHA1e4bdca23fc16c994a56244ca74b2622960b4c867
SHA2560e552ff982421c916aa3826549145a1c5490e66c826e3845d8daa560e497017f
SHA512c5cfe303ab58fa46c37dba2e34a4d1cd5bed18cd170ff04aa5647b9f5a8deec7a26c2e4b186a2fa2326736c92f4514918741aec17a671303a1a50a153dc98d09