Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
5f564fb56678a812d5af0c722a525e00_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5f564fb56678a812d5af0c722a525e00_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
5f564fb56678a812d5af0c722a525e00_NEIKI.exe
-
Size
133KB
-
MD5
5f564fb56678a812d5af0c722a525e00
-
SHA1
c23a791bf7c22791eb5383a240337ccc29488545
-
SHA256
08c78315b94a67506c6a002d42eb60ad7637662e173506ea2236462ff267c33b
-
SHA512
dc1a6aba4ee36b909ef8208bfc1d8f4c801a855af8f39040c82c2a6d3b12dac98060ffabedae87394f47ecb1050fb59da43f275d91f1c9cea86ffa0c79979200
-
SSDEEP
3072:xvFUa0b8w7wTKGR5qoFKnaymV/atYdkGT0CUuS4hsD4ruwu:xvFUfITHkLMLss5u
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3040 racmzae.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\racmzae.exe 5f564fb56678a812d5af0c722a525e00_NEIKI.exe File created C:\PROGRA~3\Mozilla\ttbtowf.dll racmzae.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2896 5f564fb56678a812d5af0c722a525e00_NEIKI.exe 3040 racmzae.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 3040 2756 taskeng.exe 29 PID 2756 wrote to memory of 3040 2756 taskeng.exe 29 PID 2756 wrote to memory of 3040 2756 taskeng.exe 29 PID 2756 wrote to memory of 3040 2756 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f564fb56678a812d5af0c722a525e00_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\5f564fb56678a812d5af0c722a525e00_NEIKI.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2896
-
C:\Windows\system32\taskeng.exetaskeng.exe {5FFCE6DA-5D6D-4F15-9F7A-1D3357363323} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\PROGRA~3\Mozilla\racmzae.exeC:\PROGRA~3\Mozilla\racmzae.exe -cddhnyc2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5e48103edaafc87b5b42df06d41890221
SHA1a45867790677592551903caa1b023093879a7cd9
SHA25664b967d13c56b3cc12de1c0aa42293dcf46c82530a5e66db42c6a86ea32a5ab8
SHA512c85fd46e8a2953a7a91aab432a24b997dc2a6b4a318d8f0ea62b57f4a1c2094d089498a4803a975bf48ae50000cd1d3164c487f3964a029b452c1f3a943e7839