Analysis
-
max time kernel
8s -
max time network
4s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 21:42
Behavioral task
behavioral1
Sample
65db4567af98c936b55e930ca8d8be10_NEIKI.exe
Resource
win7-20240221-en
General
-
Target
65db4567af98c936b55e930ca8d8be10_NEIKI.exe
-
Size
2.0MB
-
MD5
65db4567af98c936b55e930ca8d8be10
-
SHA1
928edf9a2d2bd80953594347b742d4754f8c456f
-
SHA256
cdef56ecb6e229ec22576b215de049032ff1472a12179052cc68c00bf0029b09
-
SHA512
3060b6cd68f9a64d2559c8ccb26f481b4e33c48cf358489bd91db56bb40a590ff9f9c8e0dc9db9470650212b75d81b32ed6e0058098b0b0569aa3b2bc95226b7
-
SSDEEP
49152:BezaTF8FcNkNdfE0pZ9ozt4wIC5aIwC+AjEG7uA8R+:BemTLkNdfE0pZro
Malware Config
Signatures
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral1/memory/2904-0-0x000000013F230000-0x000000013F584000-memory.dmp xmrig behavioral1/files/0x000d000000014698-5.dat xmrig behavioral1/files/0x002b000000014c67-8.dat xmrig behavioral1/files/0x0008000000015364-10.dat xmrig behavioral1/files/0x00070000000155d4-21.dat xmrig behavioral1/files/0x00070000000155d9-22.dat xmrig behavioral1/files/0x0008000000015d88-41.dat xmrig behavioral1/memory/2560-114-0x000000013F980000-0x000000013FCD4000-memory.dmp xmrig behavioral1/files/0x0006000000016d41-70.dat xmrig behavioral1/files/0x0006000000016d41-117.dat xmrig -
resource yara_rule behavioral1/memory/2904-0-0x000000013F230000-0x000000013F584000-memory.dmp upx behavioral1/files/0x000d000000014698-5.dat upx behavioral1/files/0x002b000000014c67-8.dat upx behavioral1/files/0x0008000000015364-10.dat upx behavioral1/files/0x00070000000155d4-21.dat upx behavioral1/files/0x00070000000155d9-22.dat upx behavioral1/files/0x0008000000015d88-41.dat upx behavioral1/memory/2560-114-0x000000013F980000-0x000000013FCD4000-memory.dmp upx behavioral1/files/0x0006000000016d41-70.dat upx behavioral1/files/0x0006000000016d41-117.dat upx
Processes
-
C:\Users\Admin\AppData\Local\Temp\65db4567af98c936b55e930ca8d8be10_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\65db4567af98c936b55e930ca8d8be10_NEIKI.exe"1⤵PID:2904
-
C:\Windows\System\XuLjZwK.exeC:\Windows\System\XuLjZwK.exe2⤵PID:2504
-
-
C:\Windows\System\YnjDUwK.exeC:\Windows\System\YnjDUwK.exe2⤵PID:2372
-
-
C:\Windows\System\BYSUQbA.exeC:\Windows\System\BYSUQbA.exe2⤵PID:2872
-
-
C:\Windows\System\JLBaOUS.exeC:\Windows\System\JLBaOUS.exe2⤵PID:1236
-
-
C:\Windows\System\mDxeIVD.exeC:\Windows\System\mDxeIVD.exe2⤵PID:2004
-
-
C:\Windows\System\SOiknFY.exeC:\Windows\System\SOiknFY.exe2⤵PID:2140
-
-
C:\Windows\System\IAzZYvC.exeC:\Windows\System\IAzZYvC.exe2⤵PID:1524
-
-
C:\Windows\System\ArZTZED.exeC:\Windows\System\ArZTZED.exe2⤵PID:1252
-
-
C:\Windows\System\wcIczZz.exeC:\Windows\System\wcIczZz.exe2⤵PID:968
-
-
C:\Windows\System\ZGIXbqL.exeC:\Windows\System\ZGIXbqL.exe2⤵PID:1348
-
-
C:\Windows\System\zyljHmZ.exeC:\Windows\System\zyljHmZ.exe2⤵PID:1800
-
-
C:\Windows\System\kxtkUHY.exeC:\Windows\System\kxtkUHY.exe2⤵PID:1124
-
-
C:\Windows\System\fJQrBja.exeC:\Windows\System\fJQrBja.exe2⤵PID:1120
-
-
C:\Windows\System\JpiYzwi.exeC:\Windows\System\JpiYzwi.exe2⤵PID:2816
-
-
C:\Windows\System\FaCGfkj.exeC:\Windows\System\FaCGfkj.exe2⤵PID:944
-
-
C:\Windows\System\MMydVEk.exeC:\Windows\System\MMydVEk.exe2⤵PID:2484
-
-
C:\Windows\System\NQMXqxV.exeC:\Windows\System\NQMXqxV.exe2⤵PID:2144
-
-
C:\Windows\System\ryDuUUz.exeC:\Windows\System\ryDuUUz.exe2⤵PID:2604
-
-
C:\Windows\System\VsAnndj.exeC:\Windows\System\VsAnndj.exe2⤵PID:3212
-
-
C:\Windows\System\CPbHpMH.exeC:\Windows\System\CPbHpMH.exe2⤵PID:3312
-
-
C:\Windows\System\ADbHpib.exeC:\Windows\System\ADbHpib.exe2⤵PID:3520
-
-
C:\Windows\System\XGDLNWA.exeC:\Windows\System\XGDLNWA.exe2⤵PID:3636
-
-
C:\Windows\System\LwNPTGW.exeC:\Windows\System\LwNPTGW.exe2⤵PID:3652
-
-
C:\Windows\System\bevldni.exeC:\Windows\System\bevldni.exe2⤵PID:3668
-
-
C:\Windows\System\FnTLLbb.exeC:\Windows\System\FnTLLbb.exe2⤵PID:3684
-
-
C:\Windows\System\PxiTcda.exeC:\Windows\System\PxiTcda.exe2⤵PID:3700
-
-
C:\Windows\System\IfcTCfY.exeC:\Windows\System\IfcTCfY.exe2⤵PID:3716
-
-
C:\Windows\System\ZQjgTnr.exeC:\Windows\System\ZQjgTnr.exe2⤵PID:3732
-
-
C:\Windows\System\kwYGLkk.exeC:\Windows\System\kwYGLkk.exe2⤵PID:3748
-
-
C:\Windows\System\JsAjENv.exeC:\Windows\System\JsAjENv.exe2⤵PID:3764
-
-
C:\Windows\System\cfouIxI.exeC:\Windows\System\cfouIxI.exe2⤵PID:3780
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5f47f97a5e0a49dd783d9b3d6ba93b68e
SHA15fa3ecd4c03ffb50c2fc95d400c1f946c20b0f95
SHA256ee429c039567079a5a39238626e83c8d01f35ff6dc08c095197efa84a00f4a6f
SHA51299ca6d461227834f1eaf6659fa04c839bbba46f39d85abd0fb1e3acd43c6f5e017f5e225b269953ddaf9ef0cac86ce3ba087918b158238b698cfc06efca1e452
-
Filesize
1.9MB
MD5fe4dc34b817419c46459c5f7dc89f5e1
SHA15dc15c81f3ecc81a24b860f049305d16cf5a6f62
SHA25611abf44cc24ce4e4c59ba14302e4f29baffb7e8cdc6e4f59627e11851b73fb13
SHA5129eac0f3e77dc3e549cdf2fcea0600dd6141b5f8340030980b0f5fba5f7cc8735cb68db441e70075f2860cfad9170d65243eb78627ca5deb76bda66b0b4485abc
-
Filesize
1.6MB
MD5b5590ad5280dcd89533eb32e709837d7
SHA1aea132463a81a7e0bcfe31527b9649b702be5626
SHA256383692a1d429f17b15fb9a6405cbc618a9ede1ebfc938bacb21f06ef7d9b63c8
SHA512e5a9474d88f0c404b3211d557914d322f55e2a7f3ab11aa88a0ce12b23f686e0c7f20bc2826fa41e820ce6cb43464f469df35d2961aa397e53dc28a4ecc5a531
-
Filesize
2.0MB
MD5e2e45802e970ce7a9d85e09ee9d51cb6
SHA1353229a9a14a8fdc26d30d83bf16343838d34689
SHA25682fad785d11a0659c31f5c7880135443cf08695635a8152b6c39c0900affc8dd
SHA51258f4dbef4327a5143fc234116063f27f69e191c7a9af1dd39d57544196d0983cdf29d121dad4bc0ab579362773b06fc542ccbcc29391d25053a3108cd15f0e73
-
Filesize
1.3MB
MD5cee1d7c75ec08ec3a0aa1b8d4f177dfa
SHA11207597f2e309bc114f05644994b14dd66867494
SHA256aa8ddc9425332a6bee37c4e0cdbeb60d28c71352fc9d454ff68cbf78457825d8
SHA51283e5da81ccdb7e0e25cbade96c3e7093378153d455d369d7d4f6a3aea8f892a34b9bfa83bb0709e115260a1817b227b386a9401fd7ac3a3fca4238ed40b276eb
-
Filesize
2.0MB
MD565442a11b618e365f3933aba2394d788
SHA110ea8b56f9409110dc86caa0ae8f4e08e23dd441
SHA25630964e351b91af4138f6dd7a399ddf33f59332785df7766770a16070bb2be591
SHA5121928781018f616c5d8366ac76933de69c0e4663d4ea960ada0a83d307da3d93e66a40523c8f456d81e5df780cdf348be3190185884df6aee714f3fcf0d5aa5b7
-
Filesize
1.6MB
MD55dcce40d5d0b59df302d842fe20332ab
SHA14b947ba80bd4d4a43599c8a6755472b0a4b00359
SHA256d0ae09d51b103e2b5c113f839efc3535f490ba3fac4f9e05e4d86babf969cfdf
SHA512c3cf36c5dc0622106e881e6532c262bf7610cdceba9257f5c78f942184756016a70484a8b6ffbe3c986c239de31f6ab78db2075114c828ba0ec077e5dd480618
-
Filesize
1.4MB
MD5d495c8d14dfb73423f0da61cde63542a
SHA17845b2db67ca31ad643a38c12c55cc7381a8dfb1
SHA2565abb98dc37a56a4796619b9067bd79c7c461d3881127d7633b0c198d1abec318
SHA512570349ec34070b0d6d3941b9bc1ad0ed79f9a0778c96b2a8457098b0eef442a293f1801d9279a1adc148b5ca498d73b85a3c00005133f764deda8281f7378cb9