Analysis
-
max time kernel
132s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
8256a1d2f37f6459c29b49f29d8e8510_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8256a1d2f37f6459c29b49f29d8e8510_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
8256a1d2f37f6459c29b49f29d8e8510_NEIKI.exe
-
Size
79KB
-
MD5
8256a1d2f37f6459c29b49f29d8e8510
-
SHA1
9c32c51b189d73e38a9b9710c63a3aa139b8b54f
-
SHA256
c5c853ca6e7cc4b83f5c0bdb7171a441fd057ff3589a1c8581141c9f81c9a6bf
-
SHA512
93af791f6210548f984b1aa0831a19f0814c234454fb0aa8863387c4179d5ad744721434449ee4fc665bdd1859a87e95dca5c5b06291077748cd58c6c8f79e94
-
SSDEEP
1536:zv88W8vK2iyamsPCx8GlOQA8AkqUhMb2nuy5wgIP0CSJ+5ycB8GMGlZ5G:zv8x8vfiJ2P8GdqU7uy5w9WMycN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3532 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3976 wrote to memory of 2972 3976 8256a1d2f37f6459c29b49f29d8e8510_NEIKI.exe 84 PID 3976 wrote to memory of 2972 3976 8256a1d2f37f6459c29b49f29d8e8510_NEIKI.exe 84 PID 3976 wrote to memory of 2972 3976 8256a1d2f37f6459c29b49f29d8e8510_NEIKI.exe 84 PID 2972 wrote to memory of 3532 2972 cmd.exe 85 PID 2972 wrote to memory of 3532 2972 cmd.exe 85 PID 2972 wrote to memory of 3532 2972 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8256a1d2f37f6459c29b49f29d8e8510_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\8256a1d2f37f6459c29b49f29d8e8510_NEIKI.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\cmd.exePID:2972
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3532
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD575f25699aa8ef13a928a53f60020f087
SHA1731b60f1a55b6f3cc9190c5e5decc03a2b07bbf4
SHA256756bc6672bda9eb54c016784d177aa7f6b4ec5bfe45303f29d3f05f88e90a0de
SHA5127db8a0928d056c25bdf984ccc914358de73c135d86fc0c3e2d13feb31358ae504458a300baa35b63b99cd8d45c3d45609b1f5d6e0dd2b73e0766c3d148fcc4b7