Analysis

  • max time kernel
    129s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 00:21

General

  • Target

    784dd40a082a8dcd7220e511f172db00_NEIKI.exe

  • Size

    4.0MB

  • MD5

    784dd40a082a8dcd7220e511f172db00

  • SHA1

    67c0ee52a8268c64d1a77a7a03cfef573002cde8

  • SHA256

    cdb316a2820cd3e1a0bd8d7dc6c1cf09aa8fdb15b2e150e857d19a6539b61cf2

  • SHA512

    72dc3b1b2cc843319120452fcbc805c111116db06462237c506de00e430028f763f891a29674a1e77cb8a77caf62098dc4046a98b7c2782a557b48b5cc83dd25

  • SSDEEP

    49152:g+tgrIUWjvN7Fdl3HKzH1Bo/Xa1xe38RbPW6IKuChHQ5VB3+SVcsG:tirtWjdF/3KzH1BMKXeMJPW6IWsYr/

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\784dd40a082a8dcd7220e511f172db00_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\784dd40a082a8dcd7220e511f172db00_NEIKI.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2372

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2372-4-0x0000000002750000-0x0000000002851000-memory.dmp

    Filesize

    1.0MB

  • memory/2372-3-0x0000000010000000-0x000000001003C000-memory.dmp

    Filesize

    240KB