Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
97266e9d304fa082545c218e06842f80_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
97266e9d304fa082545c218e06842f80_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
97266e9d304fa082545c218e06842f80_NEIKI.exe
-
Size
172KB
-
MD5
97266e9d304fa082545c218e06842f80
-
SHA1
1b8b1f8c3abbb79bce4ceabe986e5022419d8873
-
SHA256
245faaabd7812cb9882bb041d40c919b7d1103c61ad613a423d8cb15450ab647
-
SHA512
958fe6282fe1b983c57b27543148525b13b30d28350a2f3b9ad1f80655640d9e117413056a94ec1806505e3c9586e373b47702fc4f5bb2c3d0ccd49a62bfc106
-
SSDEEP
3072:KQiLXjUfg0zJLt2cuNdayW29M28tQcZ+IIfbGjd7muUNiqL0fh:9irjUJzJLtXY8m9MFLojGx7muUNiqL0f
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2740 attrib.exe 3000 attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 2612 $77Runtimebrokerr.exe -
Loads dropped DLL 1 IoCs
pid Process 2712 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\cumshot\\$77Runtimebrokerr.exe\"" 97266e9d304fa082545c218e06842f80_NEIKI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2976 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2584 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1940 97266e9d304fa082545c218e06842f80_NEIKI.exe 1940 97266e9d304fa082545c218e06842f80_NEIKI.exe 1940 97266e9d304fa082545c218e06842f80_NEIKI.exe 2516 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1940 97266e9d304fa082545c218e06842f80_NEIKI.exe Token: SeDebugPrivilege 2612 $77Runtimebrokerr.exe Token: SeDebugPrivilege 2516 powershell.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2740 1940 97266e9d304fa082545c218e06842f80_NEIKI.exe 28 PID 1940 wrote to memory of 2740 1940 97266e9d304fa082545c218e06842f80_NEIKI.exe 28 PID 1940 wrote to memory of 2740 1940 97266e9d304fa082545c218e06842f80_NEIKI.exe 28 PID 1940 wrote to memory of 3000 1940 97266e9d304fa082545c218e06842f80_NEIKI.exe 30 PID 1940 wrote to memory of 3000 1940 97266e9d304fa082545c218e06842f80_NEIKI.exe 30 PID 1940 wrote to memory of 3000 1940 97266e9d304fa082545c218e06842f80_NEIKI.exe 30 PID 1940 wrote to memory of 2712 1940 97266e9d304fa082545c218e06842f80_NEIKI.exe 32 PID 1940 wrote to memory of 2712 1940 97266e9d304fa082545c218e06842f80_NEIKI.exe 32 PID 1940 wrote to memory of 2712 1940 97266e9d304fa082545c218e06842f80_NEIKI.exe 32 PID 2712 wrote to memory of 2584 2712 cmd.exe 34 PID 2712 wrote to memory of 2584 2712 cmd.exe 34 PID 2712 wrote to memory of 2584 2712 cmd.exe 34 PID 2712 wrote to memory of 2612 2712 cmd.exe 35 PID 2712 wrote to memory of 2612 2712 cmd.exe 35 PID 2712 wrote to memory of 2612 2712 cmd.exe 35 PID 2612 wrote to memory of 2524 2612 $77Runtimebrokerr.exe 36 PID 2612 wrote to memory of 2524 2612 $77Runtimebrokerr.exe 36 PID 2612 wrote to memory of 2524 2612 $77Runtimebrokerr.exe 36 PID 2612 wrote to memory of 2976 2612 $77Runtimebrokerr.exe 38 PID 2612 wrote to memory of 2976 2612 $77Runtimebrokerr.exe 38 PID 2612 wrote to memory of 2976 2612 $77Runtimebrokerr.exe 38 PID 2612 wrote to memory of 2108 2612 $77Runtimebrokerr.exe 40 PID 2612 wrote to memory of 2108 2612 $77Runtimebrokerr.exe 40 PID 2612 wrote to memory of 2108 2612 $77Runtimebrokerr.exe 40 PID 2612 wrote to memory of 2516 2612 $77Runtimebrokerr.exe 42 PID 2612 wrote to memory of 2516 2612 $77Runtimebrokerr.exe 42 PID 2612 wrote to memory of 2516 2612 $77Runtimebrokerr.exe 42 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2740 attrib.exe 3000 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97266e9d304fa082545c218e06842f80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\97266e9d304fa082545c218e06842f80_NEIKI.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\cumshot"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2740
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\cumshot\$77Runtimebrokerr.exe"2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3000
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp61FE.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2584
-
-
C:\Users\Admin\AppData\Roaming\cumshot\$77Runtimebrokerr.exe"C:\Users\Admin\AppData\Roaming\cumshot\$77Runtimebrokerr.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\schtasks.exe"schtasks.exe" /query /TN $77Runtimebrokerr.exe4⤵PID:2524
-
-
C:\Windows\system32\schtasks.exe"schtasks.exe" /Create /SC ONCE /TN "$77Runtimebrokerr.exe" /TR "C:\Users\Admin\AppData\Roaming\cumshot\$77Runtimebrokerr.exe \"\$77Runtimebrokerr.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:2976
-
-
C:\Windows\system32\schtasks.exe"schtasks.exe" /query /TN $77Runtimebrokerr.exe4⤵PID:2108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169B
MD56907cedb6c3d52204c6615d5c0651785
SHA1ff570d357cdc0dc7b485de88576772a34f697766
SHA25665cefbe700c6d8c124e6cdfd4056a165ab5da62bfa393b1641ab2edacc1d54cc
SHA512ec7f9749a9a4bcf94d489343bb0d2442f6c4aab3fb4a40a8ed0496fed2c075d4018eb7fb87e4a0b0a96885b687c6f7b694939b8e2d6a22b616067ae5521afa64
-
Filesize
172KB
MD597266e9d304fa082545c218e06842f80
SHA11b8b1f8c3abbb79bce4ceabe986e5022419d8873
SHA256245faaabd7812cb9882bb041d40c919b7d1103c61ad613a423d8cb15450ab647
SHA512958fe6282fe1b983c57b27543148525b13b30d28350a2f3b9ad1f80655640d9e117413056a94ec1806505e3c9586e373b47702fc4f5bb2c3d0ccd49a62bfc106