Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 01:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
861b951119928b8134a4f449a4e4c3d0_NEIKI.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
861b951119928b8134a4f449a4e4c3d0_NEIKI.exe
Resource
win10v2004-20240419-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
861b951119928b8134a4f449a4e4c3d0_NEIKI.exe
-
Size
160KB
-
MD5
861b951119928b8134a4f449a4e4c3d0
-
SHA1
cd3ec3e6ef3041b879f095148ff0a61bdb42efa4
-
SHA256
aa12a4115a8be8bf7fc6843e437ecce46155af93ef656f1370704b27c7f87ad8
-
SHA512
bf9ac4699b4eb7ea95dbeeb1ee0c3ab2fb78a5f55689457598d83521a05113dc11dd0dfa3c235dbcfa7061c5e0744a94eba49ca5675efa73e777c537d4179709
-
SSDEEP
1536:UH1kPkZccmK9OM1q6wYV6nBRiOW+bUciXDyeAvX0J7M6QG9wIa82U6q:YAM3ERioem9G9wlxu
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\AABA009E = "C:\\Users\\Admin\\AppData\\Roaming\\AABA009E\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe 2864 winver.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2864 winver.exe 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2320 861b951119928b8134a4f449a4e4c3d0_NEIKI.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2864 2320 861b951119928b8134a4f449a4e4c3d0_NEIKI.exe 28 PID 2320 wrote to memory of 2864 2320 861b951119928b8134a4f449a4e4c3d0_NEIKI.exe 28 PID 2320 wrote to memory of 2864 2320 861b951119928b8134a4f449a4e4c3d0_NEIKI.exe 28 PID 2320 wrote to memory of 2864 2320 861b951119928b8134a4f449a4e4c3d0_NEIKI.exe 28 PID 2320 wrote to memory of 2864 2320 861b951119928b8134a4f449a4e4c3d0_NEIKI.exe 28 PID 2864 wrote to memory of 1256 2864 winver.exe 21 PID 2864 wrote to memory of 1108 2864 winver.exe 19 PID 2864 wrote to memory of 1160 2864 winver.exe 20 PID 2864 wrote to memory of 1256 2864 winver.exe 21 PID 2864 wrote to memory of 1600 2864 winver.exe 23 PID 2864 wrote to memory of 2320 2864 winver.exe 27
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\861b951119928b8134a4f449a4e4c3d0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\861b951119928b8134a4f449a4e4c3d0_NEIKI.exe"2⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2864
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1600