Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
89f68fa28fd05ad9d2348c3f1a80f850_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
89f68fa28fd05ad9d2348c3f1a80f850_NEIKI.exe
Resource
win10v2004-20240226-en
General
-
Target
89f68fa28fd05ad9d2348c3f1a80f850_NEIKI.exe
-
Size
65KB
-
MD5
89f68fa28fd05ad9d2348c3f1a80f850
-
SHA1
66533a84a5144a10a92643afde0abde1f0dc283e
-
SHA256
210a879007119383fe3eacf383ba31c2f402cf981a05925ca9bd0ae81c11b6e5
-
SHA512
ca8193c7ee26d6624b6e3b0594411146c567dba36a5a0e71f55620956de3292657e96fe643744f3a872b06d38f87c02e22b5501c0bbd9306cf972d8d71f26532
-
SSDEEP
768:D/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJfU60+ppQ1TTGfLM:DRsvcdcQjosnvnc6LQ1EM
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 89f68fa28fd05ad9d2348c3f1a80f850_NEIKI.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 89f68fa28fd05ad9d2348c3f1a80f850_NEIKI.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe 89f68fa28fd05ad9d2348c3f1a80f850_NEIKI.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF 89f68fa28fd05ad9d2348c3f1a80f850_NEIKI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe 2420 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 956 wrote to memory of 2420 956 89f68fa28fd05ad9d2348c3f1a80f850_NEIKI.exe 91 PID 956 wrote to memory of 2420 956 89f68fa28fd05ad9d2348c3f1a80f850_NEIKI.exe 91 PID 956 wrote to memory of 2420 956 89f68fa28fd05ad9d2348c3f1a80f850_NEIKI.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\89f68fa28fd05ad9d2348c3f1a80f850_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\89f68fa28fd05ad9d2348c3f1a80f850_NEIKI.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:1120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5fa361e9db110f76b71d225fb766b87fc
SHA1b1c2d94218535cb567cc02d7abf81380b782add0
SHA2568c59dc6096c42a13295d918cd638c575743e37f00ddd62028fa9fb971d0c0fd4
SHA51256f84e22795195ca6fbe981ca7ee85b213fad8bd2a83c232c2143300d62d29aa697e66952026cff4ca611dc49b5e1a1902619a04f1188e8240fb7796151d1369