Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe
-
Size
4.1MB
-
MD5
9e2b174429ab6c32df76e0c64a99b3a0
-
SHA1
6523a64a07eb482f10b8dac869bd2e006c287767
-
SHA256
68577bd8770d06d1a09864539cc0cff790600a90468fd6eb191fa72ce11c4986
-
SHA512
4e67651884adc01abd0116fd98abbfa64eb53dc49105f5cb37828b7ce9a8845d58468d3f4e3fbcad304e148e1763d814bf2dc4d7b59eac18d0060bb329525668
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpe4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmV5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2264 xoptisys.exe -
Loads dropped DLL 1 IoCs
pid Process 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\IntelprocWP\\xoptisys.exe" 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\MintH1\\dobdevsys.exe" 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 2264 xoptisys.exe 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2264 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 28 PID 2040 wrote to memory of 2264 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 28 PID 2040 wrote to memory of 2264 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 28 PID 2040 wrote to memory of 2264 2040 9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9e2b174429ab6c32df76e0c64a99b3a0_NEIKI.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\IntelprocWP\xoptisys.exeC:\IntelprocWP\xoptisys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5b94d36001639aee62cafcf899ae83e9d
SHA1e8a66a295d121af59002eaa840199295162030e4
SHA2566af0f4b580bca2e1a4ee0b08e9f168ea19507f80080efbd01b605e0a33e876f3
SHA51237722771a82ea97f1b4f9df03446e92d323111b8e6b97ad9339993dca120498835aeafcde7b76d708d3dff5217df9a39148ee452e7745db80b35ae1af9033949
-
Filesize
207B
MD5132434f292b8fd8038b7800718a4633b
SHA1fe0ee5ff268a21546c5bec58d4cab6dfc89a836d
SHA25609879155dafd640d073e61ef645ab62186973f9ac7c61b6981f73331777b111e
SHA512040b3b9d88daae1e810583ff9039db4ba71d09ed7e9ab853a73b92ae92aab56569428754c10edb795ec1a3ab1062d6b8d0751d6fbbd8a297c70dd5c0ef5a680d
-
Filesize
4.1MB
MD553cb4481e83952a0ae03f6bd362c6189
SHA19f968dcb0bbb2cda3a80cb09c4ae05ef2e0deecb
SHA25663b358e1fbf6c8965b4060e33f862564230d408c93951262058c9cf6c9b85e93
SHA512691a95a8aab70b7a2e7edef8e1e521d1c29f3a5bb74654f2b4aba0cb11b221f929e024d602383e250b7d0e2268d0c36889fbb53ce21b11cbac4e0610317824b6