Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
f7d1bba23308ea6d9191ad5e393ac8d0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7d1bba23308ea6d9191ad5e393ac8d0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
f7d1bba23308ea6d9191ad5e393ac8d0_NEIKI.exe
-
Size
79KB
-
MD5
f7d1bba23308ea6d9191ad5e393ac8d0
-
SHA1
d892f39449ba96a17a5e01d4fc3e0ff30256e6a2
-
SHA256
029e5ba44c8e60fe679508b655f5507ab7138d385289258d3d11dc2325019b6c
-
SHA512
0c72f546a6b927b9987fb2f8d2df13fef869fe31ee54e4ebe1b2e76d259dde1d8819bdd1c9c84f18fab82c8c5208306b4fbd068cf29ea7d790ae16f660f6a726
-
SSDEEP
1536:zvnkjhiUanSOQA8AkqUhMb2nuy5wgIP0CSJ+5yHB8GMGlZ5G:zvnZbXGdqU7uy5w9WMyHN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2248 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2680 cmd.exe 2680 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2680 2936 f7d1bba23308ea6d9191ad5e393ac8d0_NEIKI.exe 29 PID 2936 wrote to memory of 2680 2936 f7d1bba23308ea6d9191ad5e393ac8d0_NEIKI.exe 29 PID 2936 wrote to memory of 2680 2936 f7d1bba23308ea6d9191ad5e393ac8d0_NEIKI.exe 29 PID 2936 wrote to memory of 2680 2936 f7d1bba23308ea6d9191ad5e393ac8d0_NEIKI.exe 29 PID 2680 wrote to memory of 2248 2680 cmd.exe 30 PID 2680 wrote to memory of 2248 2680 cmd.exe 30 PID 2680 wrote to memory of 2248 2680 cmd.exe 30 PID 2680 wrote to memory of 2248 2680 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7d1bba23308ea6d9191ad5e393ac8d0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\f7d1bba23308ea6d9191ad5e393ac8d0_NEIKI.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2248
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD550b26d012d407af7db0839af0a2cabd5
SHA15227562a39ac6760b43770a25c477618abe1e8e0
SHA256e34886ef06a154b051f231d3e0f896cebf870a38c4064d1559acc22148510034
SHA5126118f24a2fb0f0ee587d14612363bbc4ac3508d3eea02e5ab446e275c435be4d0854d838147a0b153d3e51bc79edb0bbd3c93762ac3f29b4976c101cfc881f2b