Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 05:45
Behavioral task
behavioral1
Sample
e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe
-
Size
97KB
-
MD5
e93da6ea43932ea6ab01bbd0c42b8c70
-
SHA1
4d4f6a2e75d0bddd5703c0cdcac55986b0d75560
-
SHA256
3fd3065c1d341506c327fae673ecc005549a32dc376be2de68ef4f9b82b59b28
-
SHA512
8ed8ae7cf073edc182aa3d4e1f12bd905491c1d761d3b7fdff9cac7609d293d16d4ef2e479c085aa6067d8adf6fdb7a685a8f054f0a4e6961f531a2c14541e98
-
SSDEEP
3072:W6Ccn27mUC7AdYzrV+Dljy/32ubwZZqJ:W6Ccn2xCkdYzrVolu/J0ZZ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 988 WindowsService.exe 2696 WindowsService.exe 1104 WindowsService.exe -
Loads dropped DLL 5 IoCs
pid Process 2816 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 2816 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 2816 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 2816 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 2816 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe -
resource yara_rule behavioral1/memory/2908-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2908-236-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2908-178-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2816-451-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2908-449-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2908-133-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2908-83-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0035000000015cae-490.dat upx behavioral1/memory/988-495-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2816-492-0x0000000003470000-0x00000000034AB000-memory.dmp upx behavioral1/memory/2696-1043-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/988-1045-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2816-1048-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2696-1053-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\sidebar = "C:\\Users\\Admin\\AppData\\Roaming\\SystemWindows\\WindowsService.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2908 set thread context of 2816 2908 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 28 PID 988 set thread context of 2696 988 WindowsService.exe 33 PID 988 set thread context of 1104 988 WindowsService.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe Token: SeDebugPrivilege 2696 WindowsService.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2908 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 2816 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 988 WindowsService.exe 2696 WindowsService.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2816 2908 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 28 PID 2908 wrote to memory of 2816 2908 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 28 PID 2908 wrote to memory of 2816 2908 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 28 PID 2908 wrote to memory of 2816 2908 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 28 PID 2908 wrote to memory of 2816 2908 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 28 PID 2908 wrote to memory of 2816 2908 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 28 PID 2908 wrote to memory of 2816 2908 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 28 PID 2908 wrote to memory of 2816 2908 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 28 PID 2816 wrote to memory of 2620 2816 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 29 PID 2816 wrote to memory of 2620 2816 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 29 PID 2816 wrote to memory of 2620 2816 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 29 PID 2816 wrote to memory of 2620 2816 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 29 PID 2620 wrote to memory of 2220 2620 cmd.exe 31 PID 2620 wrote to memory of 2220 2620 cmd.exe 31 PID 2620 wrote to memory of 2220 2620 cmd.exe 31 PID 2620 wrote to memory of 2220 2620 cmd.exe 31 PID 2816 wrote to memory of 988 2816 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 32 PID 2816 wrote to memory of 988 2816 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 32 PID 2816 wrote to memory of 988 2816 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 32 PID 2816 wrote to memory of 988 2816 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 32 PID 988 wrote to memory of 2696 988 WindowsService.exe 33 PID 988 wrote to memory of 2696 988 WindowsService.exe 33 PID 988 wrote to memory of 2696 988 WindowsService.exe 33 PID 988 wrote to memory of 2696 988 WindowsService.exe 33 PID 988 wrote to memory of 2696 988 WindowsService.exe 33 PID 988 wrote to memory of 2696 988 WindowsService.exe 33 PID 988 wrote to memory of 2696 988 WindowsService.exe 33 PID 988 wrote to memory of 2696 988 WindowsService.exe 33 PID 988 wrote to memory of 1104 988 WindowsService.exe 34 PID 988 wrote to memory of 1104 988 WindowsService.exe 34 PID 988 wrote to memory of 1104 988 WindowsService.exe 34 PID 988 wrote to memory of 1104 988 WindowsService.exe 34 PID 988 wrote to memory of 1104 988 WindowsService.exe 34 PID 988 wrote to memory of 1104 988 WindowsService.exe 34 PID 988 wrote to memory of 1104 988 WindowsService.exe 34 PID 988 wrote to memory of 1104 988 WindowsService.exe 34 PID 988 wrote to memory of 1104 988 WindowsService.exe 34 PID 988 wrote to memory of 1104 988 WindowsService.exe 34 PID 988 wrote to memory of 1104 988 WindowsService.exe 34 PID 988 wrote to memory of 1104 988 WindowsService.exe 34 PID 988 wrote to memory of 1104 988 WindowsService.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HVVJK.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe" /f4⤵
- Adds Run key to start application
PID:2220
-
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2696
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
PID:1104
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157B
MD5f6a90c20834f271a907a4e2bc28184c2
SHA136c9d1602b74f622346fbb22693597d7889df48d
SHA25673f29cd953eee40cea4de67842556ffd96efe8094a6a9b70f33a35df2582febd
SHA51239cabae19fe1faa37455e4bd242c868be60d6252b07f01224b3f7501c3cf734e503300b840d83381a452707cab6df2f95f920655884be56d4024676b26943804
-
Filesize
97KB
MD529d6c573b2e4ec81b5a57e8126f1834c
SHA1909e20cebdd1b607107ac92fc1e502c77170f200
SHA2560d4af66f3a053fe54429df69426b90d3a581ce3597d3969d52e1733d6251a554
SHA5128fdb8997c8dcbd123147e452c311c3e9ae05857fd282a97691c8c1aa6a0f3309d9ead1a9368904821f8263e3b9c36b2ee2b26643f697c8d91e6dca936640f5a3