Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 05:45
Behavioral task
behavioral1
Sample
e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe
-
Size
97KB
-
MD5
e93da6ea43932ea6ab01bbd0c42b8c70
-
SHA1
4d4f6a2e75d0bddd5703c0cdcac55986b0d75560
-
SHA256
3fd3065c1d341506c327fae673ecc005549a32dc376be2de68ef4f9b82b59b28
-
SHA512
8ed8ae7cf073edc182aa3d4e1f12bd905491c1d761d3b7fdff9cac7609d293d16d4ef2e479c085aa6067d8adf6fdb7a685a8f054f0a4e6961f531a2c14541e98
-
SSDEEP
3072:W6Ccn27mUC7AdYzrV+Dljy/32ubwZZqJ:W6Ccn2xCkdYzrVolu/J0ZZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe -
Executes dropped EXE 3 IoCs
pid Process 1368 WindowsService.exe 632 WindowsService.exe 1944 WindowsService.exe -
resource yara_rule behavioral2/memory/2092-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/4760-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4760-8-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4760-6-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2092-12-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000b000000023bc1-27.dat upx behavioral2/memory/1368-34-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1368-40-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/4760-54-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1368-51-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/4760-38-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/632-57-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sidebar = "C:\\Users\\Admin\\AppData\\Roaming\\SystemWindows\\WindowsService.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2092 set thread context of 4760 2092 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 96 PID 1368 set thread context of 632 1368 WindowsService.exe 102 PID 1368 set thread context of 1944 1368 WindowsService.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe Token: SeDebugPrivilege 632 WindowsService.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2092 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 4760 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 1368 WindowsService.exe 632 WindowsService.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2092 wrote to memory of 4760 2092 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 96 PID 2092 wrote to memory of 4760 2092 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 96 PID 2092 wrote to memory of 4760 2092 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 96 PID 2092 wrote to memory of 4760 2092 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 96 PID 2092 wrote to memory of 4760 2092 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 96 PID 2092 wrote to memory of 4760 2092 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 96 PID 2092 wrote to memory of 4760 2092 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 96 PID 2092 wrote to memory of 4760 2092 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 96 PID 4760 wrote to memory of 4200 4760 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 97 PID 4760 wrote to memory of 4200 4760 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 97 PID 4760 wrote to memory of 4200 4760 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 97 PID 4200 wrote to memory of 3640 4200 cmd.exe 100 PID 4200 wrote to memory of 3640 4200 cmd.exe 100 PID 4200 wrote to memory of 3640 4200 cmd.exe 100 PID 4760 wrote to memory of 1368 4760 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 101 PID 4760 wrote to memory of 1368 4760 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 101 PID 4760 wrote to memory of 1368 4760 e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe 101 PID 1368 wrote to memory of 632 1368 WindowsService.exe 102 PID 1368 wrote to memory of 632 1368 WindowsService.exe 102 PID 1368 wrote to memory of 632 1368 WindowsService.exe 102 PID 1368 wrote to memory of 632 1368 WindowsService.exe 102 PID 1368 wrote to memory of 632 1368 WindowsService.exe 102 PID 1368 wrote to memory of 632 1368 WindowsService.exe 102 PID 1368 wrote to memory of 632 1368 WindowsService.exe 102 PID 1368 wrote to memory of 632 1368 WindowsService.exe 102 PID 1368 wrote to memory of 1944 1368 WindowsService.exe 103 PID 1368 wrote to memory of 1944 1368 WindowsService.exe 103 PID 1368 wrote to memory of 1944 1368 WindowsService.exe 103 PID 1368 wrote to memory of 1944 1368 WindowsService.exe 103 PID 1368 wrote to memory of 1944 1368 WindowsService.exe 103 PID 1368 wrote to memory of 1944 1368 WindowsService.exe 103 PID 1368 wrote to memory of 1944 1368 WindowsService.exe 103 PID 1368 wrote to memory of 1944 1368 WindowsService.exe 103 PID 1368 wrote to memory of 1944 1368 WindowsService.exe 103 PID 1368 wrote to memory of 1944 1368 WindowsService.exe 103 PID 1368 wrote to memory of 1944 1368 WindowsService.exe 103 PID 1368 wrote to memory of 1944 1368 WindowsService.exe 103 PID 1368 wrote to memory of 1944 1368 WindowsService.exe 103 PID 1368 wrote to memory of 1944 1368 WindowsService.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\e93da6ea43932ea6ab01bbd0c42b8c70_NEIKI.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QCAEH.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe" /f4⤵
- Adds Run key to start application
PID:3640
-
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:632
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
PID:1944
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157B
MD5f6a90c20834f271a907a4e2bc28184c2
SHA136c9d1602b74f622346fbb22693597d7889df48d
SHA25673f29cd953eee40cea4de67842556ffd96efe8094a6a9b70f33a35df2582febd
SHA51239cabae19fe1faa37455e4bd242c868be60d6252b07f01224b3f7501c3cf734e503300b840d83381a452707cab6df2f95f920655884be56d4024676b26943804
-
Filesize
97KB
MD5de922b693f9cae26aa9ddb5fd0ec3c30
SHA1c785c767cb570a499b94fcdcde22d33aeb32844e
SHA256c71f71d350e0892502fdf3d1383170b87b6305f55068e7e19d10c9d46ea70cee
SHA51253198c5c85628cf7cde825e0b66656d052563b347cef25461175551c84c163a006774cbd8ce98e1a481561b40ad63c06bb3363c017ef9f05d4d4f6194fc138c9