Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 08:49

General

  • Target

    349425b7c8161154e6d58160819471c0_NEIKI.exe

  • Size

    31KB

  • MD5

    349425b7c8161154e6d58160819471c0

  • SHA1

    222b224aecdf7649742d1c2056911ee60bb38c60

  • SHA256

    e11cd21df27591013f768c97d9ff624e0426e4d930e0898ead0c6c80853d06b1

  • SHA512

    858516197f7c7bba43688c44f36b67633486ceeeeb3061e5e5a993f360ec8356bc41f1683916a9ddf30469023901b1023a506360d8b78e08c4c69592bc99273d

  • SSDEEP

    768:OqPJtYA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EwhSahGCow:Oq4A6C1VqaqhtgVRNToV7TtRu8rM0wYm

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\349425b7c8161154e6d58160819471c0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\349425b7c8161154e6d58160819471c0_NEIKI.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    31KB

    MD5

    b0bca12b0bc76a5b36a5fa7273d5ef72

    SHA1

    3cc36108809048e557261f26bd80e56546e09b5f

    SHA256

    41257d6d38c091f9d18bfb30c5046924a2f5bbe0f54b068e8fa4e58770c13246

    SHA512

    1b9d7073ed4ea1d7f3682b117cca07db2e010f0f5bc6ed624d3c2cd4628176fbe7d63dfeeb9745fd859d597cceabe9e6b97b953f1cca50003a156330b8210a73

  • memory/1688-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1688-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB