Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
36268a4d3575744fd79674c832173ae0_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
36268a4d3575744fd79674c832173ae0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
36268a4d3575744fd79674c832173ae0_NEIKI.exe
-
Size
136KB
-
MD5
36268a4d3575744fd79674c832173ae0
-
SHA1
6010734ad7d8ff3b12f7e8af8226c655f358dd58
-
SHA256
06e444805e6a0a838d944903db7ae4a0f2a74f3776e820819e9783dcfe003048
-
SHA512
8276ce096d9e29171a490c14929be04785065f050a68174b02f8059326bf7bfb2247e3d83a77903cfdd294cd1edf06b09aa5e70b8223285a535809b3fa81302a
-
SSDEEP
768:lBTkCFBzd64CtUloJ/D4JcJpSC4dqPprTZTZ2YRv0obYhUYtZDx1AvduKkbeuKMi:d840UmJc+IMP8YRco0UqsuKMDm
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Executes dropped EXE 1 IoCs
pid Process 4232 conhost.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt regini.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: conhost.exe File opened (read-only) \??\H: conhost.exe File opened (read-only) \??\I: conhost.exe File opened (read-only) \??\J: conhost.exe File opened (read-only) \??\K: conhost.exe File opened (read-only) \??\M: conhost.exe File opened (read-only) \??\P: conhost.exe File opened (read-only) \??\S: conhost.exe File opened (read-only) \??\U: conhost.exe File opened (read-only) \??\W: conhost.exe File opened (read-only) \??\Z: conhost.exe File opened (read-only) \??\N: conhost.exe File opened (read-only) \??\R: conhost.exe File opened (read-only) \??\T: conhost.exe File opened (read-only) \??\V: conhost.exe File opened (read-only) \??\Y: conhost.exe File opened (read-only) \??\E: conhost.exe File opened (read-only) \??\G: conhost.exe File opened (read-only) \??\L: conhost.exe File opened (read-only) \??\Q: conhost.exe File opened (read-only) \??\X: conhost.exe -
Discovers systems in the same network 1 TTPs 2 IoCs
pid Process 5024 net.exe 3376 net.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3252 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4356 NETSTAT.EXE 3524 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1628 systeminfo.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile regini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile regini.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4356 NETSTAT.EXE Token: SeDebugPrivilege 3252 tasklist.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4756 wrote to memory of 1500 4756 36268a4d3575744fd79674c832173ae0_NEIKI.exe 83 PID 4756 wrote to memory of 1500 4756 36268a4d3575744fd79674c832173ae0_NEIKI.exe 83 PID 4756 wrote to memory of 1500 4756 36268a4d3575744fd79674c832173ae0_NEIKI.exe 83 PID 4756 wrote to memory of 4232 4756 36268a4d3575744fd79674c832173ae0_NEIKI.exe 89 PID 4756 wrote to memory of 4232 4756 36268a4d3575744fd79674c832173ae0_NEIKI.exe 89 PID 4756 wrote to memory of 4232 4756 36268a4d3575744fd79674c832173ae0_NEIKI.exe 89 PID 4232 wrote to memory of 1540 4232 conhost.exe 90 PID 4232 wrote to memory of 1540 4232 conhost.exe 90 PID 4232 wrote to memory of 1540 4232 conhost.exe 90 PID 4232 wrote to memory of 5000 4232 conhost.exe 96 PID 4232 wrote to memory of 5000 4232 conhost.exe 96 PID 4232 wrote to memory of 5000 4232 conhost.exe 96 PID 5000 wrote to memory of 3136 5000 cmd.exe 98 PID 5000 wrote to memory of 3136 5000 cmd.exe 98 PID 5000 wrote to memory of 3136 5000 cmd.exe 98 PID 3136 wrote to memory of 3860 3136 net.exe 99 PID 3136 wrote to memory of 3860 3136 net.exe 99 PID 3136 wrote to memory of 3860 3136 net.exe 99 PID 5000 wrote to memory of 1972 5000 cmd.exe 100 PID 5000 wrote to memory of 1972 5000 cmd.exe 100 PID 5000 wrote to memory of 1972 5000 cmd.exe 100 PID 1972 wrote to memory of 2704 1972 net.exe 101 PID 1972 wrote to memory of 2704 1972 net.exe 101 PID 1972 wrote to memory of 2704 1972 net.exe 101 PID 5000 wrote to memory of 2136 5000 cmd.exe 102 PID 5000 wrote to memory of 2136 5000 cmd.exe 102 PID 5000 wrote to memory of 2136 5000 cmd.exe 102 PID 2136 wrote to memory of 3900 2136 net.exe 103 PID 2136 wrote to memory of 3900 2136 net.exe 103 PID 2136 wrote to memory of 3900 2136 net.exe 103 PID 5000 wrote to memory of 4356 5000 cmd.exe 104 PID 5000 wrote to memory of 4356 5000 cmd.exe 104 PID 5000 wrote to memory of 4356 5000 cmd.exe 104 PID 5000 wrote to memory of 3252 5000 cmd.exe 105 PID 5000 wrote to memory of 3252 5000 cmd.exe 105 PID 5000 wrote to memory of 3252 5000 cmd.exe 105 PID 5000 wrote to memory of 3524 5000 cmd.exe 106 PID 5000 wrote to memory of 3524 5000 cmd.exe 106 PID 5000 wrote to memory of 3524 5000 cmd.exe 106 PID 5000 wrote to memory of 3168 5000 cmd.exe 107 PID 5000 wrote to memory of 3168 5000 cmd.exe 107 PID 5000 wrote to memory of 3168 5000 cmd.exe 107 PID 5000 wrote to memory of 1628 5000 cmd.exe 108 PID 5000 wrote to memory of 1628 5000 cmd.exe 108 PID 5000 wrote to memory of 1628 5000 cmd.exe 108 PID 5000 wrote to memory of 1020 5000 cmd.exe 111 PID 5000 wrote to memory of 1020 5000 cmd.exe 111 PID 5000 wrote to memory of 1020 5000 cmd.exe 111 PID 5000 wrote to memory of 3376 5000 cmd.exe 112 PID 5000 wrote to memory of 3376 5000 cmd.exe 112 PID 5000 wrote to memory of 3376 5000 cmd.exe 112 PID 5000 wrote to memory of 5024 5000 cmd.exe 115 PID 5000 wrote to memory of 5024 5000 cmd.exe 115 PID 5000 wrote to memory of 5024 5000 cmd.exe 115 PID 5000 wrote to memory of 1448 5000 cmd.exe 117 PID 5000 wrote to memory of 1448 5000 cmd.exe 117 PID 5000 wrote to memory of 1448 5000 cmd.exe 117 PID 1448 wrote to memory of 2228 1448 net.exe 118 PID 1448 wrote to memory of 2228 1448 net.exe 118 PID 1448 wrote to memory of 2228 1448 net.exe 118 PID 4232 wrote to memory of 3040 4232 conhost.exe 120 PID 4232 wrote to memory of 3040 4232 conhost.exe 120 PID 4232 wrote to memory of 3040 4232 conhost.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\36268a4d3575744fd79674c832173ae0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\36268a4d3575744fd79674c832173ae0_NEIKI.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\regini.exeregini.exe C:\Users\Admin\AppData\Local\Temp\ppxxxx2⤵
- Modifies system executable filetype association
- Modifies registry class
PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\conhost.exeC:\Users\Admin\AppData\Local\Temp\conhost.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\regini.exeregini.exe C:\Users\Admin\AppData\Local\Temp\ppxxxx3⤵
- Modifies registry class
PID:1540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\must.bat3⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\net.exenet user4⤵
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user5⤵PID:3860
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup administrators4⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators5⤵PID:2704
-
-
-
C:\Windows\SysWOW64\net.exenet start4⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start5⤵PID:3900
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -ano4⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:3524
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a4⤵PID:3168
-
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:1628
-
-
C:\Windows\SysWOW64\net.exenet use4⤵PID:1020
-
-
C:\Windows\SysWOW64\net.exenet view4⤵
- Discovers systems in the same network
PID:3376
-
-
C:\Windows\SysWOW64\net.exenet view /domain4⤵
- Discovers systems in the same network
PID:5024
-
-
C:\Windows\SysWOW64\net.exenet user /domain4⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user /domain5⤵PID:2228
-
-
-
-
C:\Windows\SysWOW64\regini.exeregini.exe C:\Users\Admin\AppData\Local\Temp\ppxxxx3⤵PID:3040
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Account Manipulation
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD536268a4d3575744fd79674c832173ae0
SHA16010734ad7d8ff3b12f7e8af8226c655f358dd58
SHA25606e444805e6a0a838d944903db7ae4a0f2a74f3776e820819e9783dcfe003048
SHA5128276ce096d9e29171a490c14929be04785065f050a68174b02f8059326bf7bfb2247e3d83a77903cfdd294cd1edf06b09aa5e70b8223285a535809b3fa81302a
-
Filesize
562B
MD5def72a2e815d36d1b207e69c53a0dfb6
SHA108c091cafbc4627d3e1953adeed04a4c0791f755
SHA256f71e998458a6ffbf157edd7c4d7bf5dcf2df92f769f459b1adb901e13d5d2a00
SHA5127c5755b82d4320000cc84bc1fdb1fdff2c4244b0849ee4eebc0529a9757e73cd1b3878255571ad00f0855ffc82dac4d6d43dc28e0b32151d4a97a122b81ab9ce
-
Filesize
70B
MD520eb0bd9744f943aff13206338fdfca8
SHA1b2f64c9fddeee998f2c52b9685c87fdaeed768fe
SHA2566efe03d7c079a715fa4b6bcd52332f08b1f89e840c10a220adfe7b8318626613
SHA512b674ac8a06a11be27bfac4a12785d0b85b8bc42f70ac519df0150d940914135cdd42450103131ef276be7e27a7213a3d640dead3168cf2e6cef8ccf7e2ddbb64
-
Filesize
135B
MD515e7eafedbdbb2788c5fde53e9d045e3
SHA1b868931638b4b3ea9c44821e7ade2ffd3255ef2b
SHA2564f1c84c3f30c5f8be30326254148b597568c0ce6ad45bd8fbddc6c9600505361
SHA512e0f21948299de152d17f6f8fd49d01223d19ce605ba77b5896d200e58abfcf49241c949b38120e84aa329d5469ac69067466d81c5260db741cfdcbcf4f0c0423
-
Filesize
16KB
MD54a8a59c1378a0b43b1b20a5ecf12d7cb
SHA160be33d7cdddefd4b7e661aeeb723dc8d0f3de73
SHA256cca102e091c4a3786072886b8e3c1530f86edb670ed6e872af78b08b7a81c329
SHA5120db870306c20b232d344c2304cda08e5ec4feaef1eb5b43b85a7dac865f6d9290a6a79231a2d20ddfe00712e3a918e481799b34c7226b308263d6bac135b80f6