Analysis

  • max time kernel
    133s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-05-2024 08:54

General

  • Target

    37032fa37ef6f45e365a9814036479f0_NEIKI.exe

  • Size

    36KB

  • MD5

    37032fa37ef6f45e365a9814036479f0

  • SHA1

    f49077316bcb6837adcbb6e877f9f5d55e46d328

  • SHA256

    4c8ba40d8d70f3eec35502503244384793413f5b9e4efcb8576dbee92aa2986a

  • SHA512

    9d0587ad992458bf5e38553179c7358be5b1bc59131ddd22c04af3fd3ec364c85dedf48cb8bdb98bc5a0d4749b16ac12a1ce41c571c16a646d780f808531af45

  • SSDEEP

    768:IY2vb9V6drHOYLES5LbyZWBxf6fVxKfOoePtSYDi:52vb941RR5iZWLWfi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37032fa37ef6f45e365a9814036479f0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\37032fa37ef6f45e365a9814036479f0_NEIKI.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\pdfupdate.exe
      "C:\Users\Admin\AppData\Local\Temp\pdfupdate.exe"
      2⤵
      • Executes dropped EXE
      PID:528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pdfupdate.exe

    Filesize

    36KB

    MD5

    5d44c3d72c2a37d3322ad2081841e110

    SHA1

    6183df3e5da5e8c48cf8fab35e2638e035f51a1a

    SHA256

    4011a330c848a521fb5c2148ce8f790d40a1d3d08571960ebe978fb9c06cb2a5

    SHA512

    0759e100b7340a75a4fe50c7e64be5c4b30304fda0e14f184be20dff5a5687efbae855b80efb0531424b4ceae6492b276ee90d47bbb3ad29e121681700f97f3c

  • memory/528-11-0x0000000000600000-0x0000000000607000-memory.dmp

    Filesize

    28KB

  • memory/1616-0-0x0000000000600000-0x0000000000607000-memory.dmp

    Filesize

    28KB

  • memory/1616-2-0x0000000000601000-0x0000000000602000-memory.dmp

    Filesize

    4KB

  • memory/1616-9-0x0000000000600000-0x0000000000607000-memory.dmp

    Filesize

    28KB