Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 08:58
Static task
static1
Behavioral task
behavioral1
Sample
3881c70fb82c7333b721aebe0e079520_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3881c70fb82c7333b721aebe0e079520_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
3881c70fb82c7333b721aebe0e079520_NEIKI.exe
-
Size
206KB
-
MD5
3881c70fb82c7333b721aebe0e079520
-
SHA1
97ad07a32d8b754df8c436c86e9ca8fa47d7aee2
-
SHA256
7095cd139b85933a265f9072524002d5afbc37d1758ed6ca4ede1eb6bab8a2b2
-
SHA512
eadd3fd15973fb9b284f2eb456c0c28e6f3626d66ab055f0be424b619d164a57b591c3f99f1aea51e24b80d9f3aa06567375bf9590ee495381e38f4d0d814338
-
SSDEEP
6144:du6ABIdHMnMMYGlPtFYmeiGLaMt8ApYUBvNdP4y2:duLIHMhPtFvei8aM2Aa8N+y2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2900 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2944 3881c70fb82c7333b721aebe0e079520_NEIKI.exe 2944 3881c70fb82c7333b721aebe0e079520_NEIKI.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\6b43c26f = "C:\\Windows\\apppatch\\svchost.exe" 3881c70fb82c7333b721aebe0e079520_NEIKI.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 3881c70fb82c7333b721aebe0e079520_NEIKI.exe File opened for modification C:\Windows\apppatch\svchost.exe 3881c70fb82c7333b721aebe0e079520_NEIKI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2900 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2944 3881c70fb82c7333b721aebe0e079520_NEIKI.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2944 3881c70fb82c7333b721aebe0e079520_NEIKI.exe Token: SeSecurityPrivilege 2944 3881c70fb82c7333b721aebe0e079520_NEIKI.exe Token: SeSecurityPrivilege 2900 svchost.exe Token: SeSecurityPrivilege 2900 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2900 2944 3881c70fb82c7333b721aebe0e079520_NEIKI.exe 28 PID 2944 wrote to memory of 2900 2944 3881c70fb82c7333b721aebe0e079520_NEIKI.exe 28 PID 2944 wrote to memory of 2900 2944 3881c70fb82c7333b721aebe0e079520_NEIKI.exe 28 PID 2944 wrote to memory of 2900 2944 3881c70fb82c7333b721aebe0e079520_NEIKI.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3881c70fb82c7333b721aebe0e079520_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3881c70fb82c7333b721aebe0e079520_NEIKI.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD543a4638af12b0b351021561793a3404a
SHA16c7ee8ad5c487e0571378578213607cea339b77e
SHA25627146996d1b18860cca6c0481eb2210a735ac6d419974761c74c8d2b357cb9fd
SHA512c6c918f96281fa5d87315f68d346124ae8a0b98740bd90bd68dfe7ad975237b328ca63d9ebbc6c56e207d77ad761252a69020eb94ef51f0f5ff3f43fca45256d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
206KB
MD5559d0efa62e3917e91b586998daabc9b
SHA158130c8849496efb43948f6ebee4a99c848d62f8
SHA25626220a5822699362cf1e61787f41eb3c11c14380d02bb604f61c0c45135ee061
SHA51286384a43c1d47023d73b17314f34a7f6f2328b3f4d309c73b47e27d00046111913dd44904138faa3fa5e407bed3e0eae16e4383eb0e1a6fb83c08a346195e629