Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 08:58
Static task
static1
Behavioral task
behavioral1
Sample
3881c70fb82c7333b721aebe0e079520_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3881c70fb82c7333b721aebe0e079520_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
3881c70fb82c7333b721aebe0e079520_NEIKI.exe
-
Size
206KB
-
MD5
3881c70fb82c7333b721aebe0e079520
-
SHA1
97ad07a32d8b754df8c436c86e9ca8fa47d7aee2
-
SHA256
7095cd139b85933a265f9072524002d5afbc37d1758ed6ca4ede1eb6bab8a2b2
-
SHA512
eadd3fd15973fb9b284f2eb456c0c28e6f3626d66ab055f0be424b619d164a57b591c3f99f1aea51e24b80d9f3aa06567375bf9590ee495381e38f4d0d814338
-
SSDEEP
6144:du6ABIdHMnMMYGlPtFYmeiGLaMt8ApYUBvNdP4y2:duLIHMhPtFvei8aM2Aa8N+y2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2408 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\2e2a8392 = "C:\\Windows\\apppatch\\svchost.exe" 3881c70fb82c7333b721aebe0e079520_NEIKI.exe -
Drops file in Program Files directory 35 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\DLL\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wrpcrt4.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\winsta.pdb svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 3881c70fb82c7333b721aebe0e079520_NEIKI.exe File opened for modification C:\Windows\apppatch\svchost.exe 3881c70fb82c7333b721aebe0e079520_NEIKI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2064 3881c70fb82c7333b721aebe0e079520_NEIKI.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2064 3881c70fb82c7333b721aebe0e079520_NEIKI.exe Token: SeSecurityPrivilege 2064 3881c70fb82c7333b721aebe0e079520_NEIKI.exe Token: SeSecurityPrivilege 2408 svchost.exe Token: SeSecurityPrivilege 2408 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2408 2064 3881c70fb82c7333b721aebe0e079520_NEIKI.exe 85 PID 2064 wrote to memory of 2408 2064 3881c70fb82c7333b721aebe0e079520_NEIKI.exe 85 PID 2064 wrote to memory of 2408 2064 3881c70fb82c7333b721aebe0e079520_NEIKI.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\3881c70fb82c7333b721aebe0e079520_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\3881c70fb82c7333b721aebe0e079520_NEIKI.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
206KB
MD5d52c33747f89b96a1e337fe89818a8af
SHA1131bd93ff5335ad23f4ad605e155f9933481a351
SHA256898a5269a9c0a0083a8d94fe40bca70236bb1a67b62bae66dd9709c0575aa813
SHA5128bf9ed2f259cad7ed1b9fcc827b3f30e3d2dae10421159cce8b5efd1d3328aeb9e08a8104d7974cc8928667f5398756a4ac3fbc8712cadc838da725e80d900cb