Analysis

  • max time kernel
    140s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 09:42

General

  • Target

    4dabbaf442beec2f4087f288b25e66c0_NEIKI.exe

  • Size

    54KB

  • MD5

    4dabbaf442beec2f4087f288b25e66c0

  • SHA1

    1bfc3e44c70bd74184e39cde2ca18d3d2c4921f3

  • SHA256

    bdb1f792031a2e76aea0d8078bf004b03dd5b740418bf3c379499acf01b7e997

  • SHA512

    38e4d79985291ef7a4330b6709d2357205090ffa83393c87c7c9c52a8027ad58654ee2b7cb8dbb2b03b42cdfe281e74b16de41f3981d76b78f8d30949dcd44eb

  • SSDEEP

    384:I4eyhV+fxqtWiXYpt++B7Of5nOF1NltqfKTol0BM6f:I4eyhuxYb+o56DoWolby

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4dabbaf442beec2f4087f288b25e66c0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\4dabbaf442beec2f4087f288b25e66c0_NEIKI.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2288

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\budha.exe

          Filesize

          54KB

          MD5

          5cbe70181e430b2f29709cd0d6be5bf5

          SHA1

          3d1a6191d8b687bb5088945686121432aaa5b791

          SHA256

          172c1cb87618fca56e69c4020cc534a149b7621c6b974de19bced209faba8430

          SHA512

          64e89326c32d33cd41c56479081c772c2cc86e783806e252bf24b658168abe9e996ad9f26067f0b1ebb35e2d34ec0b013e7943f364618ef9ba9c4c057e525876

        • memory/2288-14-0x00000000029F0000-0x0000000002DF0000-memory.dmp

          Filesize

          4.0MB

        • memory/2288-13-0x0000000000380000-0x0000000000381000-memory.dmp

          Filesize

          4KB

        • memory/2288-40-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2740-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2740-1-0x0000000001D50000-0x0000000001D51000-memory.dmp

          Filesize

          4KB

        • memory/2740-4-0x0000000002A10000-0x0000000002E10000-memory.dmp

          Filesize

          4.0MB

        • memory/2740-11-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2740-9-0x0000000003280000-0x000000000328B000-memory.dmp

          Filesize

          44KB