Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe
-
Size
84KB
-
MD5
55fa9b49e126e3c2df5df53069bc4250
-
SHA1
d0bcb1ed0b943329ed7b4353d0a5ecdedb554821
-
SHA256
01f254aae65b694ca88dda1890bb2bd8422bcd21dd9ce455173b56d4741094d5
-
SHA512
ead284edbaf7427815c66961590fb3da6ed0bc90d989a03316d0c81edffa0a05e417282a2cfb75a08b96264f03d392907262aa5c782ad594255b7352732eb9da
-
SSDEEP
1536:DEIEc5HBkoNhTOWhcPYZxAxMpBd48CArrprZodC2:gIDHNhTOWhcAZxAulSC2
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jxyioy.exe -
Executes dropped EXE 1 IoCs
pid Process 2948 jxyioy.exe -
Loads dropped DLL 2 IoCs
pid Process 2916 55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe 2916 55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /k" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /h" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /s" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /c" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /j" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /g" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /z" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /l" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /r" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /b" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /v" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /d" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /w" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /i" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /o" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /p" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /t" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /e" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /y" 55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /y" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /a" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /n" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /m" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /u" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /q" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /x" jxyioy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jxyioy = "C:\\Users\\Admin\\jxyioy.exe /f" jxyioy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2916 55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe 2948 jxyioy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2916 55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe 2948 jxyioy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2948 2916 55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe 28 PID 2916 wrote to memory of 2948 2916 55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe 28 PID 2916 wrote to memory of 2948 2916 55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe 28 PID 2916 wrote to memory of 2948 2916 55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\jxyioy.exe"C:\Users\Admin\jxyioy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD58c9cb55170244d0769ad98111372aaca
SHA1f65efc49a2d20c660831ea66e65aab9d8cd593cd
SHA256bc114e7449edf6e894fda3fef5622d5d0ab11400a33e39ec63d2c7e0fb0cc406
SHA51256f909310a964b13f650a76cdee2492a5b7a75610bbdcff832333ba4c055ef794fbd7f7526a3eb7aee74b6e5ad871ba14f4da50d129b9a9075b076de21cc9ae2