Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 09:57

General

  • Target

    55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe

  • Size

    84KB

  • MD5

    55fa9b49e126e3c2df5df53069bc4250

  • SHA1

    d0bcb1ed0b943329ed7b4353d0a5ecdedb554821

  • SHA256

    01f254aae65b694ca88dda1890bb2bd8422bcd21dd9ce455173b56d4741094d5

  • SHA512

    ead284edbaf7427815c66961590fb3da6ed0bc90d989a03316d0c81edffa0a05e417282a2cfb75a08b96264f03d392907262aa5c782ad594255b7352732eb9da

  • SSDEEP

    1536:DEIEc5HBkoNhTOWhcPYZxAxMpBd48CArrprZodC2:gIDHNhTOWhcAZxAulSC2

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\55fa9b49e126e3c2df5df53069bc4250_NEIKI.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Users\Admin\jxyioy.exe
      "C:\Users\Admin\jxyioy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\jxyioy.exe

    Filesize

    84KB

    MD5

    8c9cb55170244d0769ad98111372aaca

    SHA1

    f65efc49a2d20c660831ea66e65aab9d8cd593cd

    SHA256

    bc114e7449edf6e894fda3fef5622d5d0ab11400a33e39ec63d2c7e0fb0cc406

    SHA512

    56f909310a964b13f650a76cdee2492a5b7a75610bbdcff832333ba4c055ef794fbd7f7526a3eb7aee74b6e5ad871ba14f4da50d129b9a9075b076de21cc9ae2