Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 11:39
Behavioral task
behavioral1
Sample
8dfed34fa34222a3fa7d599c2b35ecc0_NEIKI.exe
Resource
win7-20240221-en
General
-
Target
8dfed34fa34222a3fa7d599c2b35ecc0_NEIKI.exe
-
Size
10.0MB
-
MD5
8dfed34fa34222a3fa7d599c2b35ecc0
-
SHA1
82b38658abd5a63e8fdf64a5bb43bf7207d2e5d5
-
SHA256
bf07a71dadcf58e5153e4c96c530e7eb1ad21a92c5bbfd82c9ec9fcf22a733b1
-
SHA512
6b3d494b99e644d29f53db155651ea7b10f2c38345132f2d644cbb4b55e6b208865d0187d788243adaabac67d33359ff923dfc5b4c19210542d17a4b692e79ba
-
SSDEEP
196608:Zp5Ekh1kb5RYqF1W903eV4QRM993iObMAR1jQmGYuuLmgri+91P2kjv:75Ekh2FGiW+eGQRe93iObLRS/MLhri6L
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2640 8dfed34fa34222a3fa7d599c2b35ecc0_NEIKI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2640 1400 8dfed34fa34222a3fa7d599c2b35ecc0_NEIKI.exe 28 PID 1400 wrote to memory of 2640 1400 8dfed34fa34222a3fa7d599c2b35ecc0_NEIKI.exe 28 PID 1400 wrote to memory of 2640 1400 8dfed34fa34222a3fa7d599c2b35ecc0_NEIKI.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dfed34fa34222a3fa7d599c2b35ecc0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\8dfed34fa34222a3fa7d599c2b35ecc0_NEIKI.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\8dfed34fa34222a3fa7d599c2b35ecc0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\8dfed34fa34222a3fa7d599c2b35ecc0_NEIKI.exe"2⤵
- Loads dropped DLL
PID:2640
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD565e381a0b1bc05f71c139b0c7a5b8eb2
SHA17c4a3adf21ebcee5405288fc81fc4be75019d472
SHA25653a969094231b9032abe4148939ce08a3a4e4b30b0459fc7d90c89f65e8dcd4a
SHA5124db465ef927dfb019ab6faec3a3538b0c3a8693ea3c2148fd16163bf31c03c899dfdf350c31457edf64e671e3cc3e46851f32f0f84b267535bebc4768ef53d39