Analysis

  • max time kernel
    132s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 12:17

General

  • Target

    a6590a4d6da88bd254b0e2b332c82730_NEIKI.exe

  • Size

    4.9MB

  • MD5

    a6590a4d6da88bd254b0e2b332c82730

  • SHA1

    2416779391873d3801e1658d3b3befe96042f743

  • SHA256

    c6f6d131ddfdc9d4815d7f9009f37a982cbfd3e5b863373ce9f7355f58ce9678

  • SHA512

    cfa180922659ea79f31a1dd42dc996c6d85bc5e7d8351c317a0ebd9dac30ab21611b2898df155501f83db63bba2093f53a901320ee187e8978191314635382d6

  • SSDEEP

    98304:qnmK+H+Gmm0U9Tozco0YnYrqQe2usztUoZoU0CrkdI3:qEHhmo+nYrw9sR0w3

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6590a4d6da88bd254b0e2b332c82730_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\a6590a4d6da88bd254b0e2b332c82730_NEIKI.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1064

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\E_N60005\krnln.fnr

    Filesize

    1.2MB

    MD5

    1eece63319e7c5f6718562129b1572f1

    SHA1

    089ea3a605639eb1292f6a2a9720f0b2801b0b6e

    SHA256

    4bed8a6e4e1548fddee40927b438132b47ef2aca6e9beb06b89fcf7714726310

    SHA512

    13537d1dd80fa87b6b908361957e8c434ca547a575c8c8aab43423063e60cb5523fb1843a467ae73db4a64d278c06b831551e78ae6d895201f7ef0c5b162c1ab

  • memory/1064-4-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/1064-5-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB