Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
f3993af5c966128213600ae599da4f10_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
f3993af5c966128213600ae599da4f10_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
f3993af5c966128213600ae599da4f10_NEIKI.exe
-
Size
944KB
-
MD5
f3993af5c966128213600ae599da4f10
-
SHA1
3dc344dd35734c8b11d92b7a283c06b3d5f0f0d0
-
SHA256
a158e25da293676f1f72055a4505e9736c4028d71b8bec20103c714330c588b3
-
SHA512
8b3eea9c3ec1f2d34cb0dd675e64680148b0c2f6725f710e8122474fc91590ec00e67ecc9285ad2d8f5ea1e1f6853f7261c27b5ac2127dea3c5c0920dc38d290
-
SSDEEP
24576:q0Zmg9Y6K6aUUXVQvawvXd67WE66IZPa/ZS/QERT77Ld:qWmg9HK6arAN67WE66INggQERTbd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2392 f3993af5c966128213600ae599da4f10_NEIKI.exe -
Executes dropped EXE 1 IoCs
pid Process 2392 f3993af5c966128213600ae599da4f10_NEIKI.exe -
Loads dropped DLL 1 IoCs
pid Process 2440 f3993af5c966128213600ae599da4f10_NEIKI.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2440 f3993af5c966128213600ae599da4f10_NEIKI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2392 2440 f3993af5c966128213600ae599da4f10_NEIKI.exe 29 PID 2440 wrote to memory of 2392 2440 f3993af5c966128213600ae599da4f10_NEIKI.exe 29 PID 2440 wrote to memory of 2392 2440 f3993af5c966128213600ae599da4f10_NEIKI.exe 29 PID 2440 wrote to memory of 2392 2440 f3993af5c966128213600ae599da4f10_NEIKI.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3993af5c966128213600ae599da4f10_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\f3993af5c966128213600ae599da4f10_NEIKI.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\f3993af5c966128213600ae599da4f10_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\f3993af5c966128213600ae599da4f10_NEIKI.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2392
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944KB
MD5d34f89e9f1cc683574b5804b341c6260
SHA1df2607d77343a156c80c2a2aba5ccec711874fc3
SHA25682499c889d6f82ccf814049f3bb9ef99e4b3d28cc63c66fe897b0562502ce36c
SHA51265368de3496ab97c8ffea9435737fac37808669369e6fb67bda95645242bb998bb513afe7aee3e0986afa05a37fdb841066b13721c39dff2d89f6fa0537ee5d1