Analysis
-
max time kernel
140s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
f5caa7522c5678ad6b9c09e2881eb5e0_NEIKI.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f5caa7522c5678ad6b9c09e2881eb5e0_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
f5caa7522c5678ad6b9c09e2881eb5e0_NEIKI.exe
-
Size
80KB
-
MD5
f5caa7522c5678ad6b9c09e2881eb5e0
-
SHA1
6b352e99da96c14f23767f3f4962e51e3aa1653b
-
SHA256
1b537068f2408296ac7ed33672faab053bf2a3c63fc8422b48551acfc644c296
-
SHA512
54fcbbb79029b16526d226a75984789737de07e55d92a3e6b05c69c546d5bbae18d3c6c1cc93013f207dde39022aee9b79aed77ad727ca981d91a36eea922e3d
-
SSDEEP
768:JNK2cNW0QbRsWjcd+6yBFLqJ4Z8qx70RM8/O/B2Z9tRQPR:pcNjQlsWjcd+xzl7SMQQPR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2680 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" f5caa7522c5678ad6b9c09e2881eb5e0_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe f5caa7522c5678ad6b9c09e2881eb5e0_NEIKI.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1224 f5caa7522c5678ad6b9c09e2881eb5e0_NEIKI.exe Token: SeDebugPrivilege 2680 CTS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2680 1224 f5caa7522c5678ad6b9c09e2881eb5e0_NEIKI.exe 82 PID 1224 wrote to memory of 2680 1224 f5caa7522c5678ad6b9c09e2881eb5e0_NEIKI.exe 82 PID 1224 wrote to memory of 2680 1224 f5caa7522c5678ad6b9c09e2881eb5e0_NEIKI.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5caa7522c5678ad6b9c09e2881eb5e0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\f5caa7522c5678ad6b9c09e2881eb5e0_NEIKI.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402KB
MD5518e1189d33bcf94c69df68a998aa8fc
SHA15d2cc67c45dcfc9cde64e2e30c4e1bd87a76734d
SHA25680731ec25a325504d23b15b5ecd563cd69a7bcb51b1bf6331dad9c1e52db640e
SHA51260be20510ca7ed12c1f625dcd8ddd94220695038d79e029512043225ab96211133c86c34c6bbf2eacfcb336eb049e91bdd2befddc509dc81efca361472dfa889
-
Filesize
80KB
MD500fe224a8c27f861bb3874e7da08aef9
SHA113f886382107327a92bbc05f0d8e957c5843cef2
SHA256e02ef6ab9f4b5469ff8dc97a4a0c9d6b63696ce27ae5accecc8342647351ddee
SHA51250a5992c7a29e99be24031fd87e1bac308d5a654edf232de9c78f8ce96a9d5cd71164272b871db78611c1d6ba0af84fe806d6b4db02a95fd7c2b3f9b94025c7f
-
Filesize
80KB
MD5ec704028ad7125c2fa52e04dc68c0ca3
SHA12a63f27d0138696c9c27a9ea2534e8f2ca11ddc4
SHA2565f77a5d7c9eac3b004820646dece450e315a6e3ed320dc183ae68d59cd2318bf
SHA512a008a08c980583b8698431ca44fa45d5565fdc5316dc3e58c47ae523e7a7a776162979b0c79f9c64f0b71e0d98fb49102679378354f76c270d0c99207c15d160