Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
fb271a1b5b3c79e431ec668f312b5bc0_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb271a1b5b3c79e431ec668f312b5bc0_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
fb271a1b5b3c79e431ec668f312b5bc0_NEIKI.exe
-
Size
512KB
-
MD5
fb271a1b5b3c79e431ec668f312b5bc0
-
SHA1
9e4d58de4baf4400c3f4c1df6f9b7638ff898db4
-
SHA256
243441c2d0346df0fb3f4fd851bf67483e175451f8d1446df06e4d8171763b04
-
SHA512
840bd9eefcc76483f77052de29f6c1634f39adbc4350b5fc7771fc5ff720b86af83eeae00863cab29a6c605746a066759d0ef1619c2c328970dcdebc7feee8df
-
SSDEEP
12288:ZmB8gNlMehudCyfi0npM4dl0v5Jdm5IpS:AlMdCyfiEM4dmv5Bw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1360 fb271a1b5b3c79e431ec668f312b5bc0_NEIKI.exe -
Executes dropped EXE 1 IoCs
pid Process 1360 fb271a1b5b3c79e431ec668f312b5bc0_NEIKI.exe -
Program crash 6 IoCs
pid pid_target Process procid_target 3068 3920 WerFault.exe 83 3560 1360 WerFault.exe 89 1848 1360 WerFault.exe 89 1304 1360 WerFault.exe 89 4748 1360 WerFault.exe 89 1388 1360 WerFault.exe 89 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3920 fb271a1b5b3c79e431ec668f312b5bc0_NEIKI.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1360 fb271a1b5b3c79e431ec668f312b5bc0_NEIKI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3920 wrote to memory of 1360 3920 fb271a1b5b3c79e431ec668f312b5bc0_NEIKI.exe 89 PID 3920 wrote to memory of 1360 3920 fb271a1b5b3c79e431ec668f312b5bc0_NEIKI.exe 89 PID 3920 wrote to memory of 1360 3920 fb271a1b5b3c79e431ec668f312b5bc0_NEIKI.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb271a1b5b3c79e431ec668f312b5bc0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\fb271a1b5b3c79e431ec668f312b5bc0_NEIKI.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 3842⤵
- Program crash
PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\fb271a1b5b3c79e431ec668f312b5bc0_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\fb271a1b5b3c79e431ec668f312b5bc0_NEIKI.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 3523⤵
- Program crash
PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 7723⤵
- Program crash
PID:1848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 7923⤵
- Program crash
PID:1304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 7803⤵
- Program crash
PID:4748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 8003⤵
- Program crash
PID:1388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3920 -ip 39201⤵PID:3152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1360 -ip 13601⤵PID:2360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1360 -ip 13601⤵PID:4288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1360 -ip 13601⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1360 -ip 13601⤵PID:2544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1360 -ip 13601⤵PID:4484
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD56d1aa11b241bb10ae5219c9fdff0b585
SHA17b38b5247ed7af857e78a234cdeddef47487fb9b
SHA256175fdb342a85ef597dd0cd9a38622de8a5ed5e4465057edeed8cc3a47dd7591b
SHA512a56476e3f9745e8e0a33cf2ec137a43b4ef3bdd7e5ecab195e3c901cb039ae85c7fbb55539b76879e851edd0cef05e27dc92e1d5bf5df43d016fcc2acba45d8f