Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 16:16

General

  • Target

    ffcb3f916a2c5f26f63c413595a87f40_NEIKI.exe

  • Size

    93KB

  • MD5

    ffcb3f916a2c5f26f63c413595a87f40

  • SHA1

    cfbecfcc1eddbcdddfadd159fbb1ec0fdc338b44

  • SHA256

    95bab09e45a10cda6203d5b4ddc6b1e98be5ea1b44710300be72aa9af5e45a0b

  • SHA512

    ebfb17efa308a1a97a91a3b8e4b02dffbf59c44b311ed1798a770e80fe69d45fcba7ebdd5a2af7dd10c461891add967b7d7f08a93abdc8f43b0f93f139c9202c

  • SSDEEP

    1536:leifkxBB4C1MqmRzB+0ihT5RJ2EzkjZ0vBJ52zq9aGgUjfSL:ljfkxBhMvBrivRJ28CZEcGg8qL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffcb3f916a2c5f26f63c413595a87f40_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\ffcb3f916a2c5f26f63c413595a87f40_NEIKI.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe
      "C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hhcbrnaff.exe

    Filesize

    93KB

    MD5

    d2b1482fdfaeaa5ed21434348762b62c

    SHA1

    08184046f62b2562612acfd0d430fb54e0e8878a

    SHA256

    d623eb9ea3fa0ebb6a5a745d21f964bf67f9b8989055f7ecbd67f4e3fe100d27

    SHA512

    13cf50f4fbb7da3dfe8f11050fb99b6b57c2724e3f59cd8e2f6130abc0162e47ad6302b094fe1df3ec63e49dc31ee05cc50110a656c4d9dec03361bcfd4d0408

  • memory/2908-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2908-2-0x0000000002B80000-0x0000000002B81000-memory.dmp

    Filesize

    4KB

  • memory/2908-3-0x0000000002B90000-0x0000000002F90000-memory.dmp

    Filesize

    4.0MB

  • memory/2908-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2996-11-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2996-13-0x0000000002B20000-0x0000000002B21000-memory.dmp

    Filesize

    4KB

  • memory/2996-14-0x0000000002B30000-0x0000000002F30000-memory.dmp

    Filesize

    4.0MB

  • memory/2996-34-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB