Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 17:23

General

  • Target

    016d2e8dbf0e62b3948f3d1d1931dc40_NEIKI.exe

  • Size

    122KB

  • MD5

    016d2e8dbf0e62b3948f3d1d1931dc40

  • SHA1

    1cba136b50975790e6bc8790c8760a1f0c49a3d0

  • SHA256

    09043bdd83555e08e88565f8219ee4606a6dabed471332a67cd48e3da51fa893

  • SHA512

    b9fa22eef2df0b07ddc5156da357809528e929c5a3e47e90b342318084c9c57802a34b7b616603c5bee361baa997f54b6d20254891253dcf8b7868929e1b3cf2

  • SSDEEP

    1536:nFyzF9MFVCujlsQoeQZZ86ukpj0nGGF9v+4DRIG:FyzQVCujl71QZZ4kp4F9XtIG

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\016d2e8dbf0e62b3948f3d1d1931dc40_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\016d2e8dbf0e62b3948f3d1d1931dc40_NEIKI.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4620
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1976
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1912
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1372
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\mrsys.exe

    Filesize

    122KB

    MD5

    7732d62e3ff4aa0946e6cbac1cfbb728

    SHA1

    4d16a678eb07e2a7666739d4ab3cfc1b3b59f266

    SHA256

    48796aa7f4ff218ad77a4280f7546fc090b57851a3c7fa5ebd4689d92ea04c2a

    SHA512

    79b22f9d6d8f79e058bafa0d893d688cf6ac912f4339f0efe16e4d19fbd8a9b13d07c92c6d8a104615f6349d483da091d7dc46ebd94de174bbbdd1857d4ee303

  • C:\Windows\System\spoolsv.exe

    Filesize

    122KB

    MD5

    ec59e282b71a43e6d957f63a474587a0

    SHA1

    4969f9506f0bbc1a503a424ce776927cdb402a82

    SHA256

    080f03c19bc1723537f1b290866d44ac797106729dfa64be60e7eac639527cf4

    SHA512

    23c29e0b609e2ab25d5bc00acf3c58d29cbab4cd9f2509a04938811e94422e67ccc8838235a9f1deaea4a18acdda5d5830186b16be0edb20c0da17459d94c575

  • C:\Windows\System\svchost.exe

    Filesize

    122KB

    MD5

    7336cf86ae207a0bdef304fcef2cdb2b

    SHA1

    3129831a79b0ba92fa138b4b6213278971a99403

    SHA256

    1fd55de46b8abf4ccd3af7067a1fc22d34b49c211b626b39b8c4742638197f52

    SHA512

    6b1c227f5540d26c899ae1e20004651636619a85bdf850be4d8628d71e5fa001072c9044faf84fbc9dba3287b583ad14389553a30dc310ff67b1d5db26c68276

  • \??\c:\windows\system\explorer.exe

    Filesize

    122KB

    MD5

    9f23cce244bc2e4dd3c441598eff2eee

    SHA1

    f23dbea7fc3c62a8484fab06ce988e0d9718cebb

    SHA256

    bec11ac6e475c6b24cf4e5cf8c82a9586c7e1851c0b158f0e55a3119845905e6

    SHA512

    68bfab1a0c5ea59075018e1b51569d6c679f83e9e3651910727342c5f25534baa8926510ec934f2a646d0c04ae07a98ea5fa17a7c161f95eef7fedb1d2b15332