Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
37c1379596c08f49ca728973d2b42b30_NEIKI.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
37c1379596c08f49ca728973d2b42b30_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
37c1379596c08f49ca728973d2b42b30_NEIKI.exe
-
Size
38KB
-
MD5
37c1379596c08f49ca728973d2b42b30
-
SHA1
bb24ee5d6e09b4a1e86070c461851abf22bce7be
-
SHA256
cbfa80497f1cc842ef4f42601b9827b65b3d4c413eb9f967cb96b6f9d3f81252
-
SHA512
0ad15f7084c9af8a88c62d4b634438dcce73c4659c307bd407cb1e0587d264c32f0f9eabd7492a769404576980a7e1e1ccc71d4b56e34485f4669e3e585d61ec
-
SSDEEP
768:fZjIoksdZlOvrA9DvsLKDrnuIeQTls5SQ48NPKQHDFw/Bh2+aBrP:RjwsdXOvrA9DvsLKfuIbBskQ4nsFwSrP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation vmplayer.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 37c1379596c08f49ca728973d2b42b30_NEIKI.exe -
Executes dropped EXE 2 IoCs
pid Process 448 vmplayer.exe 3712 vmplayer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vmplayer = "C:\\Users\\Admin\\AppData\\Local\\Mozilla\\vmplayer.exe -r" vmplayer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1396 PING.EXE 2320 PING.EXE 1632 PING.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3260 wrote to memory of 448 3260 37c1379596c08f49ca728973d2b42b30_NEIKI.exe 86 PID 3260 wrote to memory of 448 3260 37c1379596c08f49ca728973d2b42b30_NEIKI.exe 86 PID 3260 wrote to memory of 448 3260 37c1379596c08f49ca728973d2b42b30_NEIKI.exe 86 PID 448 wrote to memory of 3096 448 vmplayer.exe 87 PID 448 wrote to memory of 3096 448 vmplayer.exe 87 PID 448 wrote to memory of 1660 448 vmplayer.exe 89 PID 448 wrote to memory of 1660 448 vmplayer.exe 89 PID 448 wrote to memory of 1660 448 vmplayer.exe 89 PID 1660 wrote to memory of 1396 1660 cmd.exe 91 PID 1660 wrote to memory of 1396 1660 cmd.exe 91 PID 1660 wrote to memory of 1396 1660 cmd.exe 91 PID 1660 wrote to memory of 2320 1660 cmd.exe 92 PID 1660 wrote to memory of 2320 1660 cmd.exe 92 PID 1660 wrote to memory of 2320 1660 cmd.exe 92 PID 1660 wrote to memory of 1632 1660 cmd.exe 95 PID 1660 wrote to memory of 1632 1660 cmd.exe 95 PID 1660 wrote to memory of 1632 1660 cmd.exe 95 PID 1660 wrote to memory of 3712 1660 cmd.exe 98 PID 1660 wrote to memory of 3712 1660 cmd.exe 98 PID 1660 wrote to memory of 3712 1660 cmd.exe 98 PID 3712 wrote to memory of 4612 3712 vmplayer.exe 99 PID 3712 wrote to memory of 4612 3712 vmplayer.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\37c1379596c08f49ca728973d2b42b30_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\37c1379596c08f49ca728973d2b42b30_NEIKI.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Mozilla\vmplayer.exe"C:\Users\Admin\AppData\Local\Mozilla\vmplayer.exe" -r2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\system32\pcaui.exe"C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {43edc3a4-e400-4e09-bc67-4e0730eb5590} -a "VMware Workstation Pro" -v "VMware, Inc." -s "This app can't run because it causes security or performance issues on Windows. A new version may be available. Check with your software provider for an updated version that runs on this version of Windows." -n 1 -f 2109246 -k 0 -e "C:\Users\Admin\AppData\Local\Mozilla\vmplayer.exe"3⤵PID:3096
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 2&del "C:\Users\Admin\AppData\Local\Mozilla\vmplayer.exe"&ping 127.0.0.1 -n 2&rename "C:\Users\Admin\AppData\Local\Mozilla\00006CAB" vmplayer.exe&ping 127.0.0.1 -n 2&"C:\Users\Admin\AppData\Local\Mozilla\vmplayer.exe" \r3⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:1396
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2320
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:1632
-
-
C:\Users\Admin\AppData\Local\Mozilla\vmplayer.exe"C:\Users\Admin\AppData\Local\Mozilla\vmplayer.exe" \r4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\system32\pcaui.exe"C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {43edc3a4-e400-4e09-bc67-4e0730eb5590} -a "VMware Workstation Pro" -v "VMware, Inc." -s "This app can't run because it causes security or performance issues on Windows. A new version may be available. Check with your software provider for an updated version that runs on this version of Windows." -n 1 -f 2109246 -k 0 -e "C:\Users\Admin\AppData\Local\Mozilla\vmplayer.exe"5⤵PID:4612
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD56dc2dc903946b49d8e82e1f5f03bfa8c
SHA199d3f7d6d599c17cc2be0c19685ad8ea6a148b43
SHA25603cdede8194b36678c7a15f4f1b84f4bcfc7ec9993f6970f19c856e1393c2d7b
SHA512727830fd1213954006143c551b1281a13d157d9657751f494ba7f88b6338d1db3246d6823d0f80b1e91f52dbb43e0519ba5917e3634383583db78a8ae1fc4785
-
Filesize
38KB
MD537c1379596c08f49ca728973d2b42b30
SHA1bb24ee5d6e09b4a1e86070c461851abf22bce7be
SHA256cbfa80497f1cc842ef4f42601b9827b65b3d4c413eb9f967cb96b6f9d3f81252
SHA5120ad15f7084c9af8a88c62d4b634438dcce73c4659c307bd407cb1e0587d264c32f0f9eabd7492a769404576980a7e1e1ccc71d4b56e34485f4669e3e585d61ec