Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 20:55
Behavioral task
behavioral1
Sample
4d484d73829d66610fe2677c385bdb50_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4d484d73829d66610fe2677c385bdb50_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
4d484d73829d66610fe2677c385bdb50_NEIKI.exe
-
Size
71KB
-
MD5
4d484d73829d66610fe2677c385bdb50
-
SHA1
6c6d962c7377bdab66ea170ba01d1bd22e3812a8
-
SHA256
e06c18092029edd8fc0a9d38697edcf9b563ea9de7d3fb93692ff15b59c9c192
-
SHA512
6ca89c91b2af9a0381d43321262f0f3d8ad60637e81ca3ad816759d24f9494ec9f01b2cb2c41f5e91a2edd6e20bf6d1a165f4cf0755127a8a7862109cb49576b
-
SSDEEP
1536:y4QQ6NSyM61l19piO+LV8YEoI/EU9RUe4mFbGepNyx/20:y4X6NSyfnpijeYEoIcq40xNyr
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4456-0-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/files/0x000700000002348c-6.dat upx behavioral2/memory/4456-29-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" 4d484d73829d66610fe2677c385bdb50_NEIKI.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\hot girl on the beach sucking cock and fucking guy.mpg.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\AIM Flooder.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - xxx nurse scene.mpg.pif 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\Warcraft 3 battle.net serial generator.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\AIM Account Stealer.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\nude.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\DivX pro key generator.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\Universal Game Crack.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\teen tied up and raped.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\virtua girl - adriana.pif 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\preteen sucking huge cock illegal.mpg.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\aol password cracker.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\Play Games Online For FREE.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\CKY3 - Bam Margera World Industries Alien Workshop.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\Free Porn.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\divx pro.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\AOL.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\MSN Flooder.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\AOL, MSN, Yahoo mail password stealer.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\Harry Potter and the sorcerors stone.divx.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\Cable Modem Uncapper.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\Another bang bus victim forced rape sex cum.mpg.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\Lolita preteen sex.mpeg.pif 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\fetish bondage preteen porno.mpg.pif 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\Teen Violent Forced Gangbang.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\macromd\aimhacker.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe File created C:\Windows\SysWOW64\winxcfg.exe 4d484d73829d66610fe2677c385bdb50_NEIKI.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5cec348b6377451d72500eaeb2ffb5b11
SHA13f0d847e89fbb09a69d2178c933164cbd2665c25
SHA256e6bd5d29be096cb129b695c0f05f4295186e7283305349db3e8b7d393da161d5
SHA5121f52a08578d455fc0e868336b41562d3f63d941ac678e3e4b7b5e2989df1c19cd765b444b896b9af8b844e9892e0baa4ce6a084bb2b03e5eab29db3a2ea91e15