Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 21:09

General

  • Target

    545481c4ed3c09558e861536d8e825d0_NEIKI.exe

  • Size

    847KB

  • MD5

    545481c4ed3c09558e861536d8e825d0

  • SHA1

    3276fec1f0fa96b9e4789146048448d486ef37b9

  • SHA256

    1d5eaa309ea7644338606aeacd627e6e90cc0d0a1f3043e635c61a48c0e46a70

  • SHA512

    f587f916ba50a0a13eed46b5343ccfb7e1c1c55da1c300b8286b6429ddd55f8a209505dad8b835e11c55fcccd7615cd546363ccacd78de27d83e81048b376cb7

  • SSDEEP

    24576:p1bRVqnr3NjBBcGUOb4LG1WJgj0acJOq0WiV:pPSNx4Li95Pq0t

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\545481c4ed3c09558e861536d8e825d0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\545481c4ed3c09558e861536d8e825d0_NEIKI.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:4500

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

          Filesize

          930KB

          MD5

          c36d6e47b8c380cf001919a503c1cd79

          SHA1

          688715cff1b44f5b7f1beaa21bcc9e430387c298

          SHA256

          613f454bb3efafd00904607438f6a960db29cb7a34cef00dd747da6e1e0d7e0a

          SHA512

          7b157c2cf86056086dbfff0349c815fa91778f63cb7cb080d70a677566471c4c2aa94bac2cada8ccbda7a37063e220b0a5e4ecd0b385901015e9361f54f8a094

        • memory/4500-40-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4500-101-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4500-102-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4500-103-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4500-104-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4500-105-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4500-106-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4500-107-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4500-108-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4500-109-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB