Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 00:51

General

  • Target

    b2be53c09c9fb876be2dfe6af68b30b0_NEIKI.exe

  • Size

    119KB

  • MD5

    b2be53c09c9fb876be2dfe6af68b30b0

  • SHA1

    7634d77396942522da7f06298afcc2c7f58a5bdd

  • SHA256

    4b40eb62476b5052143174a5f311944417c9e420a43b35edae092ac179355e55

  • SHA512

    840e991c020e73d24f45bf91cc8de61e9c713ec0e7ff0b4b15af817acbb130d15fe6945a4e09139cfba6eedc61bebacf8d57f1f5c070076516f67b338f94aa0a

  • SSDEEP

    3072:Kvt0NTc0K6lyA6Nx0pZlzxatZuib1DkgNnZ/qk/ILLb7f+XiL0SJ8p:Kv61aHtelleZ9BfNnZ/J/8H6Ss

Score
8/10

Malware Config

Signatures

  • Contacts a large (556) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 37 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2be53c09c9fb876be2dfe6af68b30b0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\b2be53c09c9fb876be2dfe6af68b30b0_NEIKI.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:468
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /installservice
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3292
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /start
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:3436
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /uninstallservice patch:C:\Users\Admin\AppData\Local\Temp\b2be53c09c9fb876be2dfe6af68b30b0_NEIKI.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies registry class
      PID:1836
  • C:\Windows\SysWOW64\urdvxc.exe
    "C:\Windows\SysWOW64\urdvxc.exe" /service
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    PID:2128
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\urdvxc.exe

      Filesize

      119KB

      MD5

      b2be53c09c9fb876be2dfe6af68b30b0

      SHA1

      7634d77396942522da7f06298afcc2c7f58a5bdd

      SHA256

      4b40eb62476b5052143174a5f311944417c9e420a43b35edae092ac179355e55

      SHA512

      840e991c020e73d24f45bf91cc8de61e9c713ec0e7ff0b4b15af817acbb130d15fe6945a4e09139cfba6eedc61bebacf8d57f1f5c070076516f67b338f94aa0a

    • memory/468-28-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/468-0-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/468-1-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/1836-30-0x00000000001C0000-0x00000000001DF000-memory.dmp

      Filesize

      124KB

    • memory/2128-47-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-31-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-19-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-20-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-21-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-22-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-23-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-24-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-25-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-26-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-17-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-29-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-16-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-51-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-32-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-33-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-34-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-35-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-36-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-37-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-38-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-39-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-40-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-41-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-42-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-43-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-44-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-45-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-46-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-12-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-52-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-49-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-55-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-18-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-48-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-53-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-54-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-50-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-56-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-57-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-58-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-59-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-60-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-61-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-62-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-63-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-64-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-65-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-66-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-67-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-68-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-69-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-70-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-71-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-72-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-73-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-74-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-75-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-76-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-77-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-78-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/2128-251-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/3292-6-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/3292-7-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/3292-8-0x00000000001E0000-0x00000000001FF000-memory.dmp

      Filesize

      124KB

    • memory/3436-10-0x00000000001C0000-0x00000000001DF000-memory.dmp

      Filesize

      124KB