Malware Analysis Report

2025-03-15 05:43

Sample ID 240509-aflv9shf96
Target a79c48cf06445940266124a7558aebf0_NEIKI
SHA256 3bf266d062a52d012d498077f33aa7aa324f70535552979d23b8c730b382f30d
Tags
aspackv2 persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

3bf266d062a52d012d498077f33aa7aa324f70535552979d23b8c730b382f30d

Threat Level: Likely malicious

The file a79c48cf06445940266124a7558aebf0_NEIKI was found to be: Likely malicious.

Malicious Activity Summary

aspackv2 persistence

Modifies AppInit DLL entries

ASPack v2.12-2.42

Executes dropped EXE

Drops file in Program Files directory

Unsigned PE

Suspicious use of UnmapMainImage

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-09 00:09

Signatures

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-09 00:09

Reported

2024-05-09 00:11

Platform

win10v2004-20240508-en

Max time kernel

148s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe"

Signatures

Modifies AppInit DLL entries

persistence

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\PROGRA~3\Mozilla\ywswmda.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\PROGRA~3\Mozilla\ywswmda.exe C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe N/A
File created C:\PROGRA~3\Mozilla\dzldqrl.dll C:\PROGRA~3\Mozilla\ywswmda.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe

"C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe"

C:\PROGRA~3\Mozilla\ywswmda.exe

C:\PROGRA~3\Mozilla\ywswmda.exe -zhzkoil

Network

Country Destination Domain Proto
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 168.117.168.52.in-addr.arpa udp

Files

memory/1448-0-0x0000000000400000-0x000000000045E000-memory.dmp

memory/1448-1-0x0000000000400000-0x000000000045E000-memory.dmp

memory/1448-2-0x0000000001F80000-0x0000000001FDB000-memory.dmp

memory/1448-3-0x0000000000400000-0x000000000045B000-memory.dmp

C:\ProgramData\Mozilla\ywswmda.exe

MD5 2bb2ea65a61ad0aeccf6995d5e962d1a
SHA1 8c3210a73f339e12d39b97699745decbb7e6e516
SHA256 a37653dd741e5b0beb0bb463f0bfca0e9a6d583760fda2d2220d384e6edec5a7
SHA512 84ab528a93687d54a84b9379167488749156457e295c8237ed3afc401680580d095add540d21fa6fccd6b6e69b70e4048b94a753f9ea4d27c77ea12a0e03ea45

memory/4764-7-0x0000000000400000-0x000000000045E000-memory.dmp

memory/4764-11-0x0000000000400000-0x000000000045E000-memory.dmp

memory/1448-10-0x0000000001F80000-0x0000000001FDB000-memory.dmp

memory/1448-9-0x0000000000400000-0x000000000045B000-memory.dmp

memory/4764-12-0x0000000000400000-0x000000000045E000-memory.dmp

memory/4764-15-0x0000000000400000-0x000000000045B000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-09 00:09

Reported

2024-05-09 00:12

Platform

win7-20240221-en

Max time kernel

120s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe"

Signatures

Modifies AppInit DLL entries

persistence

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\PROGRA~3\Mozilla\tbckyxk.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\PROGRA~3\Mozilla\tbckyxk.exe C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe N/A
File created C:\PROGRA~3\Mozilla\newtrln.dll C:\PROGRA~3\Mozilla\tbckyxk.exe N/A

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe N/A
N/A N/A C:\PROGRA~3\Mozilla\tbckyxk.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2700 wrote to memory of 2516 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\tbckyxk.exe
PID 2700 wrote to memory of 2516 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\tbckyxk.exe
PID 2700 wrote to memory of 2516 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\tbckyxk.exe
PID 2700 wrote to memory of 2516 N/A C:\Windows\system32\taskeng.exe C:\PROGRA~3\Mozilla\tbckyxk.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe

"C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {D04852F5-92CE-4E13-BC3A-1C63E19CAD1F} S-1-5-18:NT AUTHORITY\System:Service:

C:\PROGRA~3\Mozilla\tbckyxk.exe

C:\PROGRA~3\Mozilla\tbckyxk.exe -gqpcbye

Network

N/A

Files

memory/2380-1-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2380-2-0x0000000000460000-0x00000000004BB000-memory.dmp

memory/2380-3-0x0000000000400000-0x000000000045B000-memory.dmp

memory/2380-0-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2380-6-0x0000000000460000-0x00000000004BB000-memory.dmp

memory/2380-5-0x0000000000400000-0x000000000045B000-memory.dmp

C:\PROGRA~3\Mozilla\tbckyxk.exe

MD5 ed48350dc6067e659f6e14177e13736c
SHA1 c5ea6c1d0ad998ba8290f00f2cf81ade9339b4f9
SHA256 27a45e990683b6fd1357a666a168ddcdd5ad24cae307cc1585185e84ddb8131e
SHA512 ea4b12c926b97ba81fca94ed5aaa6887e34405106e930fe7b7d1aa996a45166cd59860ee38475550f41039eb4f6a141e8b2fba421bd37ed2bd41abe1425ab9e1

memory/2516-9-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2516-11-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2516-12-0x0000000000400000-0x000000000045B000-memory.dmp

memory/2516-10-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2516-14-0x0000000000400000-0x000000000045B000-memory.dmp