Analysis Overview
SHA256
3bf266d062a52d012d498077f33aa7aa324f70535552979d23b8c730b382f30d
Threat Level: Likely malicious
The file a79c48cf06445940266124a7558aebf0_NEIKI was found to be: Likely malicious.
Malicious Activity Summary
Modifies AppInit DLL entries
ASPack v2.12-2.42
Executes dropped EXE
Drops file in Program Files directory
Unsigned PE
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-09 00:09
Signatures
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-09 00:09
Reported
2024-05-09 00:11
Platform
win10v2004-20240508-en
Max time kernel
148s
Max time network
152s
Command Line
Signatures
Modifies AppInit DLL entries
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\PROGRA~3\Mozilla\ywswmda.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\PROGRA~3\Mozilla\ywswmda.exe | C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe | N/A |
| File created | C:\PROGRA~3\Mozilla\dzldqrl.dll | C:\PROGRA~3\Mozilla\ywswmda.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe
"C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe"
C:\PROGRA~3\Mozilla\ywswmda.exe
C:\PROGRA~3\Mozilla\ywswmda.exe -zhzkoil
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 168.117.168.52.in-addr.arpa | udp |
Files
memory/1448-0-0x0000000000400000-0x000000000045E000-memory.dmp
memory/1448-1-0x0000000000400000-0x000000000045E000-memory.dmp
memory/1448-2-0x0000000001F80000-0x0000000001FDB000-memory.dmp
memory/1448-3-0x0000000000400000-0x000000000045B000-memory.dmp
C:\ProgramData\Mozilla\ywswmda.exe
| MD5 | 2bb2ea65a61ad0aeccf6995d5e962d1a |
| SHA1 | 8c3210a73f339e12d39b97699745decbb7e6e516 |
| SHA256 | a37653dd741e5b0beb0bb463f0bfca0e9a6d583760fda2d2220d384e6edec5a7 |
| SHA512 | 84ab528a93687d54a84b9379167488749156457e295c8237ed3afc401680580d095add540d21fa6fccd6b6e69b70e4048b94a753f9ea4d27c77ea12a0e03ea45 |
memory/4764-7-0x0000000000400000-0x000000000045E000-memory.dmp
memory/4764-11-0x0000000000400000-0x000000000045E000-memory.dmp
memory/1448-10-0x0000000001F80000-0x0000000001FDB000-memory.dmp
memory/1448-9-0x0000000000400000-0x000000000045B000-memory.dmp
memory/4764-12-0x0000000000400000-0x000000000045E000-memory.dmp
memory/4764-15-0x0000000000400000-0x000000000045B000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-09 00:09
Reported
2024-05-09 00:12
Platform
win7-20240221-en
Max time kernel
120s
Max time network
127s
Command Line
Signatures
Modifies AppInit DLL entries
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\PROGRA~3\Mozilla\tbckyxk.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\PROGRA~3\Mozilla\tbckyxk.exe | C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe | N/A |
| File created | C:\PROGRA~3\Mozilla\newtrln.dll | C:\PROGRA~3\Mozilla\tbckyxk.exe | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe | N/A |
| N/A | N/A | C:\PROGRA~3\Mozilla\tbckyxk.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2700 wrote to memory of 2516 | N/A | C:\Windows\system32\taskeng.exe | C:\PROGRA~3\Mozilla\tbckyxk.exe |
| PID 2700 wrote to memory of 2516 | N/A | C:\Windows\system32\taskeng.exe | C:\PROGRA~3\Mozilla\tbckyxk.exe |
| PID 2700 wrote to memory of 2516 | N/A | C:\Windows\system32\taskeng.exe | C:\PROGRA~3\Mozilla\tbckyxk.exe |
| PID 2700 wrote to memory of 2516 | N/A | C:\Windows\system32\taskeng.exe | C:\PROGRA~3\Mozilla\tbckyxk.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe
"C:\Users\Admin\AppData\Local\Temp\a79c48cf06445940266124a7558aebf0_NEIKI.exe"
C:\Windows\system32\taskeng.exe
taskeng.exe {D04852F5-92CE-4E13-BC3A-1C63E19CAD1F} S-1-5-18:NT AUTHORITY\System:Service:
C:\PROGRA~3\Mozilla\tbckyxk.exe
C:\PROGRA~3\Mozilla\tbckyxk.exe -gqpcbye
Network
Files
memory/2380-1-0x0000000000400000-0x000000000045E000-memory.dmp
memory/2380-2-0x0000000000460000-0x00000000004BB000-memory.dmp
memory/2380-3-0x0000000000400000-0x000000000045B000-memory.dmp
memory/2380-0-0x0000000000400000-0x000000000045E000-memory.dmp
memory/2380-6-0x0000000000460000-0x00000000004BB000-memory.dmp
memory/2380-5-0x0000000000400000-0x000000000045B000-memory.dmp
C:\PROGRA~3\Mozilla\tbckyxk.exe
| MD5 | ed48350dc6067e659f6e14177e13736c |
| SHA1 | c5ea6c1d0ad998ba8290f00f2cf81ade9339b4f9 |
| SHA256 | 27a45e990683b6fd1357a666a168ddcdd5ad24cae307cc1585185e84ddb8131e |
| SHA512 | ea4b12c926b97ba81fca94ed5aaa6887e34405106e930fe7b7d1aa996a45166cd59860ee38475550f41039eb4f6a141e8b2fba421bd37ed2bd41abe1425ab9e1 |
memory/2516-9-0x0000000000400000-0x000000000045E000-memory.dmp
memory/2516-11-0x0000000000400000-0x000000000045E000-memory.dmp
memory/2516-12-0x0000000000400000-0x000000000045B000-memory.dmp
memory/2516-10-0x0000000000400000-0x000000000045E000-memory.dmp
memory/2516-14-0x0000000000400000-0x000000000045B000-memory.dmp