Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
af09fce6547585b7d1e1deceff56e880_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
af09fce6547585b7d1e1deceff56e880_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
af09fce6547585b7d1e1deceff56e880_NEIKI.exe
-
Size
200KB
-
MD5
af09fce6547585b7d1e1deceff56e880
-
SHA1
2438b9aeb2cb3c2814d7aa334a7f16bc59352079
-
SHA256
47759618989fd81334efa1f290a5328e0f4409ade9f7683bad4a0cf9df6703d8
-
SHA512
a6bdb7dc2783616de2558f476098c531bd614e4a2f52b8a96b15908672ff942434e4822846905ec75fbd11d4fa6dc4b2de863ec61b28764869dc6ee1cdfb6c01
-
SSDEEP
6144:KexwTXcuuZ9AhwOFWfUnp4g8kVdpG1B7u:KQUXcuujAhVFWfUnp4qG1BC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1940 af09fce6547585b7d1e1deceff56e880_NEIKI.exe -
Executes dropped EXE 1 IoCs
pid Process 1940 af09fce6547585b7d1e1deceff56e880_NEIKI.exe -
Loads dropped DLL 1 IoCs
pid Process 2012 af09fce6547585b7d1e1deceff56e880_NEIKI.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2012 af09fce6547585b7d1e1deceff56e880_NEIKI.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1940 af09fce6547585b7d1e1deceff56e880_NEIKI.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1940 2012 af09fce6547585b7d1e1deceff56e880_NEIKI.exe 29 PID 2012 wrote to memory of 1940 2012 af09fce6547585b7d1e1deceff56e880_NEIKI.exe 29 PID 2012 wrote to memory of 1940 2012 af09fce6547585b7d1e1deceff56e880_NEIKI.exe 29 PID 2012 wrote to memory of 1940 2012 af09fce6547585b7d1e1deceff56e880_NEIKI.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\af09fce6547585b7d1e1deceff56e880_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\af09fce6547585b7d1e1deceff56e880_NEIKI.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\af09fce6547585b7d1e1deceff56e880_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\af09fce6547585b7d1e1deceff56e880_NEIKI.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5e7bc34c97e58102c1211c355b4887d43
SHA17fa5457fe849e893bb2eadbefad9d83ff52729f3
SHA256bb3935031e612341030fcb3e545978857b46f226b8986734f9782c7c215b0ef3
SHA512f1e7f10c60e3b5efa7fd2c1d84c7f6803201c7be3ac4bc4730df0d4911f86795be9f4ab6460b74bf658d0d90136028dcdaf549de0a96faa6d59503efb443cf88