Analysis

  • max time kernel
    116s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 02:00

General

  • Target

    c76d0d5eef50533613f2e967adcef250_NEIKI.exe

  • Size

    379KB

  • MD5

    c76d0d5eef50533613f2e967adcef250

  • SHA1

    1461f87c013da28373bcae8f5a0bbdaec6592c53

  • SHA256

    6c17d502d24953c1e0a643a72ba3744a6440bdc40421e4f61a38175c359169f3

  • SHA512

    05d71593d8f29da94bd85deeb4691e4a15a3fb2a63243ee57ba2dae631ef6975dcc1dd3ef89d77460ee82f53a60f5c2e4e491df475cfcbe8bd540bea352fd622

  • SSDEEP

    6144:AwynAtMrOVRkidy9yIGWlUixVheNKPu+ff0Jf:AwKfOVRo9yRYxheiue0f

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 42 IoCs
  • Drops file in Windows directory 64 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c76d0d5eef50533613f2e967adcef250_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\c76d0d5eef50533613f2e967adcef250_NEIKI.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:1688

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\widevinecdmadapterdlllibcef.exe

          Filesize

          7.7MB

          MD5

          d1043c262d3481add1753ae04cd338f2

          SHA1

          b91218e66b61ad14727566181d0964b4074cd30a

          SHA256

          540b5e1570553900bb44685b145104f23bab19f97f4e50a52c9b3ae6b6e81943

          SHA512

          ef3fc94cbbd8d084c7c7ccd8cb9c740c5cdb788d33be63291a78e83ebc429001fa2ea5393c89efbae5cbc718afd66b78f7d9a24ebdb176a92bf3f5c243ece856

        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\extractoradoberfp.exe

          Filesize

          318KB

          MD5

          ec86698ec84da963245b58d3124ffd08

          SHA1

          ea481601fbfd8d28a1703b79085c4e757dc90e9a

          SHA256

          a44e9f1a8c6a5fcec8df3effca07bf41208a773d88bdef89ca1fd2477d2500b2

          SHA512

          e87a17e2cb3e52e8fb042c6b2bb84f3676d6b8f608dd13ca0327eb5683a7da78a7239b29692f06587f62f9fa3d474bcaa6aaa3d67a3c48af648ec2a499757bd5

        • C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\RCX66EF.tmp

          Filesize

          380KB

          MD5

          cd27a935a9d9a5247bad3f36a0bf1218

          SHA1

          46b5328ee6c9d13b16870640f9affe20a381ed25

          SHA256

          9a097952756fb14bd6dabf988718dd1d21daf75c4bdeabbfa3b500838b1fa22c

          SHA512

          7f331b60897da23e5342d0e0918f14a764157ad566c9f604bbac332008fef5c0f8efd926f6f26d6758958b8c365479d2c9a41de9be1edb042780f63c7d305375

        • C:\Program Files (x86)\Common Files\System\fr-FR\Windowsdexploitation.exe

          Filesize

          379KB

          MD5

          c76d0d5eef50533613f2e967adcef250

          SHA1

          1461f87c013da28373bcae8f5a0bbdaec6592c53

          SHA256

          6c17d502d24953c1e0a643a72ba3744a6440bdc40421e4f61a38175c359169f3

          SHA512

          05d71593d8f29da94bd85deeb4691e4a15a3fb2a63243ee57ba2dae631ef6975dcc1dd3ef89d77460ee82f53a60f5c2e4e491df475cfcbe8bd540bea352fd622

        • C:\Program Files (x86)\Windows Photo Viewer\es-ES\Microsoftoperativo.exe

          Filesize

          380KB

          MD5

          5355de4f2f466a0421ac9bc6f456a749

          SHA1

          cf77a9389200fc16d20f3b1a4be78583854deddd

          SHA256

          115d720567ffc59d0bd5558898bfe4c79d821ef92b6daf61011da3e015595211

          SHA512

          1387ab6bace2adbfcfd947b44264d939be6e018eb31102155d3ae5f02756fa094ab0d85edb341e34bd23de3b7cd460e5a50a6ca35462d29240864db74dd1b9e4