Analysis

  • max time kernel
    19s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 03:19

General

  • Target

    dcdd80fef49233e1f1569ffcb7f8e580_NEIKI.exe

  • Size

    291KB

  • MD5

    dcdd80fef49233e1f1569ffcb7f8e580

  • SHA1

    32d88256f625abd5ede81703b0fa223929050e17

  • SHA256

    729e376b0d44c95438de65974b23b3e0bfb1eb27edb4cf5e366e50e36c411a22

  • SHA512

    116ec423f531acf5faa394595c1a2ada5b99939f46e207f0332979c8a297659a08c69521c083e04e95d19cf16a6780152540ba35b5dbda5c6339fab15cb99ebd

  • SSDEEP

    3072:WcX93xwq19gL2SjGojCJa79TBfsY5vXWqvuHcYnLzqP2soN5Cfsw:WcNhJgX9z9TB0YRX8naO5u

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcdd80fef49233e1f1569ffcb7f8e580_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\dcdd80fef49233e1f1569ffcb7f8e580_NEIKI.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1672
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev2FA8.tmp!C:\Users\Admin\AppData\Local\Temp\dcdd80fef49233e1f1569ffcb7f8e580_NEIKI.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Users\Admin\AppData\Local\Temp\DCDD80FEF49233E1F1569FFCB7F8E580_NEIKI.EXE
        3⤵
        • Executes dropped EXE
        PID:2652
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev2FA8.tmp!C:\Users\Admin\AppData\Local\Temp\DCDD80FEF49233E1F1569FFCB7F8E580_NEIKI.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2680

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DCDD80FEF49233E1F1569FFCB7F8E580_NEIKI.EXE

          Filesize

          291KB

          MD5

          f1d7e8ed21347736447c8db37aae9ff3

          SHA1

          9fc57ae4265b861e96e915f308627ee214aa9f84

          SHA256

          731441967d62ccec2678e2d816b6c9ed9c59a6be490817638e293d7d2122bee1

          SHA512

          4c52e00ec88801d0b8526c914d5c93cf6b2ff4aa6627fae25d9ee4e678f1aecf827ec9032b58307947851e532a1cf5a7f0966f797fc90b4ff9f9a67a55b9422d

        • C:\Windows\MSWDM.EXE

          Filesize

          256KB

          MD5

          8a1198209520897514a2d82a912a66d2

          SHA1

          5dda8ec47f948814d808cd71e89ebe65940a1ff7

          SHA256

          5ce9e416f5b7811b9e91ec2de680aad0c38aa4a080999853b096b06d409887f0

          SHA512

          9a6e4e3729f77bcdcc1ace7fa154490717473fb05899e13b1f920ee438dc1c1812eae6fdec8b97da7807e9d626014ad0481d9cf0d4f5a06e327b4b75534f7e00

        • C:\Windows\dev2FA8.tmp

          Filesize

          35KB

          MD5

          6a7c4dc0fe5a8a33154566b5071b47c4

          SHA1

          265a1bcc6b6a6be7a7ad35194fb4984d7bb7ef88

          SHA256

          152944690bb39772fc594430205be704f7068c7a4bbcbe58074ebceab9911cf4

          SHA512

          8340ed45634757d05c95031541e8f655aabc7c7f4eab2caaf623c8b34bd0b2b08bb2c30f5f34faaee176b18730607308d492b1be10e098837fb6a450f344cf3e