Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
049bd507ace3c49ff9dd572f15175f50_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
049bd507ace3c49ff9dd572f15175f50_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
049bd507ace3c49ff9dd572f15175f50_NEIKI.exe
-
Size
320KB
-
MD5
049bd507ace3c49ff9dd572f15175f50
-
SHA1
da515c45f8cd7cdcf53a5437fbb2786931efb47b
-
SHA256
93599cc253bcc460747e7eab9cca6b72dab753becafd2c58b36455c7f03e0480
-
SHA512
a17ba00e2b2ee86b87b6f548f08f2ecf5eaa8266d302f9963346d741ccddc9bb9633a4608483333d2aa33d388ecd23fe800958fdd2e5da640db1524ee48450f9
-
SSDEEP
6144:71bLUtu06xBMgMGX90nTt6odE/yG6G1B7qV40saiigCDN:ZzGYAZ6KmyG6G1BmVQ5zCDN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3344 049bd507ace3c49ff9dd572f15175f50_NEIKI.exe -
Executes dropped EXE 1 IoCs
pid Process 3344 049bd507ace3c49ff9dd572f15175f50_NEIKI.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 848 2972 WerFault.exe 80 1484 3344 WerFault.exe 88 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2972 049bd507ace3c49ff9dd572f15175f50_NEIKI.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3344 049bd507ace3c49ff9dd572f15175f50_NEIKI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2972 wrote to memory of 3344 2972 049bd507ace3c49ff9dd572f15175f50_NEIKI.exe 88 PID 2972 wrote to memory of 3344 2972 049bd507ace3c49ff9dd572f15175f50_NEIKI.exe 88 PID 2972 wrote to memory of 3344 2972 049bd507ace3c49ff9dd572f15175f50_NEIKI.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\049bd507ace3c49ff9dd572f15175f50_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\049bd507ace3c49ff9dd572f15175f50_NEIKI.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 3962⤵
- Program crash
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\049bd507ace3c49ff9dd572f15175f50_NEIKI.exeC:\Users\Admin\AppData\Local\Temp\049bd507ace3c49ff9dd572f15175f50_NEIKI.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 3643⤵
- Program crash
PID:1484
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2972 -ip 29721⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3344 -ip 33441⤵PID:2108
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD52e86b94d0114dcc2dfe71adba3e2bea8
SHA1f3ec5131081e215fec16d6a93aeb51ee6cde780e
SHA2568662227ffcec4c3ade3fd8c32e81558df6cd98b5e3bc76d7fdcdb7b3b801e55e
SHA51247310377e8a277a9a34f2f250f1965004ff0be11483d8b7427fdc463031baeb92f26186a8800c0161bc284a0b6b62664144ef28e02bc977016150bdc4c857d1b