Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe
Resource
win7-20240221-en
General
-
Target
50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe
-
Size
4.2MB
-
MD5
50aee372e179f9efefd7adb69b05d6c0
-
SHA1
2b5cecfa44e7727608aba54f32b540bed2979e4d
-
SHA256
c979a1a7ff273a086bff729130647294c8cfbe45b773bf32713a2054e5e0e17d
-
SHA512
8ab650bcc4821c151caa20bd858dea1b3259d98b7b106c6e84412d9cf43049e79a83704c04d87da3f69d703a39160796fcb85d58d98456272d18c46d3713c64d
-
SSDEEP
98304:haVsjom70ndrBFgOmll6jSga2nxCwdk+mvEBS8KssC:h+uom74drMJBirk+iEw83
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/2864-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2864-2-0x0000000004F20000-0x000000000580B000-memory.dmp family_glupteba behavioral2/memory/2864-4-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/2864-48-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2864-49-0x0000000004F20000-0x000000000580B000-memory.dmp family_glupteba behavioral2/memory/2864-46-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/1432-75-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/1432-131-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/4428-159-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/4428-217-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/4428-218-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/4428-228-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/4428-230-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/4428-232-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/4428-234-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/4428-236-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/4428-238-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/4428-240-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/4428-242-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3588 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 4428 csrss.exe 2720 injector.exe 2904 windefender.exe 4908 windefender.exe -
resource yara_rule behavioral2/files/0x000c000000023baf-221.dat upx behavioral2/memory/2904-222-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4908-225-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2904-227-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4908-229-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4908-233-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe File created C:\Windows\rss\csrss.exe 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1340 sc.exe -
pid Process 2456 powershell.exe 3104 powershell.exe 4032 powershell.exe 1528 powershell.exe 1268 powershell.exe 5084 powershell.exe 3912 powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4288 2456 WerFault.exe 96 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3176 schtasks.exe 3824 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-431 = "Iran Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1932 = "Russia TZ 11 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-242 = "Samoa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2002 = "Cabo Verde Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2456 powershell.exe 2456 powershell.exe 2864 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 2864 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 3104 powershell.exe 3104 powershell.exe 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 4032 powershell.exe 4032 powershell.exe 4032 powershell.exe 1528 powershell.exe 1528 powershell.exe 1268 powershell.exe 1268 powershell.exe 5084 powershell.exe 5084 powershell.exe 3912 powershell.exe 3912 powershell.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 4428 csrss.exe 4428 csrss.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 4428 csrss.exe 4428 csrss.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 4428 csrss.exe 4428 csrss.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe 2720 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2456 powershell.exe Token: SeDebugPrivilege 2864 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Token: SeImpersonatePrivilege 2864 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe Token: SeDebugPrivilege 3104 powershell.exe Token: SeDebugPrivilege 4032 powershell.exe Token: SeDebugPrivilege 1528 powershell.exe Token: SeDebugPrivilege 1268 powershell.exe Token: SeDebugPrivilege 5084 powershell.exe Token: SeDebugPrivilege 3912 powershell.exe Token: SeSystemEnvironmentPrivilege 4428 csrss.exe Token: SeSecurityPrivilege 1340 sc.exe Token: SeSecurityPrivilege 1340 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2456 2864 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 96 PID 2864 wrote to memory of 2456 2864 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 96 PID 2864 wrote to memory of 2456 2864 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 96 PID 1432 wrote to memory of 3104 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 105 PID 1432 wrote to memory of 3104 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 105 PID 1432 wrote to memory of 3104 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 105 PID 1432 wrote to memory of 5084 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 109 PID 1432 wrote to memory of 5084 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 109 PID 5084 wrote to memory of 3588 5084 cmd.exe 111 PID 5084 wrote to memory of 3588 5084 cmd.exe 111 PID 1432 wrote to memory of 4032 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 112 PID 1432 wrote to memory of 4032 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 112 PID 1432 wrote to memory of 4032 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 112 PID 1432 wrote to memory of 1528 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 114 PID 1432 wrote to memory of 1528 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 114 PID 1432 wrote to memory of 1528 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 114 PID 1432 wrote to memory of 4428 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 116 PID 1432 wrote to memory of 4428 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 116 PID 1432 wrote to memory of 4428 1432 50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe 116 PID 4428 wrote to memory of 1268 4428 csrss.exe 117 PID 4428 wrote to memory of 1268 4428 csrss.exe 117 PID 4428 wrote to memory of 1268 4428 csrss.exe 117 PID 4428 wrote to memory of 5084 4428 csrss.exe 123 PID 4428 wrote to memory of 5084 4428 csrss.exe 123 PID 4428 wrote to memory of 5084 4428 csrss.exe 123 PID 4428 wrote to memory of 3912 4428 csrss.exe 125 PID 4428 wrote to memory of 3912 4428 csrss.exe 125 PID 4428 wrote to memory of 3912 4428 csrss.exe 125 PID 4428 wrote to memory of 2720 4428 csrss.exe 127 PID 4428 wrote to memory of 2720 4428 csrss.exe 127 PID 2904 wrote to memory of 4320 2904 windefender.exe 133 PID 2904 wrote to memory of 4320 2904 windefender.exe 133 PID 2904 wrote to memory of 4320 2904 windefender.exe 133 PID 4320 wrote to memory of 1340 4320 cmd.exe 134 PID 4320 wrote to memory of 1340 4320 cmd.exe 134 PID 4320 wrote to memory of 1340 4320 cmd.exe 134 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 25243⤵
- Program crash
PID:4288
-
-
-
C:\Users\Admin\AppData\Local\Temp\50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\50aee372e179f9efefd7adb69b05d6c0_NEIKI.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3588
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3176
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:60
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3824
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2456 -ip 24561⤵PID:4024
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4908
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD514d86d69767c1d129c7e021482c51247
SHA1d5690f8fb86301f4e128bb1516de630287f2ca3f
SHA25606babee8f2090568d320222d75507133b0c5fe7576b4b2d6b0266c5f989f5d05
SHA5121a27253f630f9350889690b2bcb0039c68d422d8492feeac7c10408521a509a9669d66e26577ba8f7c5f17317a8b01f747961612f352aa399732fc38e703e381
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ffe8d1e83ac18df1db6a5a848e6de510
SHA17a676c3807ebe6658b9082807af976360f0eccd6
SHA256daa3393e57b898a7a1d5cdcd2f30e89a841d7049554728da3a52017e3d591923
SHA5120f7998e931168b30ee5db98c600fc3cfe67e9a742320e55542be8c48396ad0411e408cfee802cd5d694ef911860722b8a6496c66ef3adb48fea9c88eac9676eb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59a10dd77326233f1c32d5285232e61bf
SHA18e6148b2e295b8d689b0be81218144908783f807
SHA256a379575a42efd3577d017f4ab3d37a965246a09466db386c813b8b717c16fd20
SHA512095d938aa2add0d0fdf178e47558202f972b18ce3242fd8a21101b1e04f90ac759da896632bb63ec662f1922606dc6899344dbc84fa285883ccfde656f8e948f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5845b100f1a97b1f098bb8ef2b4dc7251
SHA101c5d69b2ac27a0cc142d881d5c606217fb81d85
SHA25652246bec71b397e1ef151a2e5531e15c9fe8e80c1d076782e949f8af81d58a85
SHA5120c0249c27668cb9b23d87859c188de3618e709fb4d0dd86f6b822118d13757af7d036a3cab3a3f6df657ff782cf280f4e19b15940fcad35ff09d20e10df679eb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f81263afefa91f1bab375792aa4adbaa
SHA1fee1c393b4364c3b0d1bd2dbcb85d8e6b302f45f
SHA25607a929fa3f04e1073ea5f7dc602f3639b6b22195168b42e54dfc25c935f2788a
SHA51276b29fd4ca35bb0dab33a085edc90695488cf7218167b43256f5d4c5da18d394d779acff80047d5e7f66f814aa83e0b221bf3c4f84b5bf96f4a757163d3edf21
-
Filesize
4.2MB
MD550aee372e179f9efefd7adb69b05d6c0
SHA12b5cecfa44e7727608aba54f32b540bed2979e4d
SHA256c979a1a7ff273a086bff729130647294c8cfbe45b773bf32713a2054e5e0e17d
SHA5128ab650bcc4821c151caa20bd858dea1b3259d98b7b106c6e84412d9cf43049e79a83704c04d87da3f69d703a39160796fcb85d58d98456272d18c46d3713c64d
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec