Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe
-
Size
124KB
-
MD5
b3e2aaaa118f78bf028ea9e54c5c7610
-
SHA1
ecd58753bcc8c16079ee15c501528ebe0781346c
-
SHA256
374203bac0b693b91e1d95843f71c909faa65a02738c3738be505da65834aeba
-
SHA512
7cfccdd6c629780640cdd13acb55a09511f00fce43d8e47774d79754d00343775f4957b299f65da03c6bff99274d58957abc193b8f743d9588e5f14f265e2e1a
-
SSDEEP
768:50w981IshKQLro/4/wQozzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzX:CEGI0o/lVunMxVS3HgdoKjhLJhL
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DA88A008-1ABD-4d61-8D08-FD910013FAE6} {0A8B84DC-8642-4116-8B35-CF5A235C6459}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DA88A008-1ABD-4d61-8D08-FD910013FAE6}\stubpath = "C:\\Windows\\{DA88A008-1ABD-4d61-8D08-FD910013FAE6}.exe" {0A8B84DC-8642-4116-8B35-CF5A235C6459}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4FA4A19-C3F5-4f1c-B28B-5A3F3E8587A3} {DA88A008-1ABD-4d61-8D08-FD910013FAE6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}\stubpath = "C:\\Windows\\{C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe" b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{946879BB-ED0B-4eff-8ED1-53C7EDDF603A} {71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{946879BB-ED0B-4eff-8ED1-53C7EDDF603A}\stubpath = "C:\\Windows\\{946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe" {71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DE879A00-0996-4e6b-A888-42EB96104EE4}\stubpath = "C:\\Windows\\{DE879A00-0996-4e6b-A888-42EB96104EE4}.exe" {244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C28F3BDE-248A-4917-A8AF-BD01BF43DA07} {DE879A00-0996-4e6b-A888-42EB96104EE4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71C750D7-E1C0-483a-9C75-DCFCD1506B7A} {C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF6740CE-CB0C-4c01-8494-682FE202366A} {946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF6740CE-CB0C-4c01-8494-682FE202366A}\stubpath = "C:\\Windows\\{AF6740CE-CB0C-4c01-8494-682FE202366A}.exe" {946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0A8B84DC-8642-4116-8B35-CF5A235C6459} {C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4FA4A19-C3F5-4f1c-B28B-5A3F3E8587A3}\stubpath = "C:\\Windows\\{C4FA4A19-C3F5-4f1c-B28B-5A3F3E8587A3}.exe" {DA88A008-1ABD-4d61-8D08-FD910013FAE6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB} b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{244BAE28-6AD8-482b-B013-C9C4DBA9B1D6} {AF6740CE-CB0C-4c01-8494-682FE202366A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C28F3BDE-248A-4917-A8AF-BD01BF43DA07}\stubpath = "C:\\Windows\\{C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe" {DE879A00-0996-4e6b-A888-42EB96104EE4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9A2C7F16-F458-4dd6-AB3F-D94AA0150E5A} {C4FA4A19-C3F5-4f1c-B28B-5A3F3E8587A3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9A2C7F16-F458-4dd6-AB3F-D94AA0150E5A}\stubpath = "C:\\Windows\\{9A2C7F16-F458-4dd6-AB3F-D94AA0150E5A}.exe" {C4FA4A19-C3F5-4f1c-B28B-5A3F3E8587A3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71C750D7-E1C0-483a-9C75-DCFCD1506B7A}\stubpath = "C:\\Windows\\{71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe" {C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}\stubpath = "C:\\Windows\\{244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe" {AF6740CE-CB0C-4c01-8494-682FE202366A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DE879A00-0996-4e6b-A888-42EB96104EE4} {244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0A8B84DC-8642-4116-8B35-CF5A235C6459}\stubpath = "C:\\Windows\\{0A8B84DC-8642-4116-8B35-CF5A235C6459}.exe" {C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe -
Deletes itself 1 IoCs
pid Process 2072 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2620 {C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe 2576 {71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe 2628 {946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe 3000 {AF6740CE-CB0C-4c01-8494-682FE202366A}.exe 2028 {244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe 2676 {DE879A00-0996-4e6b-A888-42EB96104EE4}.exe 2992 {C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe 880 {0A8B84DC-8642-4116-8B35-CF5A235C6459}.exe 1940 {DA88A008-1ABD-4d61-8D08-FD910013FAE6}.exe 1092 {C4FA4A19-C3F5-4f1c-B28B-5A3F3E8587A3}.exe 1080 {9A2C7F16-F458-4dd6-AB3F-D94AA0150E5A}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{AF6740CE-CB0C-4c01-8494-682FE202366A}.exe {946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe File created C:\Windows\{C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe {DE879A00-0996-4e6b-A888-42EB96104EE4}.exe File created C:\Windows\{0A8B84DC-8642-4116-8B35-CF5A235C6459}.exe {C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe File created C:\Windows\{C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe File created C:\Windows\{71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe {C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe File created C:\Windows\{946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe {71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe File created C:\Windows\{244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe {AF6740CE-CB0C-4c01-8494-682FE202366A}.exe File created C:\Windows\{DE879A00-0996-4e6b-A888-42EB96104EE4}.exe {244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe File created C:\Windows\{DA88A008-1ABD-4d61-8D08-FD910013FAE6}.exe {0A8B84DC-8642-4116-8B35-CF5A235C6459}.exe File created C:\Windows\{C4FA4A19-C3F5-4f1c-B28B-5A3F3E8587A3}.exe {DA88A008-1ABD-4d61-8D08-FD910013FAE6}.exe File created C:\Windows\{9A2C7F16-F458-4dd6-AB3F-D94AA0150E5A}.exe {C4FA4A19-C3F5-4f1c-B28B-5A3F3E8587A3}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1628 b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe Token: SeIncBasePriorityPrivilege 2620 {C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe Token: SeIncBasePriorityPrivilege 2576 {71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe Token: SeIncBasePriorityPrivilege 2628 {946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe Token: SeIncBasePriorityPrivilege 3000 {AF6740CE-CB0C-4c01-8494-682FE202366A}.exe Token: SeIncBasePriorityPrivilege 2028 {244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe Token: SeIncBasePriorityPrivilege 2676 {DE879A00-0996-4e6b-A888-42EB96104EE4}.exe Token: SeIncBasePriorityPrivilege 2992 {C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe Token: SeIncBasePriorityPrivilege 880 {0A8B84DC-8642-4116-8B35-CF5A235C6459}.exe Token: SeIncBasePriorityPrivilege 1940 {DA88A008-1ABD-4d61-8D08-FD910013FAE6}.exe Token: SeIncBasePriorityPrivilege 1092 {C4FA4A19-C3F5-4f1c-B28B-5A3F3E8587A3}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2620 1628 b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe 28 PID 1628 wrote to memory of 2620 1628 b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe 28 PID 1628 wrote to memory of 2620 1628 b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe 28 PID 1628 wrote to memory of 2620 1628 b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe 28 PID 1628 wrote to memory of 2072 1628 b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe 29 PID 1628 wrote to memory of 2072 1628 b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe 29 PID 1628 wrote to memory of 2072 1628 b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe 29 PID 1628 wrote to memory of 2072 1628 b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe 29 PID 2620 wrote to memory of 2576 2620 {C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe 30 PID 2620 wrote to memory of 2576 2620 {C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe 30 PID 2620 wrote to memory of 2576 2620 {C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe 30 PID 2620 wrote to memory of 2576 2620 {C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe 30 PID 2620 wrote to memory of 2752 2620 {C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe 31 PID 2620 wrote to memory of 2752 2620 {C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe 31 PID 2620 wrote to memory of 2752 2620 {C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe 31 PID 2620 wrote to memory of 2752 2620 {C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe 31 PID 2576 wrote to memory of 2628 2576 {71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe 32 PID 2576 wrote to memory of 2628 2576 {71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe 32 PID 2576 wrote to memory of 2628 2576 {71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe 32 PID 2576 wrote to memory of 2628 2576 {71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe 32 PID 2576 wrote to memory of 2172 2576 {71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe 33 PID 2576 wrote to memory of 2172 2576 {71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe 33 PID 2576 wrote to memory of 2172 2576 {71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe 33 PID 2576 wrote to memory of 2172 2576 {71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe 33 PID 2628 wrote to memory of 3000 2628 {946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe 36 PID 2628 wrote to memory of 3000 2628 {946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe 36 PID 2628 wrote to memory of 3000 2628 {946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe 36 PID 2628 wrote to memory of 3000 2628 {946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe 36 PID 2628 wrote to memory of 2988 2628 {946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe 37 PID 2628 wrote to memory of 2988 2628 {946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe 37 PID 2628 wrote to memory of 2988 2628 {946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe 37 PID 2628 wrote to memory of 2988 2628 {946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe 37 PID 3000 wrote to memory of 2028 3000 {AF6740CE-CB0C-4c01-8494-682FE202366A}.exe 38 PID 3000 wrote to memory of 2028 3000 {AF6740CE-CB0C-4c01-8494-682FE202366A}.exe 38 PID 3000 wrote to memory of 2028 3000 {AF6740CE-CB0C-4c01-8494-682FE202366A}.exe 38 PID 3000 wrote to memory of 2028 3000 {AF6740CE-CB0C-4c01-8494-682FE202366A}.exe 38 PID 3000 wrote to memory of 2404 3000 {AF6740CE-CB0C-4c01-8494-682FE202366A}.exe 39 PID 3000 wrote to memory of 2404 3000 {AF6740CE-CB0C-4c01-8494-682FE202366A}.exe 39 PID 3000 wrote to memory of 2404 3000 {AF6740CE-CB0C-4c01-8494-682FE202366A}.exe 39 PID 3000 wrote to memory of 2404 3000 {AF6740CE-CB0C-4c01-8494-682FE202366A}.exe 39 PID 2028 wrote to memory of 2676 2028 {244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe 40 PID 2028 wrote to memory of 2676 2028 {244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe 40 PID 2028 wrote to memory of 2676 2028 {244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe 40 PID 2028 wrote to memory of 2676 2028 {244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe 40 PID 2028 wrote to memory of 2720 2028 {244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe 41 PID 2028 wrote to memory of 2720 2028 {244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe 41 PID 2028 wrote to memory of 2720 2028 {244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe 41 PID 2028 wrote to memory of 2720 2028 {244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe 41 PID 2676 wrote to memory of 2992 2676 {DE879A00-0996-4e6b-A888-42EB96104EE4}.exe 42 PID 2676 wrote to memory of 2992 2676 {DE879A00-0996-4e6b-A888-42EB96104EE4}.exe 42 PID 2676 wrote to memory of 2992 2676 {DE879A00-0996-4e6b-A888-42EB96104EE4}.exe 42 PID 2676 wrote to memory of 2992 2676 {DE879A00-0996-4e6b-A888-42EB96104EE4}.exe 42 PID 2676 wrote to memory of 2952 2676 {DE879A00-0996-4e6b-A888-42EB96104EE4}.exe 43 PID 2676 wrote to memory of 2952 2676 {DE879A00-0996-4e6b-A888-42EB96104EE4}.exe 43 PID 2676 wrote to memory of 2952 2676 {DE879A00-0996-4e6b-A888-42EB96104EE4}.exe 43 PID 2676 wrote to memory of 2952 2676 {DE879A00-0996-4e6b-A888-42EB96104EE4}.exe 43 PID 2992 wrote to memory of 880 2992 {C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe 44 PID 2992 wrote to memory of 880 2992 {C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe 44 PID 2992 wrote to memory of 880 2992 {C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe 44 PID 2992 wrote to memory of 880 2992 {C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe 44 PID 2992 wrote to memory of 1776 2992 {C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe 45 PID 2992 wrote to memory of 1776 2992 {C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe 45 PID 2992 wrote to memory of 1776 2992 {C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe 45 PID 2992 wrote to memory of 1776 2992 {C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\b3e2aaaa118f78bf028ea9e54c5c7610_NEIKI.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\{C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exeC:\Windows\{C4BFF7F8-1F75-47af-9F1C-8CAC0687ADCB}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\{71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exeC:\Windows\{71C750D7-E1C0-483a-9C75-DCFCD1506B7A}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\{946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exeC:\Windows\{946879BB-ED0B-4eff-8ED1-53C7EDDF603A}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\{AF6740CE-CB0C-4c01-8494-682FE202366A}.exeC:\Windows\{AF6740CE-CB0C-4c01-8494-682FE202366A}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\{244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exeC:\Windows\{244BAE28-6AD8-482b-B013-C9C4DBA9B1D6}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\{DE879A00-0996-4e6b-A888-42EB96104EE4}.exeC:\Windows\{DE879A00-0996-4e6b-A888-42EB96104EE4}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\{C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exeC:\Windows\{C28F3BDE-248A-4917-A8AF-BD01BF43DA07}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\{0A8B84DC-8642-4116-8B35-CF5A235C6459}.exeC:\Windows\{0A8B84DC-8642-4116-8B35-CF5A235C6459}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:880 -
C:\Windows\{DA88A008-1ABD-4d61-8D08-FD910013FAE6}.exeC:\Windows\{DA88A008-1ABD-4d61-8D08-FD910013FAE6}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1940 -
C:\Windows\{C4FA4A19-C3F5-4f1c-B28B-5A3F3E8587A3}.exeC:\Windows\{C4FA4A19-C3F5-4f1c-B28B-5A3F3E8587A3}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Windows\{9A2C7F16-F458-4dd6-AB3F-D94AA0150E5A}.exeC:\Windows\{9A2C7F16-F458-4dd6-AB3F-D94AA0150E5A}.exe12⤵
- Executes dropped EXE
PID:1080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C4FA4~1.EXE > nul12⤵PID:2244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DA88A~1.EXE > nul11⤵PID:1640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0A8B8~1.EXE > nul10⤵PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C28F3~1.EXE > nul9⤵PID:1776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DE879~1.EXE > nul8⤵PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{244BA~1.EXE > nul7⤵PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AF674~1.EXE > nul6⤵PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{94687~1.EXE > nul5⤵PID:2988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{71C75~1.EXE > nul4⤵PID:2172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C4BFF~1.EXE > nul3⤵PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\B3E2AA~1.EXE > nul2⤵
- Deletes itself
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD59f0f89b3f8aefacf5448544acf9e30dd
SHA17109aaef645baaa51a3205edd1f7195b3461f155
SHA256fe245e5c680a43a62833679e9dfa83dfa2167a1def6a64b3532b156291726fec
SHA5125b4c0c69538cd2052a4f2b5c3478e5b33fa79167f8523824f70bdb9483f99a02bdfcb732a1db337a90e2d56ead420d56fa2feac7cddcaa3795f6db674ac961b5
-
Filesize
124KB
MD5d29c01d1e4e6e3c71e22dfc5391fa8c4
SHA1b3c5d61bb657f0a9997c20afe8fbc5422493fac7
SHA2568aba494482582c444c8219f5bd72d7ce070bd091a9bf26f585894b1e9e755f07
SHA512528802edfd02c44c0e88fde0cf1ba15df18a5e6098e692b8ca6d279fdaec9b7a2c84b6cf31f040978c04b1b5a74501b5219be72065d2fbb72886a3fe999d9635
-
Filesize
124KB
MD5aa041b95d74232a4fa88a67984488767
SHA1e6a17cde73dc0c6265fdfcd41ddebda66ceda98a
SHA256f3a1d0c6b39cf1c9356b7ef6ac815df3ade898676bcfbe356bea25a4e9fcfa8d
SHA51279fa9f73b4863f4a4ac67929a412b4293cdfdd55e1ca201a0cfeabffe3e8862c6cd333e16cf0ed088bb689c31016f2f2e7a89dc899bdf6a5cbb8ad047f00e7c0
-
Filesize
124KB
MD527c2d1a3928420ff60a78a0552eba643
SHA17c501585a68ebd5ca617955c73b982db11c457f3
SHA2568f70f6a78a1527a9324b3fc956ee435cce2408d164127d145a4a9ff07d60a75a
SHA51240cbf1ef2844eb26a4ccd4981bfaf684a34a1a91dab94d1c52bda6e263a4b13ba6f57e4d82fbd0816d4afd9d84312defc09fb3199a7c5d6633f2b3678225e74c
-
Filesize
124KB
MD5c11d82f550d8e04228c75888bd4c5b4f
SHA10eef5930fb757b76da992a28fcf493c6f573de10
SHA256797ab6187317b4394cf150aaf6e7272c7470cb75c4681ef65cab2c88ff475784
SHA5124c72394b235a2ac4c7d4a428134934f4c94a467fa3bab7a4c37a88517eff8ea80ca5ff624738b357aa1f4048cbd1ed92d7a7d6b5f5bd7c2d5d7ddd6bd0cd5bfb
-
Filesize
124KB
MD504d8db41f13cc9e9e7c0ac2378dad715
SHA12a19c6dfdbccb2aaab17d60453f868643d169230
SHA256027be090f869c7f94eda4e0281891da2a9a39a9152ac5585ce3842d48b525085
SHA51240e820a8742765818a35a46dbd09f2da0095127c91a1a89c3dc24b77330d4f85bb3e71347dde230f6ad8d3d3c831ca24ced564b7d49f308faa398dea0f0e68ad
-
Filesize
124KB
MD5ddbc0e62aca561d035060b90e3491d5a
SHA1a852d5f57cd191ef6e1a85bfc78763b05171ff1b
SHA25697e8c4072aaeb2756753ecfc8fb7ea3063729c2b7b0b2c340fa4a3118c08f1b6
SHA51221f9501ff45642137b9c7739daeb8c05b21eebd3292a74dc031f5bb2a3c269a1c295e08a02b133cda3cfd36503d70e471d049419dfce8cd50e8db2b78a768685
-
Filesize
124KB
MD52fe40567e0773dd9b6620c4999ab3ab9
SHA1159eefb28c7e703f421580f96723bffe6219c7f6
SHA2563c0d546e354431ca37d7a31a3f30d14152298611d358329e53f5ff59808ac8d3
SHA5121ab54de9cb45633a98b7b78374ad687a06d585a7493acfcb6a156295b871642f063fe2a4a8f9f98cef6902674d1727700091da8b6680b24a4ce12191504b59b6
-
Filesize
124KB
MD5cbeb6726ffdcda13135cbe501aacf9aa
SHA160de239b28b7fa74d8e41657032bf4752dc65dcd
SHA256ac03cb1fa4357c2448e152a1a1dd6cc1eda0e0359f09ec679ca0e884d9d36ca2
SHA512652a039dc52838a4a74c95ad0589b8685574c2be37aaa86ce28505bc96b63914035bc2b3c1e8aff83762e8441bd433ec2c54105b018e490970ad56b878517b93
-
Filesize
124KB
MD511f6114361180783a56b5051e258c897
SHA19b3c8e38f33270fe9a80a71305e7376513251d76
SHA2562a1f7376fd48df77433fc1bace11ed8cf454d2001ef3264518f1c5e563f15330
SHA512a0711419aea799331956844aac1f85fdb99edb185ca6a166bb3d0ed67e6459dac96333fdd6503c4d5220060b71919b175b93eb01ba137d9fe41a3e8b5cb836f0
-
Filesize
124KB
MD5b6d76fc4902c48771e648bd454ef76f0
SHA16baaad5a82f3d6441a2c5be9b06e86330a7f05e5
SHA2562b523783d1d4320693a1f866cb38e78c3e8d6950898428f84a61bba468fc3d0b
SHA5128de8f085afe2ff51276b2e330aa4749b1b5b594faa601cc4c9b0b124a4fe167dc25bb128f6abff590b34a6eec032d5b26afbcb8f7bf406afa5e1898419d298aa