Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe
-
Size
8.7MB
-
MD5
57ec49d438753f3bdfec6a616258b370
-
SHA1
a34f757f5f2bd4763f04206c0d0cd32ab4491117
-
SHA256
872a2f4decf76a5c8cf44a9b017a780847d8b3c50571433232e398ab0931c638
-
SHA512
88bdae1b6a45efa83c4a9ff28a4549c33db28ba2bb1d1911d028090e9dc3831ef57f6577388844a4cfccc60dbca70315a7f9d7311f6638bcf00da97110e1c64a
-
SSDEEP
196608:ITAJDpNk+Rl4/Xi/yRvyCyKuhBfldGdrmVLaY1rHgu:oAlzJ7yRvyCx+xpgu
Malware Config
Signatures
-
Detect ZGRat V1 4 IoCs
resource yara_rule behavioral1/files/0x0036000000016cc3-33.dat family_zgrat_v1 behavioral1/files/0x0008000000016d4e-46.dat family_zgrat_v1 behavioral1/memory/2200-50-0x0000000000150000-0x00000000004DE000-memory.dmp family_zgrat_v1 behavioral1/memory/2092-125-0x00000000000C0000-0x000000000044E000-memory.dmp family_zgrat_v1 -
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\dwm.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\portmonitor.exe\"" portmonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\dwm.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\portmonitor.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\dwm.exe\"" portmonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\dwm.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\portmonitor.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\dwm.exe\", \"C:\\Program Files (x86)\\Microsoft Sync Framework\\lsass.exe\"" portmonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\dwm.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\portmonitor.exe\", \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\dwm.exe\", \"C:\\Program Files (x86)\\Microsoft Sync Framework\\lsass.exe\", \"C:\\Webnet\\portmonitor.exe\"" portmonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\"" portmonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\", \"C:\\Program Files\\Microsoft Office\\Office14\\dwm.exe\"" portmonitor.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1156 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1056 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 864 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2072 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1876 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2356 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2476 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2392 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 796 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 572 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1892 572 schtasks.exe 36 -
Executes dropped EXE 6 IoCs
pid Process 1712 Nursultan 1.16.5 Crack.exe 1136 leetcrack.exe 2840 3b73a6fa2092a350d795.exe 2784 portmonitor.exe 2200 portmonitor.exe 2092 dwm.exe -
Loads dropped DLL 8 IoCs
pid Process 3016 57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe 3016 57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe 3016 57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe 3016 57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe 1136 leetcrack.exe 1136 leetcrack.exe 2352 cmd.exe 2352 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000c000000016d1b-23.dat upx behavioral1/memory/2840-30-0x000000013FAA0000-0x00000001406CA000-memory.dmp upx -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files (x86)\\Microsoft Sync Framework\\lsass.exe\"" portmonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\portmonitor = "\"C:\\Webnet\\portmonitor.exe\"" portmonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\portmonitor = "\"C:\\Webnet\\portmonitor.exe\"" portmonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\Microsoft Office\\Office14\\dwm.exe\"" portmonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\portmonitor = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\portmonitor.exe\"" portmonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\Microsoft Office\\Office14\\dwm.exe\"" portmonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\portmonitor = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\portmonitor.exe\"" portmonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\dwm.exe\"" portmonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\dwm.exe\"" portmonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files (x86)\\Microsoft Sync Framework\\lsass.exe\"" portmonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\"" portmonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files\\7-Zip\\Lang\\dwm.exe\"" portmonitor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC91B8EA9C323A49539417DF6BB1E6C895.TMP csc.exe File created \??\c:\Windows\System32\ldgalj.exe csc.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\Office14\6cb0b6c459d5d3 portmonitor.exe File created C:\Program Files\7-Zip\Lang\dwm.exe portmonitor.exe File created C:\Program Files\7-Zip\Lang\6cb0b6c459d5d3 portmonitor.exe File created C:\Program Files (x86)\Microsoft Sync Framework\lsass.exe portmonitor.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\lsass.exe portmonitor.exe File created C:\Program Files (x86)\Microsoft Sync Framework\6203df4a6bafc7 portmonitor.exe File created C:\Program Files\Microsoft Office\Office14\dwm.exe portmonitor.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Boot\spoolsv.exe portmonitor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2176 schtasks.exe 1876 schtasks.exe 796 schtasks.exe 2604 schtasks.exe 2240 schtasks.exe 864 schtasks.exe 1992 schtasks.exe 1056 schtasks.exe 2324 schtasks.exe 2356 schtasks.exe 1988 schtasks.exe 2476 schtasks.exe 1664 schtasks.exe 1892 schtasks.exe 1156 schtasks.exe 2072 schtasks.exe 2392 schtasks.exe 1812 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1068 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe 2200 portmonitor.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2092 dwm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2200 portmonitor.exe Token: SeDebugPrivilege 2092 dwm.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 3016 wrote to memory of 1712 3016 57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe 28 PID 3016 wrote to memory of 1712 3016 57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe 28 PID 3016 wrote to memory of 1712 3016 57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe 28 PID 3016 wrote to memory of 1712 3016 57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe 28 PID 3016 wrote to memory of 1136 3016 57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe 29 PID 3016 wrote to memory of 1136 3016 57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe 29 PID 3016 wrote to memory of 1136 3016 57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe 29 PID 3016 wrote to memory of 1136 3016 57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe 29 PID 1136 wrote to memory of 2840 1136 leetcrack.exe 30 PID 1136 wrote to memory of 2840 1136 leetcrack.exe 30 PID 1136 wrote to memory of 2840 1136 leetcrack.exe 30 PID 1136 wrote to memory of 2840 1136 leetcrack.exe 30 PID 1136 wrote to memory of 2784 1136 leetcrack.exe 31 PID 1136 wrote to memory of 2784 1136 leetcrack.exe 31 PID 1136 wrote to memory of 2784 1136 leetcrack.exe 31 PID 1136 wrote to memory of 2784 1136 leetcrack.exe 31 PID 2784 wrote to memory of 2688 2784 portmonitor.exe 32 PID 2784 wrote to memory of 2688 2784 portmonitor.exe 32 PID 2784 wrote to memory of 2688 2784 portmonitor.exe 32 PID 2784 wrote to memory of 2688 2784 portmonitor.exe 32 PID 2688 wrote to memory of 2352 2688 WScript.exe 33 PID 2688 wrote to memory of 2352 2688 WScript.exe 33 PID 2688 wrote to memory of 2352 2688 WScript.exe 33 PID 2688 wrote to memory of 2352 2688 WScript.exe 33 PID 2352 wrote to memory of 2200 2352 cmd.exe 35 PID 2352 wrote to memory of 2200 2352 cmd.exe 35 PID 2352 wrote to memory of 2200 2352 cmd.exe 35 PID 2352 wrote to memory of 2200 2352 cmd.exe 35 PID 2200 wrote to memory of 1684 2200 portmonitor.exe 40 PID 2200 wrote to memory of 1684 2200 portmonitor.exe 40 PID 2200 wrote to memory of 1684 2200 portmonitor.exe 40 PID 1684 wrote to memory of 2292 1684 csc.exe 42 PID 1684 wrote to memory of 2292 1684 csc.exe 42 PID 1684 wrote to memory of 2292 1684 csc.exe 42 PID 2200 wrote to memory of 716 2200 portmonitor.exe 58 PID 2200 wrote to memory of 716 2200 portmonitor.exe 58 PID 2200 wrote to memory of 716 2200 portmonitor.exe 58 PID 716 wrote to memory of 2896 716 cmd.exe 60 PID 716 wrote to memory of 2896 716 cmd.exe 60 PID 716 wrote to memory of 2896 716 cmd.exe 60 PID 716 wrote to memory of 1068 716 cmd.exe 61 PID 716 wrote to memory of 1068 716 cmd.exe 61 PID 716 wrote to memory of 1068 716 cmd.exe 61 PID 716 wrote to memory of 2092 716 cmd.exe 62 PID 716 wrote to memory of 2092 716 cmd.exe 62 PID 716 wrote to memory of 2092 716 cmd.exe 62 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\57ec49d438753f3bdfec6a616258b370_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Nursultan 1.16.5 Crack.exe"C:\Users\Admin\AppData\Local\Temp\Nursultan 1.16.5 Crack.exe"2⤵
- Executes dropped EXE
PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\leetcrack.exe"C:\Users\Admin\AppData\Local\Temp\leetcrack.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\3b73a6fa2092a350d795.exe"C:\Users\Admin\AppData\Local\Temp\3b73a6fa2092a350d795.exe"3⤵
- Executes dropped EXE
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\portmonitor.exe"C:\Users\Admin\AppData\Local\Temp\portmonitor.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Webnet\xEX0MYAV03ULsqYY87UbhI7XqesjrcJfyK7h.vbe"4⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Webnet\x9qTsv13UFeYw.bat" "5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Webnet\portmonitor.exe"C:\Webnet/portmonitor.exe"6⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zjc2mkdw\zjc2mkdw.cmdline"7⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7D99.tmp" "c:\Windows\System32\CSC91B8EA9C323A49539417DF6BB1E6C895.TMP"8⤵PID:2292
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gJbTVmGUKw.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:2896
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
PID:1068
-
-
C:\Program Files\Microsoft Office\Office14\dwm.exe"C:\Program Files\Microsoft Office\Office14\dwm.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Program Files\7-Zip\Lang\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Program Files\7-Zip\Lang\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Office\Office14\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office14\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2072
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Office\Office14\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "portmonitorp" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\portmonitor.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "portmonitor" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\portmonitor.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "portmonitorp" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\portmonitor.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2476
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Sync Framework\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft Sync Framework\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "portmonitorp" /sc MINUTE /mo 8 /tr "'C:\Webnet\portmonitor.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "portmonitor" /sc ONLOGON /tr "'C:\Webnet\portmonitor.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "portmonitorp" /sc MINUTE /mo 7 /tr "'C:\Webnet\portmonitor.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1892
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5068a3a015a2821ab745a03dbae612233
SHA191c358a556d51466918c76c01ead079a484ce35a
SHA256d87f2189c12aa65a1bd52c1a39d1f14d58753dd76d291eebba32d5a0dde74d67
SHA512d18d483af543ac72a204b076f897fe62284a0479fdb5a407ef69d51588ccc9589465d94f5a4dce6fc3d36ce6667a42d6513e4a05ce2fde7b0794e1745aa0bb9e
-
Filesize
1KB
MD574bf71028fc0ad756fc493609fd4f592
SHA18ecc82b3743d624dee2b9e3de199c939f4a8445f
SHA256bf0d693ae6eccb8d0f2d18c78f3104ad86e8d4f4b7bebd35be6c2f34f6593efa
SHA512c95d59615006d76939d4851599b3209ed24dde84f2149d869a3b54d804dbef7b489036d5dec934922603ac8569bd2479d77df248303de6f7ffcac8a3d77bb1ef
-
Filesize
178B
MD53a19ff4f0425e3253e72fb0480cb5137
SHA10234dae6ba426c90e59994deaedb1c7f80870736
SHA256ef650bda6d9a7efa8e50eb35543ebaccda3f4d6a9d9b515a284b403d4dc7e1b3
SHA5120d685d79c3f497322e4f7f90092015db281dd95be0d5a7c5211fb7356cbc0be6ced4a91d043e7fc135a9cf3054b8926c9c77e1998710821fa216345a58404818
-
Filesize
3.8MB
MD53d686dda8f890bef092779bc682dec10
SHA12e6f12de7a5d4febe798a63b2f8914458741bf7f
SHA256af9b7828f0661720eeaac5931f160f7db17dbf6c1ddcd7020a0c06a4deb2b7d4
SHA512cb32222a74d01de5c99e5096e1e00f86ab54af0db9e6b560b5952de2ab1c654ebde7331e80302dedb387acc7ad7c98eae3748cf3bf2bb78c1d0a5088db881f58
-
Filesize
84B
MD55bcb417bd38f4db1936b88b262c0f7ad
SHA1d724fa06c67a7740497576d08b2c9b5b77c7eca4
SHA256f4374316bbc474ade932922a7ae28b6ded46b26a39ec4f3d1042b342a9bb9f07
SHA5129706324f2d9ad3e617987927e63a8a1372c18139a465c17ad5ff8a45d21c09b17571f1de7ae98714310d4a7e0a6f8e40d9148c87c93324c9eacd99f0ab2a2e6c
-
Filesize
209B
MD51fefc5b72cd89c9f83dcf8a47b254f58
SHA1909c965e493baab2203bac16be714cfb88a75f0d
SHA2567f03a5563b7186e6c6efa09392c843783b9a3375bcfbe29e4b9c8fc6f3032c3c
SHA5125bada5c497c306276c348569995cb254b3e6dcf2a8c10e48eadded26b69e7d5690503b8d9610f46b91a28effbe4be8d7345938d8c59d9f5343186f4d60e526ca
-
Filesize
367B
MD52b8ccf5fdb8002fc36dd2917e0c9dc7a
SHA16a7bc0b67ed9a245badaaabbccbef48424df1817
SHA256cc5e7733c393010640d1f04a1f5d4700b7104d44f43f6716f76f3ee6977f6d39
SHA5123a27acf53db5a235837a44f4862f8383881a23a71e65ff22fd1465b123c457ab4cb0b40773363a5d96d1a989f193ea4a0b4a264086199c5dbe7b8a927840ed39
-
Filesize
235B
MD59e2ecc092f5b7a3a5d6da8f7798f7b58
SHA145a62bb4e8009fb5b5583ef7abf5319e440b514b
SHA256eb03631be3270ee998ab9f626b4389088d06107710e531810e410c0c76e6800a
SHA51217a416642733a5f8d489a30865649e5fcf4f2fb7df8e85376ba4074f410a2ccc1065e84ad0a2d4e9efc8bb71817a7f5b49773fa3a18eb8dbf9c01af1d85714d9
-
Filesize
1KB
MD5bfb5195b3f3a87a55924d32b25f58821
SHA120a15b7e5c1f8626a991b0018ecff1e0f9bbdd55
SHA25627fc2b6d7eb6b901e442740584ea89682cf613798415d7f431174412a2c78241
SHA512137ad28b8cc1d5a270c6f98fe129697c1a1d6828f8fbeb72a2f290e0242f547c9aeb97d28c818efe717aa6b7833cece46dd6ddd5d033d9d1f5ce442757d2ab3b
-
Filesize
5.2MB
MD5b86bbb42b26e72a601087f68cda89208
SHA1baca49e35da3b83cd56ba579d61f98e9b137debe
SHA256320eff01b2a5b520853cd9b0c7486b3d9992dce2f9308f267069a60f88f8deb0
SHA512e98dfeb55d6053d6e2ec323f4665b4ea8cdb5bae0807ac70ac5dbb6cf7f3e8e1ba6a2ad099f8232b0e0ca9a738a9baf7d132957fb5d503c78283b229e35ed974
-
Filesize
8.7MB
MD593144ffd83e528ff8651605be2d2c1a4
SHA16c661ce690ecd3ecd21c8953e410543fcf8a69ad
SHA2564ded33a5b292e88739e50c25c4db2ec8a4b444b21431f3daba87a2573965bd60
SHA5125236edcac0e56126c0f83eccc930a96548788694e1505ee0f74e77ed41582b1c92573de2fef0bf1e69fa3e9bc355f45f4671a67da66612e1a24b8eb849ea668c
-
Filesize
3.5MB
MD5aa6c98cd853bf585a410394fd10817dc
SHA1ceab1865997ae2c6e070a9c6adf6b129cf2ad383
SHA256fc45eebea5ae88160a2ac49fe7e027baeee028c4f4b021794726a04ecea8c90b
SHA5122ada05425dce38fd9fe48c9ceb6a21c59c5e7088274c4445dfde054974f14f8feba5012909c5a75d7932a6bcbb488e38d34d9c970cd61c636ee13abc59e06562