Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 01:19
Static task
static1
Behavioral task
behavioral1
Sample
3a02499a3d82ac43d223b08cade8d000_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3a02499a3d82ac43d223b08cade8d000_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3a02499a3d82ac43d223b08cade8d000_NeikiAnalytics.exe
-
Size
103KB
-
MD5
3a02499a3d82ac43d223b08cade8d000
-
SHA1
3a4090f5c79ff21e719a4e91c4698d091c0f95e7
-
SHA256
7d48185f0dbfea4fcf54b6f7038826fcc8b09cb40e8ffa26762415ca0f32f42c
-
SHA512
707a691aa5dd77443409b344d3d39079f4e7ddee56a28b876285d0bd82b416002fd502b451f6de3ee06663274818380860af34f7cac5bb498a101d4b87c59c34
-
SSDEEP
1536:2zfXIsxrhzk2nfsW3ou3yWW2dvcW6eHcBwUi6vWE0Dl27b58XBdqaMGxuA15:yfjxrhzk2nfsWhP7dvavi6vWEbh8XX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wovwjqpg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wvtsodeh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wypefllp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wncqqldk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wnavpu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wqjtqsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wkhkxipl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wiptx.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wplksyfm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wmisqo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wkkhu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wkuinyl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wpwvetg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation weibpaj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wloqon.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation whlai.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wbbep.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation woeqf.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation whowku.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wnbnhtp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wejltyirb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wswefhcj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wacxoh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wiiujf.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wigovcof.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 3a02499a3d82ac43d223b08cade8d000_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wiiuclc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wwbrcjd.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wetau.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wqiwfbfmh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wvdvhhvs.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wkgdallxu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wqbtxsxm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wyjsywfh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wnpl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wre.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation whdubcj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wllir.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wqpake.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wcbpnm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wckqbay.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation whxjpfp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wrcvhe.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wbqvdb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wvtcmwu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wofiqo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wwkncmq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wywlf.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wvmdddy.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wcsstfq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wtekp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wadwr.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation worfe.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wkbwntj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wdhkhpha.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wjdwy.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wsbkrnk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wlurtx.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wbxoek.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wdrijy.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wtcyavnj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation woenvkap.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wpkgpil.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wgsvtgt.exe -
Executes dropped EXE 64 IoCs
pid Process 4244 wllmluy.exe 3036 wrcvhe.exe 1496 wre.exe 2920 wiiuclc.exe 440 wflhnpe.exe 4868 wwowh.exe 2628 wgsvtgt.exe 3236 wydnkj.exe 5040 wwbrcjd.exe 232 wahsvwp.exe 3756 wcpel.exe 2668 wdyoah.exe 3152 wqaak.exe 3036 wkhkxipl.exe 4316 wovwjqpg.exe 4948 wcbpnm.exe 1348 wquwtxb.exe 2536 wpwvetg.exe 2384 whdubcj.exe 4528 wpaoahsj.exe 4140 wetau.exe 5104 wywlf.exe 1812 whcjrjv.exe 1504 wvtsodeh.exe 4676 wbo.exe 4440 weibpaj.exe 3784 wpdoudq.exe 3540 wulvc.exe 2404 wmec.exe 4004 wajvru.exe 4852 womp.exe 1276 wbfap.exe 3668 wjrkhosbc.exe 4784 wnfyicmu.exe 4340 wvdvhhvs.exe 4524 wjoeqexr.exe 4984 wjdwy.exe 4392 wjf.exe 4464 wirxl.exe 4848 wng.exe 3292 wqenrt.exe 2544 wnuow.exe 1512 wbaiaru.exe 4600 wixe.exe 2920 wwfen.exe 1680 wjogjo.exe 2516 wbqvdb.exe 1640 wrnklpn.exe 2628 wpgmps.exe 4064 woeqf.exe 4960 whfw.exe 4568 wkgdallxu.exe 4828 wxdvpixj.exe 3532 wccuwxe.exe 2076 wtekp.exe 5044 wcuekk.exe 628 wloqon.exe 1696 wdrijy.exe 3308 wgewknec.exe 1736 wdsuc.exe 552 weudfm.exe 208 wexmhi.exe 5020 whlai.exe 3812 wqiwfbfmh.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wflhnpe.exe wiiuclc.exe File created C:\Windows\SysWOW64\wkhkxipl.exe wqaak.exe File created C:\Windows\SysWOW64\wng.exe wirxl.exe File opened for modification C:\Windows\SysWOW64\wng.exe wirxl.exe File opened for modification C:\Windows\SysWOW64\wjogjo.exe wwfen.exe File opened for modification C:\Windows\SysWOW64\woeqf.exe wpgmps.exe File created C:\Windows\SysWOW64\wdsuc.exe wgewknec.exe File opened for modification C:\Windows\SysWOW64\wgjheoa.exe wwfkrlilf.exe File created C:\Windows\SysWOW64\wpaoahsj.exe whdubcj.exe File created C:\Windows\SysWOW64\wjoeqexr.exe wvdvhhvs.exe File created C:\Windows\SysWOW64\wpgmps.exe wrnklpn.exe File opened for modification C:\Windows\SysWOW64\wnavpu.exe wwqx.exe File created C:\Windows\SysWOW64\wsvbuqru.exe wbxoek.exe File created C:\Windows\SysWOW64\wrnklpn.exe wbqvdb.exe File opened for modification C:\Windows\SysWOW64\whowku.exe wpkgpil.exe File opened for modification C:\Windows\SysWOW64\wypefllp.exe wyblvo.exe File created C:\Windows\SysWOW64\wkkhu.exe wcxvd.exe File created C:\Windows\SysWOW64\wpkgpil.exe wgmkqcd.exe File opened for modification C:\Windows\SysWOW64\wqjtqsv.exe wdqjvx.exe File created C:\Windows\SysWOW64\wmdhn.exe wxthy.exe File opened for modification C:\Windows\SysWOW64\wbugbo.exe wrbswmjmh.exe File opened for modification C:\Windows\SysWOW64\wsvbuqru.exe wbxoek.exe File opened for modification C:\Windows\SysWOW64\wbfap.exe womp.exe File created C:\Windows\SysWOW64\wpwvetg.exe wquwtxb.exe File opened for modification C:\Windows\SysWOW64\whlai.exe wexmhi.exe File opened for modification C:\Windows\SysWOW64\wqbtxsxm.exe wacxoh.exe File created C:\Windows\SysWOW64\wbugbo.exe wrbswmjmh.exe File created C:\Windows\SysWOW64\wgsvtgt.exe wwowh.exe File created C:\Windows\SysWOW64\wcbpnm.exe wovwjqpg.exe File opened for modification C:\Windows\SysWOW64\wetau.exe wpaoahsj.exe File opened for modification C:\Windows\SysWOW64\wrnklpn.exe wbqvdb.exe File opened for modification C:\Windows\SysWOW64\wfni.exe wtcyavnj.exe File opened for modification C:\Windows\SysWOW64\wyjsywfh.exe wvvexjlnn.exe File created C:\Windows\SysWOW64\wvmdddy.exe wvakth.exe File opened for modification C:\Windows\SysWOW64\wvmdddy.exe wvakth.exe File opened for modification C:\Windows\SysWOW64\wofiqo.exe wvmdddy.exe File opened for modification C:\Windows\SysWOW64\woenvkap.exe wjcibx.exe File created C:\Windows\SysWOW64\wjrkhosbc.exe wbfap.exe File created C:\Windows\SysWOW64\wirxl.exe wjf.exe File created C:\Windows\SysWOW64\whlai.exe wexmhi.exe File opened for modification C:\Windows\SysWOW64\wsohpa.exe wncqqldk.exe File opened for modification C:\Windows\SysWOW64\wjcibx.exe wnavpu.exe File opened for modification C:\Windows\SysWOW64\wgmkqcd.exe wkuinyl.exe File created C:\Windows\SysWOW64\wdhkhpha.exe wqjtqsv.exe File opened for modification C:\Windows\SysWOW64\wdhkhpha.exe wqjtqsv.exe File created C:\Windows\SysWOW64\wpdoudq.exe weibpaj.exe File created C:\Windows\SysWOW64\wdrijy.exe wloqon.exe File opened for modification C:\Windows\SysWOW64\wiptx.exe wqbtxsxm.exe File created C:\Windows\SysWOW64\wgwmfbrfr.exe whxjpfp.exe File opened for modification C:\Windows\SysWOW64\wqpake.exe wgwmfbrfr.exe File opened for modification C:\Windows\SysWOW64\wvakth.exe whwoitk.exe File opened for modification C:\Windows\SysWOW64\wjqdgs.exe wmdhn.exe File opened for modification C:\Windows\SysWOW64\wgwmfbrfr.exe whxjpfp.exe File opened for modification C:\Windows\SysWOW64\wpxm.exe wic.exe File opened for modification C:\Windows\SysWOW64\wpwvetg.exe wquwtxb.exe File created C:\Windows\SysWOW64\wbo.exe wvtsodeh.exe File opened for modification C:\Windows\SysWOW64\wxdvpixj.exe wkgdallxu.exe File created C:\Windows\SysWOW64\wyqdyh.exe wpshbc.exe File opened for modification C:\Windows\SysWOW64\wcxvd.exe wosbyke.exe File opened for modification C:\Windows\SysWOW64\wjlt.exe wgxdm.exe File opened for modification C:\Windows\SysWOW64\wrcvhe.exe wllmluy.exe File created C:\Windows\SysWOW64\wovwjqpg.exe wkhkxipl.exe File opened for modification C:\Windows\SysWOW64\wywlf.exe wetau.exe File opened for modification C:\Windows\SysWOW64\wwfen.exe wixe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 25 IoCs
pid pid_target Process procid_target 3280 4316 WerFault.exe 129 3476 2384 WerFault.exe 144 4528 4004 WerFault.exe 181 2348 4852 WerFault.exe 184 5032 2516 WerFault.exe 237 1192 4828 WerFault.exe 257 1316 4828 WerFault.exe 257 2928 3532 WerFault.exe 260 1428 4828 WerFault.exe 257 3064 4828 WerFault.exe 257 3592 3308 WerFault.exe 285 2464 552 WerFault.exe 293 2196 3812 WerFault.exe 304 428 1252 WerFault.exe 399 4232 1252 WerFault.exe 399 1588 4140 WerFault.exe 402 4544 1252 WerFault.exe 399 1364 3564 WerFault.exe 431 5016 428 WerFault.exe 445 2776 3720 WerFault.exe 483 4020 2764 WerFault.exe 521 1140 3064 WerFault.exe 574 3236 1792 WerFault.exe 621 4392 1792 WerFault.exe 621 1228 4524 WerFault.exe 634 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 4244 3008 3a02499a3d82ac43d223b08cade8d000_NeikiAnalytics.exe 84 PID 3008 wrote to memory of 4244 3008 3a02499a3d82ac43d223b08cade8d000_NeikiAnalytics.exe 84 PID 3008 wrote to memory of 4244 3008 3a02499a3d82ac43d223b08cade8d000_NeikiAnalytics.exe 84 PID 3008 wrote to memory of 2764 3008 3a02499a3d82ac43d223b08cade8d000_NeikiAnalytics.exe 86 PID 3008 wrote to memory of 2764 3008 3a02499a3d82ac43d223b08cade8d000_NeikiAnalytics.exe 86 PID 3008 wrote to memory of 2764 3008 3a02499a3d82ac43d223b08cade8d000_NeikiAnalytics.exe 86 PID 4244 wrote to memory of 3036 4244 wllmluy.exe 89 PID 4244 wrote to memory of 3036 4244 wllmluy.exe 89 PID 4244 wrote to memory of 3036 4244 wllmluy.exe 89 PID 4244 wrote to memory of 4812 4244 wllmluy.exe 90 PID 4244 wrote to memory of 4812 4244 wllmluy.exe 90 PID 4244 wrote to memory of 4812 4244 wllmluy.exe 90 PID 3036 wrote to memory of 1496 3036 wrcvhe.exe 93 PID 3036 wrote to memory of 1496 3036 wrcvhe.exe 93 PID 3036 wrote to memory of 1496 3036 wrcvhe.exe 93 PID 3036 wrote to memory of 4516 3036 wrcvhe.exe 94 PID 3036 wrote to memory of 4516 3036 wrcvhe.exe 94 PID 3036 wrote to memory of 4516 3036 wrcvhe.exe 94 PID 1496 wrote to memory of 2920 1496 wre.exe 96 PID 1496 wrote to memory of 2920 1496 wre.exe 96 PID 1496 wrote to memory of 2920 1496 wre.exe 96 PID 1496 wrote to memory of 1052 1496 wre.exe 97 PID 1496 wrote to memory of 1052 1496 wre.exe 97 PID 1496 wrote to memory of 1052 1496 wre.exe 97 PID 2920 wrote to memory of 440 2920 wiiuclc.exe 99 PID 2920 wrote to memory of 440 2920 wiiuclc.exe 99 PID 2920 wrote to memory of 440 2920 wiiuclc.exe 99 PID 2920 wrote to memory of 1888 2920 wiiuclc.exe 100 PID 2920 wrote to memory of 1888 2920 wiiuclc.exe 100 PID 2920 wrote to memory of 1888 2920 wiiuclc.exe 100 PID 440 wrote to memory of 4868 440 wflhnpe.exe 102 PID 440 wrote to memory of 4868 440 wflhnpe.exe 102 PID 440 wrote to memory of 4868 440 wflhnpe.exe 102 PID 440 wrote to memory of 2240 440 wflhnpe.exe 103 PID 440 wrote to memory of 2240 440 wflhnpe.exe 103 PID 440 wrote to memory of 2240 440 wflhnpe.exe 103 PID 4868 wrote to memory of 2628 4868 wwowh.exe 105 PID 4868 wrote to memory of 2628 4868 wwowh.exe 105 PID 4868 wrote to memory of 2628 4868 wwowh.exe 105 PID 4868 wrote to memory of 468 4868 wwowh.exe 106 PID 4868 wrote to memory of 468 4868 wwowh.exe 106 PID 4868 wrote to memory of 468 4868 wwowh.exe 106 PID 2628 wrote to memory of 3236 2628 wgsvtgt.exe 108 PID 2628 wrote to memory of 3236 2628 wgsvtgt.exe 108 PID 2628 wrote to memory of 3236 2628 wgsvtgt.exe 108 PID 2628 wrote to memory of 2128 2628 wgsvtgt.exe 109 PID 2628 wrote to memory of 2128 2628 wgsvtgt.exe 109 PID 2628 wrote to memory of 2128 2628 wgsvtgt.exe 109 PID 3236 wrote to memory of 5040 3236 wydnkj.exe 111 PID 3236 wrote to memory of 5040 3236 wydnkj.exe 111 PID 3236 wrote to memory of 5040 3236 wydnkj.exe 111 PID 3236 wrote to memory of 4348 3236 wydnkj.exe 112 PID 3236 wrote to memory of 4348 3236 wydnkj.exe 112 PID 3236 wrote to memory of 4348 3236 wydnkj.exe 112 PID 5040 wrote to memory of 232 5040 wwbrcjd.exe 114 PID 5040 wrote to memory of 232 5040 wwbrcjd.exe 114 PID 5040 wrote to memory of 232 5040 wwbrcjd.exe 114 PID 5040 wrote to memory of 2300 5040 wwbrcjd.exe 115 PID 5040 wrote to memory of 2300 5040 wwbrcjd.exe 115 PID 5040 wrote to memory of 2300 5040 wwbrcjd.exe 115 PID 232 wrote to memory of 3756 232 wahsvwp.exe 117 PID 232 wrote to memory of 3756 232 wahsvwp.exe 117 PID 232 wrote to memory of 3756 232 wahsvwp.exe 117 PID 232 wrote to memory of 4960 232 wahsvwp.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a02499a3d82ac43d223b08cade8d000_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3a02499a3d82ac43d223b08cade8d000_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\wllmluy.exe"C:\Windows\system32\wllmluy.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\wrcvhe.exe"C:\Windows\system32\wrcvhe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\wre.exe"C:\Windows\system32\wre.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\wiiuclc.exe"C:\Windows\system32\wiiuclc.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\wflhnpe.exe"C:\Windows\system32\wflhnpe.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\wwowh.exe"C:\Windows\system32\wwowh.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\wgsvtgt.exe"C:\Windows\system32\wgsvtgt.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\wydnkj.exe"C:\Windows\system32\wydnkj.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\wwbrcjd.exe"C:\Windows\system32\wwbrcjd.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\wahsvwp.exe"C:\Windows\system32\wahsvwp.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\wcpel.exe"C:\Windows\system32\wcpel.exe"12⤵
- Executes dropped EXE
PID:3756 -
C:\Windows\SysWOW64\wdyoah.exe"C:\Windows\system32\wdyoah.exe"13⤵
- Executes dropped EXE
PID:2668 -
C:\Windows\SysWOW64\wqaak.exe"C:\Windows\system32\wqaak.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3152 -
C:\Windows\SysWOW64\wkhkxipl.exe"C:\Windows\system32\wkhkxipl.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\wovwjqpg.exe"C:\Windows\system32\wovwjqpg.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4316 -
C:\Windows\SysWOW64\wcbpnm.exe"C:\Windows\system32\wcbpnm.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
PID:4948 -
C:\Windows\SysWOW64\wquwtxb.exe"C:\Windows\system32\wquwtxb.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1348 -
C:\Windows\SysWOW64\wpwvetg.exe"C:\Windows\system32\wpwvetg.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\whdubcj.exe"C:\Windows\system32\whdubcj.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2384 -
C:\Windows\SysWOW64\wpaoahsj.exe"C:\Windows\system32\wpaoahsj.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4528 -
C:\Windows\SysWOW64\wetau.exe"C:\Windows\system32\wetau.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4140 -
C:\Windows\SysWOW64\wywlf.exe"C:\Windows\system32\wywlf.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:5104 -
C:\Windows\SysWOW64\whcjrjv.exe"C:\Windows\system32\whcjrjv.exe"24⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\SysWOW64\wvtsodeh.exe"C:\Windows\system32\wvtsodeh.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1504 -
C:\Windows\SysWOW64\wbo.exe"C:\Windows\system32\wbo.exe"26⤵
- Executes dropped EXE
PID:4676 -
C:\Windows\SysWOW64\weibpaj.exe"C:\Windows\system32\weibpaj.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4440 -
C:\Windows\SysWOW64\wpdoudq.exe"C:\Windows\system32\wpdoudq.exe"28⤵
- Executes dropped EXE
PID:3784 -
C:\Windows\SysWOW64\wulvc.exe"C:\Windows\system32\wulvc.exe"29⤵
- Executes dropped EXE
PID:3540 -
C:\Windows\SysWOW64\wmec.exe"C:\Windows\system32\wmec.exe"30⤵
- Executes dropped EXE
PID:2404 -
C:\Windows\SysWOW64\wajvru.exe"C:\Windows\system32\wajvru.exe"31⤵
- Executes dropped EXE
PID:4004 -
C:\Windows\SysWOW64\womp.exe"C:\Windows\system32\womp.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4852 -
C:\Windows\SysWOW64\wbfap.exe"C:\Windows\system32\wbfap.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1276 -
C:\Windows\SysWOW64\wjrkhosbc.exe"C:\Windows\system32\wjrkhosbc.exe"34⤵
- Executes dropped EXE
PID:3668 -
C:\Windows\SysWOW64\wnfyicmu.exe"C:\Windows\system32\wnfyicmu.exe"35⤵
- Executes dropped EXE
PID:4784 -
C:\Windows\SysWOW64\wvdvhhvs.exe"C:\Windows\system32\wvdvhhvs.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4340 -
C:\Windows\SysWOW64\wjoeqexr.exe"C:\Windows\system32\wjoeqexr.exe"37⤵
- Executes dropped EXE
PID:4524 -
C:\Windows\SysWOW64\wjdwy.exe"C:\Windows\system32\wjdwy.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:4984 -
C:\Windows\SysWOW64\wjf.exe"C:\Windows\system32\wjf.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4392 -
C:\Windows\SysWOW64\wirxl.exe"C:\Windows\system32\wirxl.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4464 -
C:\Windows\SysWOW64\wng.exe"C:\Windows\system32\wng.exe"41⤵
- Executes dropped EXE
PID:4848 -
C:\Windows\SysWOW64\wqenrt.exe"C:\Windows\system32\wqenrt.exe"42⤵
- Executes dropped EXE
PID:3292 -
C:\Windows\SysWOW64\wnuow.exe"C:\Windows\system32\wnuow.exe"43⤵
- Executes dropped EXE
PID:2544 -
C:\Windows\SysWOW64\wbaiaru.exe"C:\Windows\system32\wbaiaru.exe"44⤵
- Executes dropped EXE
PID:1512 -
C:\Windows\SysWOW64\wixe.exe"C:\Windows\system32\wixe.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4600 -
C:\Windows\SysWOW64\wwfen.exe"C:\Windows\system32\wwfen.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2920 -
C:\Windows\SysWOW64\wjogjo.exe"C:\Windows\system32\wjogjo.exe"47⤵
- Executes dropped EXE
PID:1680 -
C:\Windows\SysWOW64\wbqvdb.exe"C:\Windows\system32\wbqvdb.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2516 -
C:\Windows\SysWOW64\wrnklpn.exe"C:\Windows\system32\wrnklpn.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1640 -
C:\Windows\SysWOW64\wpgmps.exe"C:\Windows\system32\wpgmps.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2628 -
C:\Windows\SysWOW64\woeqf.exe"C:\Windows\system32\woeqf.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:4064 -
C:\Windows\SysWOW64\whfw.exe"C:\Windows\system32\whfw.exe"52⤵
- Executes dropped EXE
PID:4960 -
C:\Windows\SysWOW64\wkgdallxu.exe"C:\Windows\system32\wkgdallxu.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4568 -
C:\Windows\SysWOW64\wxdvpixj.exe"C:\Windows\system32\wxdvpixj.exe"54⤵
- Executes dropped EXE
PID:4828 -
C:\Windows\SysWOW64\wccuwxe.exe"C:\Windows\system32\wccuwxe.exe"55⤵
- Executes dropped EXE
PID:3532 -
C:\Windows\SysWOW64\wtekp.exe"C:\Windows\system32\wtekp.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\wcuekk.exe"C:\Windows\system32\wcuekk.exe"57⤵
- Executes dropped EXE
PID:5044 -
C:\Windows\SysWOW64\wloqon.exe"C:\Windows\system32\wloqon.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:628 -
C:\Windows\SysWOW64\wdrijy.exe"C:\Windows\system32\wdrijy.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:1696 -
C:\Windows\SysWOW64\wgewknec.exe"C:\Windows\system32\wgewknec.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3308 -
C:\Windows\SysWOW64\wdsuc.exe"C:\Windows\system32\wdsuc.exe"61⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\SysWOW64\weudfm.exe"C:\Windows\system32\weudfm.exe"62⤵
- Executes dropped EXE
PID:552 -
C:\Windows\SysWOW64\wexmhi.exe"C:\Windows\system32\wexmhi.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:208 -
C:\Windows\SysWOW64\whlai.exe"C:\Windows\system32\whlai.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:5020 -
C:\Windows\SysWOW64\wqiwfbfmh.exe"C:\Windows\system32\wqiwfbfmh.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
PID:3812 -
C:\Windows\SysWOW64\wllir.exe"C:\Windows\system32\wllir.exe"66⤵
- Checks computer location settings
PID:2212 -
C:\Windows\SysWOW64\wxiahd.exe"C:\Windows\system32\wxiahd.exe"67⤵PID:1484
-
C:\Windows\SysWOW64\wqbgu.exe"C:\Windows\system32\wqbgu.exe"68⤵PID:3472
-
C:\Windows\SysWOW64\wlpdl.exe"C:\Windows\system32\wlpdl.exe"69⤵PID:4820
-
C:\Windows\SysWOW64\wyblvo.exe"C:\Windows\system32\wyblvo.exe"70⤵
- Drops file in System32 directory
PID:4316 -
C:\Windows\SysWOW64\wypefllp.exe"C:\Windows\system32\wypefllp.exe"71⤵
- Checks computer location settings
PID:3476 -
C:\Windows\SysWOW64\wacxoh.exe"C:\Windows\system32\wacxoh.exe"72⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4268 -
C:\Windows\SysWOW64\wqbtxsxm.exe"C:\Windows\system32\wqbtxsxm.exe"73⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3292 -
C:\Windows\SysWOW64\wiptx.exe"C:\Windows\system32\wiptx.exe"74⤵
- Checks computer location settings
PID:4904 -
C:\Windows\SysWOW64\wyibkp.exe"C:\Windows\system32\wyibkp.exe"75⤵PID:4884
-
C:\Windows\SysWOW64\wummwu.exe"C:\Windows\system32\wummwu.exe"76⤵PID:400
-
C:\Windows\SysWOW64\wpshbc.exe"C:\Windows\system32\wpshbc.exe"77⤵
- Drops file in System32 directory
PID:4948 -
C:\Windows\SysWOW64\wyqdyh.exe"C:\Windows\system32\wyqdyh.exe"78⤵PID:2192
-
C:\Windows\SysWOW64\wquutt.exe"C:\Windows\system32\wquutt.exe"79⤵PID:4320
-
C:\Windows\SysWOW64\wadwr.exe"C:\Windows\system32\wadwr.exe"80⤵
- Checks computer location settings
PID:3500 -
C:\Windows\SysWOW64\wnbnhtp.exe"C:\Windows\system32\wnbnhtp.exe"81⤵
- Checks computer location settings
PID:3192 -
C:\Windows\SysWOW64\wvtcmwu.exe"C:\Windows\system32\wvtcmwu.exe"82⤵
- Checks computer location settings
PID:4744 -
C:\Windows\SysWOW64\wvvk.exe"C:\Windows\system32\wvvk.exe"83⤵PID:2484
-
C:\Windows\SysWOW64\wbjaqe.exe"C:\Windows\system32\wbjaqe.exe"84⤵PID:4140
-
C:\Windows\SysWOW64\wig.exe"C:\Windows\system32\wig.exe"85⤵PID:2512
-
C:\Windows\SysWOW64\wsbkrnk.exe"C:\Windows\system32\wsbkrnk.exe"86⤵
- Checks computer location settings
PID:1752 -
C:\Windows\SysWOW64\wno.exe"C:\Windows\system32\wno.exe"87⤵PID:4040
-
C:\Windows\SysWOW64\wsqke.exe"C:\Windows\system32\wsqke.exe"88⤵PID:4684
-
C:\Windows\SysWOW64\wplksyfm.exe"C:\Windows\system32\wplksyfm.exe"89⤵
- Checks computer location settings
PID:452 -
C:\Windows\SysWOW64\wqfeos.exe"C:\Windows\system32\wqfeos.exe"90⤵PID:4828
-
C:\Windows\SysWOW64\wiiujf.exe"C:\Windows\system32\wiiujf.exe"91⤵
- Checks computer location settings
PID:1468 -
C:\Windows\SysWOW64\wwrtxa.exe"C:\Windows\system32\wwrtxa.exe"92⤵PID:212
-
C:\Windows\SysWOW64\wnfuan.exe"C:\Windows\system32\wnfuan.exe"93⤵PID:2768
-
C:\Windows\SysWOW64\wejltyirb.exe"C:\Windows\system32\wejltyirb.exe"94⤵
- Checks computer location settings
PID:4848 -
C:\Windows\SysWOW64\wwbqglw.exe"C:\Windows\system32\wwbqglw.exe"95⤵PID:3284
-
C:\Windows\SysWOW64\wgvelnch.exe"C:\Windows\system32\wgvelnch.exe"96⤵PID:1252
-
C:\Windows\SysWOW64\wtaxni.exe"C:\Windows\system32\wtaxni.exe"97⤵PID:4140
-
C:\Windows\SysWOW64\wdljf.exe"C:\Windows\system32\wdljf.exe"98⤵PID:1752
-
C:\Windows\SysWOW64\wkyv.exe"C:\Windows\system32\wkyv.exe"99⤵PID:3532
-
C:\Windows\SysWOW64\wyreumc.exe"C:\Windows\system32\wyreumc.exe"100⤵PID:4596
-
C:\Windows\SysWOW64\wugclq.exe"C:\Windows\system32\wugclq.exe"101⤵PID:1260
-
C:\Windows\SysWOW64\wmxhy.exe"C:\Windows\system32\wmxhy.exe"102⤵PID:4456
-
C:\Windows\SysWOW64\wvvexjlnn.exe"C:\Windows\system32\wvvexjlnn.exe"103⤵
- Drops file in System32 directory
PID:3804 -
C:\Windows\SysWOW64\wyjsywfh.exe"C:\Windows\system32\wyjsywfh.exe"104⤵
- Checks computer location settings
PID:3564 -
C:\Windows\SysWOW64\wigovcof.exe"C:\Windows\system32\wigovcof.exe"105⤵
- Checks computer location settings
PID:2308 -
C:\Windows\SysWOW64\wmisqo.exe"C:\Windows\system32\wmisqo.exe"106⤵
- Checks computer location settings
PID:2628 -
C:\Windows\SysWOW64\whwoitk.exe"C:\Windows\system32\whwoitk.exe"107⤵
- Drops file in System32 directory
PID:4436 -
C:\Windows\SysWOW64\wvakth.exe"C:\Windows\system32\wvakth.exe"108⤵
- Drops file in System32 directory
PID:428 -
C:\Windows\SysWOW64\wvmdddy.exe"C:\Windows\system32\wvmdddy.exe"109⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2020 -
C:\Windows\SysWOW64\wofiqo.exe"C:\Windows\system32\wofiqo.exe"110⤵
- Checks computer location settings
PID:2264 -
C:\Windows\SysWOW64\wosbyke.exe"C:\Windows\system32\wosbyke.exe"111⤵
- Drops file in System32 directory
PID:2076 -
C:\Windows\SysWOW64\wcxvd.exe"C:\Windows\system32\wcxvd.exe"112⤵
- Drops file in System32 directory
PID:4812 -
C:\Windows\SysWOW64\wkkhu.exe"C:\Windows\system32\wkkhu.exe"113⤵
- Checks computer location settings
PID:1924 -
C:\Windows\SysWOW64\wgxdm.exe"C:\Windows\system32\wgxdm.exe"114⤵
- Drops file in System32 directory
PID:3156 -
C:\Windows\SysWOW64\wjlt.exe"C:\Windows\system32\wjlt.exe"115⤵PID:2712
-
C:\Windows\SysWOW64\wswefhcj.exe"C:\Windows\system32\wswefhcj.exe"116⤵
- Checks computer location settings
PID:432 -
C:\Windows\SysWOW64\wncqqldk.exe"C:\Windows\system32\wncqqldk.exe"117⤵
- Checks computer location settings
- Drops file in System32 directory
PID:732 -
C:\Windows\SysWOW64\wsohpa.exe"C:\Windows\system32\wsohpa.exe"118⤵PID:2764
-
C:\Windows\SysWOW64\wtcyavnj.exe"C:\Windows\system32\wtcyavnj.exe"119⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2484 -
C:\Windows\SysWOW64\wfni.exe"C:\Windows\system32\wfni.exe"120⤵PID:3720
-
C:\Windows\SysWOW64\wwqx.exe"C:\Windows\system32\wwqx.exe"121⤵
- Drops file in System32 directory
PID:4124 -
C:\Windows\SysWOW64\wnavpu.exe"C:\Windows\system32\wnavpu.exe"122⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4884
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-