Analysis
-
max time kernel
94s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
35d5bdfdde8d2840b9bded3ce10b2060_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
35d5bdfdde8d2840b9bded3ce10b2060_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
35d5bdfdde8d2840b9bded3ce10b2060_NeikiAnalytics.exe
-
Size
288KB
-
MD5
35d5bdfdde8d2840b9bded3ce10b2060
-
SHA1
b369d9b340e6f120e23545ab4962e9cbfc34e24f
-
SHA256
2afb3a8b9c6c375aa51f3ce75e5b4e971a5c782accb4fa5b30f9f4866373fd36
-
SHA512
68b31014d9593647d201e92d1ad66d420bf4074c064681fe0206aaed70fad1a72a74535749ffdf6b8fd5eab355626017bf6ddf08e86cce9fd5a1102cf11d5864
-
SSDEEP
6144:rqppuGRYx4H712f/SBTpzZA6rXD40b+7TJzn:rqpNtb1YIp9AI4Fzn
Malware Config
Signatures
-
Executes dropped EXE 26 IoCs
pid Process 564 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202.exe 2228 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202a.exe 348 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202b.exe 3404 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202c.exe 4516 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202d.exe 1768 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202e.exe 3160 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202f.exe 688 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202g.exe 4548 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202h.exe 2396 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202i.exe 1452 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202j.exe 4608 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202k.exe 1580 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202l.exe 1872 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202m.exe 4628 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202n.exe 4604 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202o.exe 4932 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202p.exe 1716 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202q.exe 640 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202r.exe 740 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202s.exe 1660 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202t.exe 4144 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202u.exe 2792 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202v.exe 2752 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202w.exe 4260 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202x.exe 4960 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202y.exe -
Adds Run key to start application 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202f.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202g.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202i.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202h.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202o.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202n.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202s.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202r.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202t.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202x.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202w.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202c.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202h.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202p.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202o.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202q.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202p.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202v.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202u.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202a.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202r.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202q.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202b.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202d.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202j.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202w.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202v.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202l.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202k.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202n.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202e.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202m.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202u.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202t.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202k.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202j.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202y.exe\"" 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202x.exe -
Modifies registry class 54 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202c.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202h.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202i.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202v.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202r.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_NeikiAnalytics.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202o.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202v.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202d.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202q.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202y.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202g.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202m.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202r.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202h.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202w.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202l.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202x.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202k.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202l.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202u.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202j.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202n.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202c.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202k.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202p.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202x.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_NeikiAnalytics.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202n.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202o.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202q.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202t.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202j.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202t.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202m.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202w.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202g.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202u.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202i.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 837f9a0d73440069 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202p.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2824 wrote to memory of 564 2824 35d5bdfdde8d2840b9bded3ce10b2060_NeikiAnalytics.exe 82 PID 2824 wrote to memory of 564 2824 35d5bdfdde8d2840b9bded3ce10b2060_NeikiAnalytics.exe 82 PID 2824 wrote to memory of 564 2824 35d5bdfdde8d2840b9bded3ce10b2060_NeikiAnalytics.exe 82 PID 564 wrote to memory of 2228 564 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202.exe 83 PID 564 wrote to memory of 2228 564 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202.exe 83 PID 564 wrote to memory of 2228 564 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202.exe 83 PID 2228 wrote to memory of 348 2228 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202a.exe 84 PID 2228 wrote to memory of 348 2228 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202a.exe 84 PID 2228 wrote to memory of 348 2228 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202a.exe 84 PID 348 wrote to memory of 3404 348 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202b.exe 85 PID 348 wrote to memory of 3404 348 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202b.exe 85 PID 348 wrote to memory of 3404 348 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202b.exe 85 PID 3404 wrote to memory of 4516 3404 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202c.exe 86 PID 3404 wrote to memory of 4516 3404 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202c.exe 86 PID 3404 wrote to memory of 4516 3404 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202c.exe 86 PID 4516 wrote to memory of 1768 4516 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202d.exe 87 PID 4516 wrote to memory of 1768 4516 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202d.exe 87 PID 4516 wrote to memory of 1768 4516 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202d.exe 87 PID 1768 wrote to memory of 3160 1768 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202e.exe 88 PID 1768 wrote to memory of 3160 1768 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202e.exe 88 PID 1768 wrote to memory of 3160 1768 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202e.exe 88 PID 3160 wrote to memory of 688 3160 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202f.exe 90 PID 3160 wrote to memory of 688 3160 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202f.exe 90 PID 3160 wrote to memory of 688 3160 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202f.exe 90 PID 688 wrote to memory of 4548 688 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202g.exe 91 PID 688 wrote to memory of 4548 688 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202g.exe 91 PID 688 wrote to memory of 4548 688 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202g.exe 91 PID 4548 wrote to memory of 2396 4548 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202h.exe 93 PID 4548 wrote to memory of 2396 4548 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202h.exe 93 PID 4548 wrote to memory of 2396 4548 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202h.exe 93 PID 2396 wrote to memory of 1452 2396 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202i.exe 94 PID 2396 wrote to memory of 1452 2396 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202i.exe 94 PID 2396 wrote to memory of 1452 2396 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202i.exe 94 PID 1452 wrote to memory of 4608 1452 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202j.exe 95 PID 1452 wrote to memory of 4608 1452 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202j.exe 95 PID 1452 wrote to memory of 4608 1452 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202j.exe 95 PID 4608 wrote to memory of 1580 4608 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202k.exe 97 PID 4608 wrote to memory of 1580 4608 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202k.exe 97 PID 4608 wrote to memory of 1580 4608 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202k.exe 97 PID 1580 wrote to memory of 1872 1580 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202l.exe 98 PID 1580 wrote to memory of 1872 1580 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202l.exe 98 PID 1580 wrote to memory of 1872 1580 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202l.exe 98 PID 1872 wrote to memory of 4628 1872 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202m.exe 99 PID 1872 wrote to memory of 4628 1872 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202m.exe 99 PID 1872 wrote to memory of 4628 1872 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202m.exe 99 PID 4628 wrote to memory of 4604 4628 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202n.exe 100 PID 4628 wrote to memory of 4604 4628 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202n.exe 100 PID 4628 wrote to memory of 4604 4628 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202n.exe 100 PID 4604 wrote to memory of 4932 4604 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202o.exe 101 PID 4604 wrote to memory of 4932 4604 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202o.exe 101 PID 4604 wrote to memory of 4932 4604 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202o.exe 101 PID 4932 wrote to memory of 1716 4932 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202p.exe 102 PID 4932 wrote to memory of 1716 4932 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202p.exe 102 PID 4932 wrote to memory of 1716 4932 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202p.exe 102 PID 1716 wrote to memory of 640 1716 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202q.exe 103 PID 1716 wrote to memory of 640 1716 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202q.exe 103 PID 1716 wrote to memory of 640 1716 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202q.exe 103 PID 640 wrote to memory of 740 640 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202r.exe 104 PID 640 wrote to memory of 740 640 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202r.exe 104 PID 640 wrote to memory of 740 640 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202r.exe 104 PID 740 wrote to memory of 1660 740 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202s.exe 105 PID 740 wrote to memory of 1660 740 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202s.exe 105 PID 740 wrote to memory of 1660 740 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202s.exe 105 PID 1660 wrote to memory of 4144 1660 35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202t.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\35d5bdfdde8d2840b9bded3ce10b2060_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\35d5bdfdde8d2840b9bded3ce10b2060_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:564 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202a.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202a.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202b.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202b.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:348 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202c.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202c.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3404 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202d.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202d.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4516 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202e.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202e.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1768 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202f.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202f.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3160 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202g.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202g.exe9⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:688 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202h.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202h.exe10⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4548 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202i.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202i.exe11⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2396 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202j.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202j.exe12⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1452 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202k.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202k.exe13⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4608 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202l.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202l.exe14⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1580 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202m.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202m.exe15⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1872 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202n.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202n.exe16⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4628 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202o.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202o.exe17⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4604 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202p.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202p.exe18⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4932 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202q.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202q.exe19⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1716 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202r.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202r.exe20⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:640 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202s.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202s.exe21⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:740 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202t.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202t.exe22⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1660 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202u.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202u.exe23⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:4144 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202v.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202v.exe24⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:2792 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202w.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202w.exe25⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:2752 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202x.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202x.exe26⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:4260 -
\??\c:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202y.exec:\users\admin\appdata\local\temp\35d5bdfdde8d2840b9bded3ce10b2060_neikianalytics_3202y.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:4960
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD50bf2adb65c41b793de82d4960c7184a3
SHA11518faf820d6489de3c92c38483ada7608ace45c
SHA2560b00a4933e759d5cfab070491ea8d54d98483a6fe55fe2e2630104bffadcc876
SHA512ffaae553d8dfabed431290a2c430e0362e28c6b9e459ec808f8ba087df64f869bf8a8c5ecd01ad2c39e84bf3b57c990e4b1db41987d2aa8455182bb5d57e3b8c
-
Filesize
288KB
MD5c9055f7e6f7ad5414e0406a355c2eb3b
SHA15f70401434a2d188e29427d334736c5c22b085c6
SHA256c7fd52e657a9bc6eef84125ae0889b7571956c80bdd6a7a41c49d284a737a03e
SHA512ad9c559faeff8c23ef39494caf62b840943d7ddb9b30716865e2bc3ae429c819d0f62ed76cc96610508fe766b8a682499509b5a4581d7476bce6ac5469138e91
-
Filesize
289KB
MD5b7856cd90a8e3ccb9d31cc6416da9a37
SHA1ef6e1115fc297fd92efa1a78f60af9add68840d0
SHA25663826eef918cfd2c692efd1ed3a23e324c9c66b06004884d3e648765c46206c5
SHA5122350bc50ddedbd7b6ec288ceea10025609836d27381f10fb7f3dd94f62a9e2489c0740f588ea66b2559da65bd77d6d0eb099fb10ae0fe0ae51b3013065123679
-
Filesize
289KB
MD53476e3ab127ce176fa05c05949c86c57
SHA1d3b762f1323e4f78518071732aa98bcfaea7493d
SHA2565e09be9ec67d8db9a41db403fba5fdde593379d2b0cb87d00f9ef4116bc6ab04
SHA51253e7fdea728da1df4c673fed4aef7ccfe8305dd2cd54df891d8a83ca30f4eeb1475df8e3651d9c2b4ea64bb0309c1f420721541b0bb6ff2b16dcd433dfb0e7b6
-
Filesize
289KB
MD573415e4c167b2fc65690c74ef65691f1
SHA1fdaa4965b0fb04ec25a766f1416aa29523b040b7
SHA2564087165dd423bdbc179c5d3b761f16006ab07c296f3580b03210a5241f9c86fe
SHA51251a57cba4595af553a56d0908dfeeaef68937bed5a01dd9b7c9232e2f4689f864903c4235a47ae7941570c575ad98ddbea1ce23c2190ad64b12f44eef2386871
-
Filesize
290KB
MD522c4da031e3b46301447bfe99949fb96
SHA1a3087f2c56911d4e6461fca9e4ab89294ffda15d
SHA2567b822e32b800a72330637409f9b2b56f6d7db418a6d3e7f6449cbeee2aa0f01f
SHA51298be5a1a3df54dbd6fe651e067755579c2c7484986dc31612e695dd75fe5fd3aadd7d38c7910d715b6b873cffad169a3ab89862cefd793a326ee91e9f585437a
-
Filesize
290KB
MD5874e5ce19dc9af56123b96cb0181c54c
SHA100f40da634bf74673a2429b7e9a66661a9499945
SHA256396978f7596c340852f468c513afb55ba5a1d6c56cdf190cfd1929592a8bb360
SHA512e1158cf27a29b8a05dd27a86bc70f881989bbbb19ee7cf1ed717136144603d619e0327b4ce4f7bd77fa99a0fc0cc895edf198130779d53aaeef6ed9255feb4e8
-
Filesize
291KB
MD5425a5f7b5571baf76d9e0c5e812c4577
SHA1ed0319cf01c3215e2b66834987ddd735d1a483a0
SHA2562c4d1d2a2aa7a19c0ecbddc1f02e1bc54a6744bbee97793b0f3fe5f47edcbfbb
SHA512d1b9dafac952e9524e304636de20d1edef2c7c7700ed229dc4326d52095d4fe83a2eb1b342f904e3f6fa61bda2730910b26629f34691cb61179d13f9a1c869d7
-
Filesize
291KB
MD576db34eb9e9de813cfd33bc7171014cb
SHA1770bf9daae028980eb45af321b44a732bf0546df
SHA256243226a199b087710f54cc8d74d3da74d1ce835fbcf4df5ee227d2256493da9f
SHA512fcf74fedd088c7c5858b191a1cc58840c8aa46f609a3a9711cbd8b438f88c11e1d077c43317c59d9eb4d8553474f27d769f300ada6de4b3f4648a866b225b9cf
-
Filesize
291KB
MD515dc7cb66c5d776c781d44a073bf4e6c
SHA176f47db051ad001d344ecc5ff2a9edebbd1d56dd
SHA2560fb970c740803c8a04481de35bdaaf0a0d5daf13d72874d5d7ea83e6db6b09a3
SHA5122735a31d5e06b39277d943a4bfed30988aacc86d65170ab4f1e1c8ec24935e4ad1f8fd9fa296db46e5b85f1d798a75183681ad60056922797a3d24792b444c5b
-
Filesize
291KB
MD524f5cf1d20817a67e6616d81158a724f
SHA146f2ef577cbcc14e262cca674acc051596de5cb4
SHA2569a613437b4099acb89fe35d61fd4ff1a8a69efcd32e96948440ad491f1968039
SHA5127760d03dd572c9bb885c682be6ef9fad59c557044b1a643ddeca50dbaa775aef51310c890696a0e0c147b8491c5abc9a94dd59384fc16a84896657fb12c9e117
-
Filesize
291KB
MD566a0d36a36f07c81dde2faf2b26a0a6a
SHA17dd388e811e208052bb418a720abdb21585b0f99
SHA2568f6e5c11ea80ae61acb73aad27e4b6528007f89a6527857d9ab48c3b5481a395
SHA512c8d0dc5c98c9a9a92ba71c3173ab5287ab68801600efe406ce5bf3a03443cb49e6078beac2e334398335a92791d62abaf2080f00f12d690db222030f751acfdb
-
Filesize
292KB
MD5374cb00ab0a938562c7da9b6b404b5bc
SHA1fac6c651032328142c297fc28021d39133283721
SHA2561045b9728d9165a3b6fce78ce59c41fbbf83b0a5fd48eb84d017a848964a35ca
SHA512e50116cee6efedead1550de35edef48eb8bc69779a29edeb9ec42f1a1bd1fad32a2ef63de36ddb37e9c2437fa1be95f5ffd14e454b8f5da89d4a738e039dbac5
-
Filesize
292KB
MD55895a5931e8b662dbda9f111562e8377
SHA1bd99270c672afde259c2dc614cef2dc99ff332fd
SHA25600da93e9aae1a91e80a2b29c44f0824ab16ce137b017824a965631c3b9ca7933
SHA5124ce7237819ae49b114369bae920df0e791fd5a6c57ef3aa50a8a6ee619b35475cfa98d4bf90e2f211489cb197f544caa36409d19c64d201a31265f57e80fc5d1
-
Filesize
292KB
MD58a8b7df690df62fdba884e6bfd5f8a6b
SHA11904016f2c891c0330f37ad045eab29d97cbe2a1
SHA256bfc90cecf05105e87306f258c18e1c481e1703a3f8740fcaeab2cfb3c3a641bc
SHA512f5d3a1c12888609d845d1f260d38804a4d286c6f149faa99b9ef9fc0bf9acc59497c005b5a3d8b06392f07cf6855462f3e0c01e821f15cd634d65977af311cce
-
Filesize
293KB
MD5873dc838fe480cf0f4fb2022c34f6fad
SHA12bdb2c1d19ba155c579d134493c613b0dabcccbb
SHA25667a0c355543abd3f007780098eb8c6f86b87783502fa2edb575ff9793071062d
SHA51267435c4476c839e085533f7acc630511b85f546493fc805be8f469f1944ae813c8f2661c9daf15f49f8f1ff61e72a3c4abce0179d1cd12a023607a63c2fee74b
-
Filesize
293KB
MD578f143f1f3d1915dc180f1685691e52b
SHA1ed836f3bea4e8126a9646f8b1a8e6dc3257fa4fa
SHA25654e73898ebc0d207c94da9101981f4f68dd42407b3ee4190d3bd14f35a51746f
SHA5129e997ebe1744959d5104106aa8f9a18a6c60db521494714e4d90cd1d0404b55e3bb98aaf70488edfca71c9935bd3894bdbed96f856e424b35248978f0ab8e9e9
-
Filesize
293KB
MD5ba8709280e2cf68395843f994f700f69
SHA11c4a0b75cf414f3f88bc3d7a0aa6b4b2f4341a46
SHA256f52835a122907273f2dc55f04c8f3b57d873aa15029c911128d5f156f7281ccf
SHA512623969816db106e2434dbcf241945156b34bf1be34fd44b49f4b825f579488cdaed9b8a72448582b9989591456747602b804636d4fb243635161002c86b74970
-
Filesize
294KB
MD5185d928cbff33884dd05103760a54d39
SHA1b804bdad267b3386ba2826efea4ae84fae7cd101
SHA25637af14ba84c24f1dc835922931457fb5cf27e0f57898e366f569f4ffd4752727
SHA51211d95b01dbc799468baa3dfccfb37c9b49b103d3834d00566e96037825a5240dd9e90d19935e7c617eb9706c50552e86f32cd5b9487f7f87a4f7acc7e451f0bd
-
Filesize
288KB
MD5130781029d209ae8c2e4d0008928c066
SHA1b42ee3d681e78ea6f2b0a07b50c47981e010cccc
SHA2567865b384d781b991732eb4f5b93185c4d395082ef10ccfb3c6c4b42936fe4bf8
SHA51236021821915c4196feeb2e31be88cf7759f045d26baa137b50db62b06918e3ab015ab87e933e7880c4a7d2825214e6fa622669a0269fc26a982199a7b3e07fcc
-
Filesize
288KB
MD56cea431f111ba6dede632b41c9004d9f
SHA13b8b54e27adab3a7851d000552e28c51b4d98c46
SHA256deaa793bce613937e6dd19d60e575bd644ab78af4127be8b29d489e13ff1cfb4
SHA5122fb69547023cf5b127a5e2e40a9f28c5640c869784242a6a1b5a341331467b417f953478d352bda709da9791eda9c647c86048dca645da1e49b991e92ea70d11
-
Filesize
289KB
MD5e7fb33eaec2416463ecd03a69f5eee94
SHA1489a56a6c97ba93b886504cfe69b6c4d9f9dc382
SHA2561cc884fa4f1a1cbec45c3ae4fc0dabe174fd7c8f6d23406150986dd2cb09e522
SHA512b01e56ccf413b46ec4500ac046213e3de38f83b672d39a506bfe27ed36143a63917c7e1481a199253f7514dd91d18f0d947866c472bee2cfc4a7b14c0ffe4c86
-
Filesize
290KB
MD58c97a8d8b1915fc65a126fa460d4bd0e
SHA1581c274c4bf67542c046ae3d631cb3c812e3e896
SHA256c2512b487ddb8e39e584cd107f6c3b5fde482071f3302861dbae8368b3aaca13
SHA512a697c07602dd98114b2edf3ae251d15ae714f1518861b0044536f1788756feebcfac3d4af4c321f187634763c42550ac0595bf707b70f0bbd1e3a42bd1d594fb
-
Filesize
290KB
MD56a5a827643a89ac21e1485d36ac3bae1
SHA1a9be204a7cc1a093d79e61bca78a4d64dceb6664
SHA2564422cb90cb8348e643d8ad69627192eba07d66ba853e1a9baf66815723f859e5
SHA51202fc7c190cdc579ea74fc87799499267dc871c51b2cdbaa4818027b7f6598320fd588a83f01ab17586a61f039dd78d64f04a94d79f8a542f3ea57b9b79e1792a
-
Filesize
292KB
MD57331325da5b3384aa2ebc636cef2dad1
SHA11c1ac35e7f43584c4c148b5ff7f2bf8a1b0db090
SHA256fac69352d753836969362d3a0f5f112d525b3b7e4444c2f63d6952eda85f360d
SHA5128b9b4b6f5178251af8cfb811bffeb65bea54e488ea73a637a0e21ab67d5548217c87bf27d1688d7de9b29d35fcfa914f83214ef433dd4785dc0396eb28bc0ee8
-
Filesize
293KB
MD54120d020b2257747e33216657da658b8
SHA1edb316c07a24f6eff19abdd659b57b2d2a67671f
SHA2567c5b6c716dd55ca53066cbc288239fac4fcd23d50138b5593d628c896a17d817
SHA512fca62c92094cc1a0a262e3aa54dbf742726fbab9d731e1e91ac0e613f81c5ec14f09a35e89283f397b26dee92966bc85be5435adee268da4c680f2627b228b73