Malware Analysis Report

2024-08-06 19:29

Sample ID 240512-f8kfssah5x
Target 710df045be4b3c20897855d6d18322e0_NeikiAnalytics
SHA256 bc8da42f92d2a29fd7e3a9b8dc1ef9c39fadeca1580de5aa539c341d5f68ec25
Tags
darkcomet persistence rat trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

bc8da42f92d2a29fd7e3a9b8dc1ef9c39fadeca1580de5aa539c341d5f68ec25

Threat Level: Known bad

The file 710df045be4b3c20897855d6d18322e0_NeikiAnalytics was found to be: Known bad.

Malicious Activity Summary

darkcomet persistence rat trojan upx

Darkcomet

Loads dropped DLL

Executes dropped EXE

Checks BIOS information in registry

UPX packed file

Checks computer location settings

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Checks processor information in registry

Enumerates system info in registry

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-12 05:32

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-12 05:32

Reported

2024-05-12 05:35

Platform

win10v2004-20240508-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe"

Signatures

Darkcomet

trojan rat darkcomet

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mcrosoft = "C:\\Users\\Admin\\AppData\\Roaming\\mcsft.exe" C:\Windows\SysWOW64\reg.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1924 set thread context of 2168 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1836 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 1836 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 1836 wrote to memory of 5096 N/A C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 5096 wrote to memory of 5028 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 5096 wrote to memory of 5028 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 5096 wrote to memory of 5028 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1836 wrote to memory of 1924 N/A C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1836 wrote to memory of 1924 N/A C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1836 wrote to memory of 1924 N/A C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1924 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1924 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1924 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1924 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1924 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1924 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1924 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1924 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe

Processes

C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\suyqZ.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\mcsft.exe" /f

C:\Users\Admin\AppData\Roaming\mcsft.exe

"C:\Users\Admin\AppData\Roaming\mcsft.exe"

C:\Users\Admin\AppData\Roaming\mcsft.exe

C:\Users\Admin\AppData\Roaming\mcsft.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 ygo.no-ip.info udp
ES 94.73.33.36:1604 ygo.no-ip.info tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
ES 94.73.33.36:1604 ygo.no-ip.info tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 98.58.20.217.in-addr.arpa udp
ES 94.73.33.36:1604 ygo.no-ip.info tcp
US 8.8.8.8:53 ygo.no-ip.info udp
ES 94.73.33.36:1604 ygo.no-ip.info tcp
ES 94.73.33.36:1604 ygo.no-ip.info tcp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
ES 94.73.33.36:1604 ygo.no-ip.info tcp
US 8.8.8.8:53 ygo.no-ip.info udp
ES 94.73.33.36:1604 ygo.no-ip.info tcp
US 8.8.8.8:53 130.109.69.13.in-addr.arpa udp

Files

memory/1836-0-0x0000000000400000-0x00000000007C4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\suyqZ.txt

MD5 a5feca573884d76f559b996d45e8ad9a
SHA1 0e81a993f3af4e31d60653dc2513186f0495f1c8
SHA256 c98e20d46d6465febb5d29cfab51241521ea5d6cd621f5e18b9b7d6fbfac3f0f
SHA512 a9239648b5f15eac4d4151b6e1bdc81065eeaeb101404c2a0126f03bc87f1e6a57206bfa07a44379e9d3bba889e4497a9991ff41fb109099b01512df3dc3cbda

C:\Users\Admin\AppData\Roaming\mcsft.txt

MD5 09061ac018edadea1c2c331a83cb5179
SHA1 fedf3555fe3c90d01bc639e1b189f7ea0fb5ba0e
SHA256 8d74aee38daf36f1ea428abc7b0a0106b00f89ba3f28215ee47c5817f8aa2124
SHA512 18f6a80841c11300c71f9f4e40a9f4404b4d5a3fae47d3cca346d892d66d640046de05a13af347416637b992ab1535e7b4e04ba0641f12362d9e384fa060bac4

memory/2168-31-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-34-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-35-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-36-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-37-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-41-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-39-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-38-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-40-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-42-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-44-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-46-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-48-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-50-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-52-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2168-54-0x0000000000400000-0x00000000004B5000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-12 05:32

Reported

2024-05-12 05:35

Platform

win7-20240419-en

Max time kernel

142s

Max time network

141s

Command Line

"C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe"

Signatures

Darkcomet

trojan rat darkcomet

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mcrosoft = "C:\\Users\\Admin\\AppData\\Roaming\\mcsft.exe" C:\Windows\SysWOW64\reg.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1808 set thread context of 2720 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2100 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2100 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2100 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2100 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2900 wrote to memory of 2844 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2900 wrote to memory of 2844 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2900 wrote to memory of 2844 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2900 wrote to memory of 2844 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2100 wrote to memory of 1808 N/A C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2100 wrote to memory of 1808 N/A C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2100 wrote to memory of 1808 N/A C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2100 wrote to memory of 1808 N/A C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1808 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1808 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1808 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1808 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1808 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1808 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1808 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1808 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1808 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe

Processes

C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\710df045be4b3c20897855d6d18322e0_NeikiAnalytics.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\kqVaE.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\mcsft.exe" /f

C:\Users\Admin\AppData\Roaming\mcsft.exe

"C:\Users\Admin\AppData\Roaming\mcsft.exe"

C:\Users\Admin\AppData\Roaming\mcsft.exe

C:\Users\Admin\AppData\Roaming\mcsft.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 ygo.no-ip.info udp
ES 94.73.33.36:1604 ygo.no-ip.info tcp
ES 94.73.33.36:1604 ygo.no-ip.info tcp
ES 94.73.33.36:1604 ygo.no-ip.info tcp
US 8.8.8.8:53 ygo.no-ip.info udp
ES 94.73.33.36:1604 ygo.no-ip.info tcp
ES 94.73.33.36:1604 ygo.no-ip.info tcp
ES 94.73.33.36:1604 ygo.no-ip.info tcp
US 8.8.8.8:53 ygo.no-ip.info udp
ES 94.73.33.36:1604 ygo.no-ip.info tcp

Files

memory/2100-0-0x0000000000400000-0x00000000007C4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\kqVaE.bat

MD5 a5feca573884d76f559b996d45e8ad9a
SHA1 0e81a993f3af4e31d60653dc2513186f0495f1c8
SHA256 c98e20d46d6465febb5d29cfab51241521ea5d6cd621f5e18b9b7d6fbfac3f0f
SHA512 a9239648b5f15eac4d4151b6e1bdc81065eeaeb101404c2a0126f03bc87f1e6a57206bfa07a44379e9d3bba889e4497a9991ff41fb109099b01512df3dc3cbda

C:\Users\Admin\AppData\Roaming\mcsft.exe

MD5 c96568b818553fcbd1dc46c2f9130516
SHA1 2568b3f9c3b7a2af01f240ab219d05324ea03cf8
SHA256 509e1abb767caeb6c316db99e86eb02e10bc4f1fa1e85e1e15da04144e5f29d4
SHA512 b64dda1e2fb22aa3c66b5c0a6a137d6370cee4c5ee204c0f102beaef1708c1905c6342d363f302a493d28a4722e07848f07ccb89c1c8694f93c84cfb43d5c0db

memory/2720-51-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-50-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-48-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-52-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-53-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-55-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-54-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-56-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-58-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-57-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-59-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-61-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-64-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-66-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-68-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-70-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2720-72-0x0000000000400000-0x00000000004B5000-memory.dmp