Malware Analysis Report

2024-08-06 19:28

Sample ID 240514-lvh9gaah4v
Target c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics
SHA256 fd0de16979745282b54df24282645567605521e9f7dd0208e8156daaa0d951ec
Tags
upx darkcomet persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

fd0de16979745282b54df24282645567605521e9f7dd0208e8156daaa0d951ec

Threat Level: Known bad

The file c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics was found to be: Known bad.

Malicious Activity Summary

upx darkcomet persistence rat trojan

Darkcomet

Checks BIOS information in registry

Executes dropped EXE

Checks computer location settings

Loads dropped DLL

UPX packed file

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Checks processor information in registry

Enumerates system info in registry

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-14 09:51

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-14 09:51

Reported

2024-05-14 09:53

Platform

win7-20240221-en

Max time kernel

149s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe"

Signatures

Darkcomet

trojan rat darkcomet

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mcrosoft = "C:\\Users\\Admin\\AppData\\Roaming\\mcsft.exe" C:\Windows\SysWOW64\reg.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2260 set thread context of 2480 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2184 wrote to memory of 2112 N/A C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2184 wrote to memory of 2112 N/A C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2184 wrote to memory of 2112 N/A C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2184 wrote to memory of 2112 N/A C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2112 wrote to memory of 2636 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2112 wrote to memory of 2636 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2112 wrote to memory of 2636 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2112 wrote to memory of 2636 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2184 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2184 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2184 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2184 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2260 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2260 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2260 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2260 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2260 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2260 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2260 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2260 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2260 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\YdiQL.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\mcsft.exe" /f

C:\Users\Admin\AppData\Roaming\mcsft.exe

"C:\Users\Admin\AppData\Roaming\mcsft.exe"

C:\Users\Admin\AppData\Roaming\mcsft.exe

C:\Users\Admin\AppData\Roaming\mcsft.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 letsgoboom.no-ip.info udp

Files

memory/2184-0-0x0000000000400000-0x00000000007C8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\YdiQL.bat

MD5 a5feca573884d76f559b996d45e8ad9a
SHA1 0e81a993f3af4e31d60653dc2513186f0495f1c8
SHA256 c98e20d46d6465febb5d29cfab51241521ea5d6cd621f5e18b9b7d6fbfac3f0f
SHA512 a9239648b5f15eac4d4151b6e1bdc81065eeaeb101404c2a0126f03bc87f1e6a57206bfa07a44379e9d3bba889e4497a9991ff41fb109099b01512df3dc3cbda

C:\Users\Admin\AppData\Roaming\mcsft.exe

MD5 240ec0331dacee755a71d4419399e4f3
SHA1 22b490f54b308f5e44f95a868b2cc45815653899
SHA256 2a9a4241bef5151add8d337f113d915b54ede045bd09105a3c34548bb92e79b5
SHA512 a87762ee3389996da345c8298c3749f7f77a7dbefcd0aeb71c1cdff707f130644c4defb51a279bf2950e812bda549dd58364bf43f4656f7ceec711f4120b1679

memory/2184-44-0x00000000039C0000-0x0000000003D88000-memory.dmp

memory/2184-43-0x00000000039C0000-0x0000000003D88000-memory.dmp

memory/2184-42-0x00000000039C0000-0x0000000003D88000-memory.dmp

memory/2260-46-0x0000000000400000-0x00000000007C8000-memory.dmp

memory/2184-48-0x0000000000400000-0x00000000007C8000-memory.dmp

memory/2480-52-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-55-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-56-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2260-57-0x0000000000400000-0x00000000007C8000-memory.dmp

memory/2480-58-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-59-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-60-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-61-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-63-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-64-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-62-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-65-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-66-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-67-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-68-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-69-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-70-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-71-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-72-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-73-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-74-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-75-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-76-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-77-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-78-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2480-79-0x0000000000400000-0x00000000004B5000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-14 09:51

Reported

2024-05-14 09:53

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe"

Signatures

Darkcomet

trojan rat darkcomet

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mcrosoft = "C:\\Users\\Admin\\AppData\\Roaming\\mcsft.exe" C:\Windows\SysWOW64\reg.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4088 set thread context of 2520 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1560 wrote to memory of 3248 N/A C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 1560 wrote to memory of 3248 N/A C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 1560 wrote to memory of 3248 N/A C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 3248 wrote to memory of 1896 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3248 wrote to memory of 1896 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3248 wrote to memory of 1896 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1560 wrote to memory of 4088 N/A C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1560 wrote to memory of 4088 N/A C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1560 wrote to memory of 4088 N/A C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 4088 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 4088 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 4088 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 4088 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 4088 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 4088 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 4088 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 4088 wrote to memory of 2520 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\c1b79937ec2f95f5e68cc2145cd2d950_NeikiAnalytics.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MkXGs.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\mcsft.exe" /f

C:\Users\Admin\AppData\Roaming\mcsft.exe

"C:\Users\Admin\AppData\Roaming\mcsft.exe"

C:\Users\Admin\AppData\Roaming\mcsft.exe

C:\Users\Admin\AppData\Roaming\mcsft.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
NL 23.62.61.137:443 www.bing.com tcp
US 8.8.8.8:53 137.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 101.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp

Files

memory/1560-0-0x0000000000400000-0x00000000007C8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\MkXGs.txt

MD5 a5feca573884d76f559b996d45e8ad9a
SHA1 0e81a993f3af4e31d60653dc2513186f0495f1c8
SHA256 c98e20d46d6465febb5d29cfab51241521ea5d6cd621f5e18b9b7d6fbfac3f0f
SHA512 a9239648b5f15eac4d4151b6e1bdc81065eeaeb101404c2a0126f03bc87f1e6a57206bfa07a44379e9d3bba889e4497a9991ff41fb109099b01512df3dc3cbda

C:\Users\Admin\AppData\Roaming\mcsft.txt

MD5 f4476d1a0d4e2006d6c6b1701912fc14
SHA1 493a325486f0afad76fd2efe81da9984179dd930
SHA256 8b5a26a50d7fe43ea2aa3b86cc20589425fbc50f4bafd69967047a6e78e9f593
SHA512 69849dece1700990a02f751410401d81e35a2b161082fa1719419d9f0e8cf25d40b01825a022ba2ee98f25435224e61f6713a378b6586f609e0e8d3e7681e296

memory/1560-29-0x0000000000400000-0x00000000007C8000-memory.dmp

memory/2520-32-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-34-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-37-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4088-36-0x0000000000400000-0x00000000007C8000-memory.dmp

memory/2520-38-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-39-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-40-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-44-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-43-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-42-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-41-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-45-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-46-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-47-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-48-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-49-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-50-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-51-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-52-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-53-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-54-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-55-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-56-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-57-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-58-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-59-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2520-60-0x0000000000400000-0x00000000004B5000-memory.dmp