Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 01:17
Behavioral task
behavioral1
Sample
57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe
-
Size
2.7MB
-
MD5
57a247f9f8794206cc585e249c645a30
-
SHA1
62181064bcea86150b2bc7c800c026b3e8054aa3
-
SHA256
b0b428f37e12d95bc74fb16db83d51c3f16f4cf5121061a1b4b84fd1e13180e2
-
SHA512
f0fb8bdebce741d8aeee50243899d5f2e4c5bc4be16d7a2c40fa5400deec37945382ea34ed888c8920461ce42a1f50e55e57b28e9132e76b7267ea36945ca3da
-
SSDEEP
49152:qH64y2XDuLlIY14o9/yDzr1xJ8XbRrC9mWvR08Yv7yP3GcY:qHfE5Ad8Xd295UmGc
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies WinLogon for persistence 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\services.exe\", \"C:\\Program Files\\Windows Portable Devices\\services.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\services.exe\", \"C:\\Program Files\\Windows Portable Devices\\services.exe\", \"C:\\Program Files\\Windows Media Player\\Media Renderer\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Users\\Admin\\Cookies\\SppExtComObj.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\taskhostw.exe\", \"C:\\Users\\All Users\\Application Data\\services.exe\", \"C:\\Program Files\\dotnet\\SppExtComObj.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fontdrvhost.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\services.exe\", \"C:\\Program Files\\Windows Portable Devices\\services.exe\", \"C:\\Program Files\\Windows Media Player\\Media Renderer\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Users\\Admin\\Cookies\\SppExtComObj.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\taskhostw.exe\", \"C:\\Users\\All Users\\Application Data\\services.exe\", \"C:\\Program Files\\dotnet\\SppExtComObj.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fontdrvhost.exe\", \"C:\\Program Files\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\OfficeClickToRun.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\services.exe\", \"C:\\Program Files\\Windows Portable Devices\\services.exe\", \"C:\\Program Files\\Windows Media Player\\Media Renderer\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Users\\Admin\\Cookies\\SppExtComObj.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\taskhostw.exe\", \"C:\\Users\\All Users\\Application Data\\services.exe\", \"C:\\Program Files\\dotnet\\SppExtComObj.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fontdrvhost.exe\", \"C:\\Program Files\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Windows Media Player\\spoolsv.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\services.exe\", \"C:\\Program Files\\Windows Portable Devices\\services.exe\", \"C:\\Program Files\\Windows Media Player\\Media Renderer\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\services.exe\", \"C:\\Program Files\\Windows Portable Devices\\services.exe\", \"C:\\Program Files\\Windows Media Player\\Media Renderer\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Users\\Admin\\Cookies\\SppExtComObj.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\taskhostw.exe\", \"C:\\Users\\All Users\\Application Data\\services.exe\", \"C:\\Program Files\\dotnet\\SppExtComObj.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fontdrvhost.exe\", \"C:\\Program Files\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Windows Media Player\\spoolsv.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Esl\\StartMenuExperienceHost.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\services.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\services.exe\", \"C:\\Program Files\\Windows Portable Devices\\services.exe\", \"C:\\Program Files\\Windows Media Player\\Media Renderer\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Users\\Admin\\Cookies\\SppExtComObj.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\services.exe\", \"C:\\Program Files\\Windows Portable Devices\\services.exe\", \"C:\\Program Files\\Windows Media Player\\Media Renderer\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Users\\Admin\\Cookies\\SppExtComObj.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\taskhostw.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\services.exe\", \"C:\\Program Files\\Windows Portable Devices\\services.exe\", \"C:\\Program Files\\Windows Media Player\\Media Renderer\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Users\\Admin\\Cookies\\SppExtComObj.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\taskhostw.exe\", \"C:\\Users\\All Users\\Application Data\\services.exe\", \"C:\\Program Files\\dotnet\\SppExtComObj.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\services.exe\", \"C:\\Program Files\\Windows Portable Devices\\services.exe\", \"C:\\Program Files\\Windows Media Player\\Media Renderer\\sppsvc.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\services.exe\", \"C:\\Program Files\\Windows Portable Devices\\services.exe\", \"C:\\Program Files\\Windows Media Player\\Media Renderer\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Users\\Admin\\Cookies\\SppExtComObj.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\taskhostw.exe\", \"C:\\Users\\All Users\\Application Data\\services.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\services.exe\", \"C:\\Program Files\\Windows Portable Devices\\services.exe\", \"C:\\Program Files\\Windows Media Player\\Media Renderer\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Users\\Admin\\Cookies\\SppExtComObj.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\taskhostw.exe\", \"C:\\Users\\All Users\\Application Data\\services.exe\", \"C:\\Program Files\\dotnet\\SppExtComObj.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fontdrvhost.exe\", \"C:\\Program Files\\Windows Portable Devices\\winlogon.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Recovery\\WindowsRE\\sysmon.exe\", \"C:\\Program Files\\Google\\services.exe\", \"C:\\Program Files\\Windows Portable Devices\\services.exe\", \"C:\\Program Files\\Windows Media Player\\Media Renderer\\sppsvc.exe\", \"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\", \"C:\\Users\\Admin\\Cookies\\SppExtComObj.exe\", \"C:\\Program Files\\VideoLAN\\VLC\\taskhostw.exe\", \"C:\\Users\\All Users\\Application Data\\services.exe\", \"C:\\Program Files\\dotnet\\SppExtComObj.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fontdrvhost.exe\", \"C:\\Program Files\\Windows Portable Devices\\winlogon.exe\", \"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\OfficeClickToRun.exe\", \"C:\\Program Files (x86)\\Windows Media Player\\spoolsv.exe\", \"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Esl\\StartMenuExperienceHost.exe\", \"C:\\Recovery\\WindowsRE\\explorer.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe -
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1232 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3572 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4524 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 432 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1584 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3496 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4680 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4312 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 652 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1904 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5044 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4844 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2444 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2156 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1444 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 368 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4720 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4180 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4008 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3208 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4360 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2520 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3852 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3740 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3752 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2360 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4632 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2732 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 408 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 888 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 220 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5020 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2284 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2744 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3400 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 380 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2804 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2184 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1848 1624 schtasks.exe 85 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2492 1624 schtasks.exe 85 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe -
resource yara_rule behavioral2/memory/2928-1-0x00000000005A0000-0x0000000000860000-memory.dmp dcrat behavioral2/files/0x0007000000023416-37.dat dcrat behavioral2/files/0x000800000002341a-108.dat dcrat behavioral2/files/0x0009000000023393-181.dat dcrat behavioral2/memory/1444-183-0x0000000000B40000-0x0000000000E00000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2588 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 1444 winlogon.exe -
Adds Run key to start application 2 TTPs 30 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Program Files\\dotnet\\SppExtComObj.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\OfficeClickToRun.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Esl\\StartMenuExperienceHost.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Program Files\\Google\\services.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\Windows Media Player\\Media Renderer\\sppsvc.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Users\\Admin\\Cookies\\SppExtComObj.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Program Files\\dotnet\\SppExtComObj.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Users\\All Users\\Application Data\\services.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files\\Windows Portable Devices\\winlogon.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files (x86)\\Windows Media Player\\spoolsv.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Recovery\\WindowsRE\\explorer.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Recovery\\WindowsRE\\sysmon.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Program Files\\Windows Media Player\\Media Renderer\\sppsvc.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Program Files\\VideoLAN\\VLC\\taskhostw.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Program Files\\VideoLAN\\VLC\\taskhostw.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Users\\All Users\\Application Data\\services.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\OfficeClickToRun.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Recovery\\WindowsRE\\sysmon.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Program Files\\Google\\services.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Users\\Admin\\Cookies\\SppExtComObj.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Program Files (x86)\\Windows Media Player\\spoolsv.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Program Files\\Windows Portable Devices\\services.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Program Files\\Windows Portable Devices\\services.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Windows Mail\\fontdrvhost.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Esl\\StartMenuExperienceHost.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Recovery\\WindowsRE\\explorer.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Recovery\\WindowsRE\\backgroundTaskHost.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Windows Mail\\fontdrvhost.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Program Files\\Windows Portable Devices\\winlogon.exe\"" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe -
Drops file in Program Files directory 40 IoCs
description ioc Process File created C:\Program Files\Windows Portable Devices\services.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files\VideoLAN\VLC\ea9f0e6c9e2dcd 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\e6c9b481da804f 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files\Windows Portable Devices\c5b4cb5e9653cc 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files\dotnet\e1ef82546f0b02 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files\Windows Portable Devices\winlogon.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files\Windows Portable Devices\cc11b995f2a76d 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\RCX51AE.tmp 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files\Google\services.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files\dotnet\SppExtComObj.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files\Windows Portable Devices\RCX6145.tmp 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\OfficeClickToRun.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\StartMenuExperienceHost.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RCX684D.tmp 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files\Google\c5b4cb5e9653cc 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files\VideoLAN\VLC\taskhostw.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files (x86)\Windows Mail\5b884080fd4f94 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files\Windows Portable Devices\services.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Windows Mail\fontdrvhost.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Windows Media Player\spoolsv.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files\Windows Portable Devices\RCX4FA9.tmp 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\sppsvc.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files\Windows Portable Devices\winlogon.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files\dotnet\RCX5CBF.tmp 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\RCX63C7.tmp 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files\Google\services.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files\Windows Media Player\Media Renderer\sppsvc.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files\dotnet\SppExtComObj.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files (x86)\Windows Media Player\f3b6ecef712a24 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\55b276f4edf653 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files\VideoLAN\VLC\RCX5839.tmp 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Windows Media Player\RCX6649.tmp 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files\VideoLAN\VLC\taskhostw.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files\Windows Media Player\Media Renderer\0a1fd5f707cd16 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files (x86)\Windows Mail\fontdrvhost.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\OfficeClickToRun.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files (x86)\Windows Media Player\spoolsv.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\StartMenuExperienceHost.exe 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files\Google\RCX4D76.tmp 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Windows Mail\RCX5EC4.tmp 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3752 schtasks.exe 4312 schtasks.exe 3852 schtasks.exe 2732 schtasks.exe 3400 schtasks.exe 652 schtasks.exe 2520 schtasks.exe 4680 schtasks.exe 5044 schtasks.exe 2440 schtasks.exe 4360 schtasks.exe 408 schtasks.exe 3496 schtasks.exe 1148 schtasks.exe 1444 schtasks.exe 3740 schtasks.exe 2744 schtasks.exe 2804 schtasks.exe 1848 schtasks.exe 1904 schtasks.exe 2156 schtasks.exe 2672 schtasks.exe 2136 schtasks.exe 4008 schtasks.exe 4720 schtasks.exe 3208 schtasks.exe 4632 schtasks.exe 888 schtasks.exe 2284 schtasks.exe 380 schtasks.exe 3572 schtasks.exe 4524 schtasks.exe 2184 schtasks.exe 5020 schtasks.exe 368 schtasks.exe 2360 schtasks.exe 1584 schtasks.exe 1700 schtasks.exe 4844 schtasks.exe 2444 schtasks.exe 4180 schtasks.exe 220 schtasks.exe 1232 schtasks.exe 432 schtasks.exe 2492 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 2588 powershell.exe 2588 powershell.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe 1444 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 1444 winlogon.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2588 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 133 PID 2928 wrote to memory of 2588 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 133 PID 2928 wrote to memory of 1904 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 135 PID 2928 wrote to memory of 1904 2928 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe 135 PID 1904 wrote to memory of 2444 1904 cmd.exe 137 PID 1904 wrote to memory of 2444 1904 cmd.exe 137 PID 1904 wrote to memory of 1444 1904 cmd.exe 138 PID 1904 wrote to memory of 1444 1904 cmd.exe 138 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" winlogon.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\57a247f9f8794206cc585e249c645a30_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2928 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wYX5El6vYF.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2444
-
-
C:\Program Files\Windows Portable Devices\winlogon.exe"C:\Program Files\Windows Portable Devices\winlogon.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1444
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Program Files\Google\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Google\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Program Files\Google\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Portable Devices\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Portable Devices\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Media Player\Media Renderer\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\Media Renderer\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Media Player\Media Renderer\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4844
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\Cookies\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Admin\Cookies\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Cookies\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 8 /tr "'C:\Program Files\VideoLAN\VLC\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\Program Files\VideoLAN\VLC\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Application Data\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\All Users\Application Data\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Application Data\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 7 /tr "'C:\Program Files\dotnet\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files\dotnet\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\Program Files\dotnet\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Mail\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Mail\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Portable Devices\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Portable Devices\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Media Player\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Media Player\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\StartMenuExperienceHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3400
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2492
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5b89e7dee183931b0505775b76e8414e1
SHA12755d7240e3cb5530ae8f119e4811a60528f2d42
SHA256d3592c4629890388ddd2243bdb14dcad8f7d409075d0fcf422b091de24673bf9
SHA5126d253fc961ca46035772c8796424c373391c095be10f9c54bcbfc9c5b9bd20bfafff51713bcaa87692f7cbede3566010721e9b7d8c4fc56ef10a2ac276be20df
-
Filesize
2.7MB
MD5e147292cc17642d7cc7a9666a57c4eef
SHA17b83b0cd8aa1969465881f6c7faf5426c64e2ac0
SHA256a489e5bd2054857ac8fa3bb874d6e59130c34317713a4a8cf3793d5ce6dec0b2
SHA5128693639bd7e4f41aba578d1a661b650108f1f4c87d74accb1a87cca7dbf06bd410141b32c1d689d567119651416d40d2fe183f9e0a3f3bf8ba589ef53b5e2ada
-
Filesize
2.7MB
MD557a247f9f8794206cc585e249c645a30
SHA162181064bcea86150b2bc7c800c026b3e8054aa3
SHA256b0b428f37e12d95bc74fb16db83d51c3f16f4cf5121061a1b4b84fd1e13180e2
SHA512f0fb8bdebce741d8aeee50243899d5f2e4c5bc4be16d7a2c40fa5400deec37945382ea34ed888c8920461ce42a1f50e55e57b28e9132e76b7267ea36945ca3da
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
219B
MD5b269dc32ea3ef55eaeae55361dcc6a6f
SHA1994fd368c49b538f48a26b8852893f5eaa913026
SHA256cf703e48081d799671f4d95e804d72c196d689624e2540e896e904e3abc7475a
SHA512b36cc0a275dc4aedd1ea38dd97597de67fb072a08fa5fb6482ed11e3229cd5ef1ac160bbe56286d94249a814c7bc493747444678166356910187536ceb0abfb4