Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 08:31
Static task
static1
Behavioral task
behavioral1
Sample
b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe
-
Size
4.1MB
-
MD5
b6c9cc6de33e5069f6bf72c955908590
-
SHA1
3b33c0d85a14936142109152ba28070c414071dd
-
SHA256
2860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872
-
SHA512
4a63747f2b16769de4177cc508d7e765bc5f773e734c1beb6da6e4b189605d900e3667581a2d3169c95ff926c334780f5a730d11a3cbb5de8ba91b426b5948bf
-
SSDEEP
98304:YoKALZtLSnhBaG13jSGzI9y04m/Xf7c/d7YDSGfJg5NEka2Q+gG:YC1IraEjIw04m/Xfo4a5yka2Q+gG
Malware Config
Signatures
-
Glupteba payload 14 IoCs
resource yara_rule behavioral2/memory/1448-2-0x0000000004CF0000-0x00000000055DB000-memory.dmp family_glupteba behavioral2/memory/1448-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1448-22-0x0000000000400000-0x0000000002B0B000-memory.dmp family_glupteba behavioral2/memory/1448-50-0x0000000004CF0000-0x00000000055DB000-memory.dmp family_glupteba behavioral2/memory/1448-49-0x0000000000400000-0x0000000002B0B000-memory.dmp family_glupteba behavioral2/memory/1448-59-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1448-60-0x0000000000400000-0x0000000002B0B000-memory.dmp family_glupteba behavioral2/memory/4188-90-0x0000000000400000-0x0000000002B0B000-memory.dmp family_glupteba behavioral2/memory/4188-136-0x0000000000400000-0x0000000002B0B000-memory.dmp family_glupteba behavioral2/memory/4188-142-0x0000000000400000-0x0000000002B0B000-memory.dmp family_glupteba behavioral2/memory/2396-170-0x0000000000400000-0x0000000002B0B000-memory.dmp family_glupteba behavioral2/memory/2396-197-0x0000000000400000-0x0000000002B0B000-memory.dmp family_glupteba behavioral2/memory/2396-224-0x0000000000400000-0x0000000002B0B000-memory.dmp family_glupteba behavioral2/memory/2396-234-0x0000000000400000-0x0000000002B0B000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3736 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2396 csrss.exe -
resource yara_rule behavioral2/files/0x0005000000000733-233.dat upx behavioral2/memory/368-235-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2116-238-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/368-239-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe File created C:\Windows\rss\csrss.exe b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2844 sc.exe -
pid Process 1384 powershell.exe 1204 powershell.exe 1800 powershell.exe 4512 powershell.exe 4504 powershell.exe 2632 powershell.exe 1720 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4400 schtasks.exe 4276 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4504 powershell.exe 4504 powershell.exe 4504 powershell.exe 1448 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 1448 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 2632 powershell.exe 2632 powershell.exe 2632 powershell.exe 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 1720 powershell.exe 1720 powershell.exe 1720 powershell.exe 1384 powershell.exe 1384 powershell.exe 1384 powershell.exe 1204 powershell.exe 1204 powershell.exe 1800 powershell.exe 1800 powershell.exe 4512 powershell.exe 4512 powershell.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4504 powershell.exe Token: SeDebugPrivilege 1448 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Token: SeImpersonatePrivilege 1448 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe Token: SeDebugPrivilege 2632 powershell.exe Token: SeDebugPrivilege 1720 powershell.exe Token: SeDebugPrivilege 1384 powershell.exe Token: SeDebugPrivilege 1204 powershell.exe Token: SeDebugPrivilege 1800 powershell.exe Token: SeDebugPrivilege 4512 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1448 wrote to memory of 4504 1448 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 98 PID 1448 wrote to memory of 4504 1448 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 98 PID 1448 wrote to memory of 4504 1448 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 98 PID 4188 wrote to memory of 2632 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 104 PID 4188 wrote to memory of 2632 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 104 PID 4188 wrote to memory of 2632 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 104 PID 4188 wrote to memory of 5028 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 106 PID 4188 wrote to memory of 5028 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 106 PID 5028 wrote to memory of 3736 5028 cmd.exe 108 PID 5028 wrote to memory of 3736 5028 cmd.exe 108 PID 4188 wrote to memory of 1720 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 109 PID 4188 wrote to memory of 1720 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 109 PID 4188 wrote to memory of 1720 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 109 PID 4188 wrote to memory of 1384 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 111 PID 4188 wrote to memory of 1384 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 111 PID 4188 wrote to memory of 1384 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 111 PID 4188 wrote to memory of 2396 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 113 PID 4188 wrote to memory of 2396 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 113 PID 4188 wrote to memory of 2396 4188 b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe 113 PID 2396 wrote to memory of 1204 2396 csrss.exe 114 PID 2396 wrote to memory of 1204 2396 csrss.exe 114 PID 2396 wrote to memory of 1204 2396 csrss.exe 114 PID 2396 wrote to memory of 1800 2396 csrss.exe 120 PID 2396 wrote to memory of 1800 2396 csrss.exe 120 PID 2396 wrote to memory of 1800 2396 csrss.exe 120 PID 2396 wrote to memory of 4512 2396 csrss.exe 122 PID 2396 wrote to memory of 4512 2396 csrss.exe 122 PID 2396 wrote to memory of 4512 2396 csrss.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b6c9cc6de33e5069f6bf72c955908590_NeikiAnalytics.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3736
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4400
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2128
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:3256
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4276
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:368
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:1956
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:2844
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:4404
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:2116
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a344f6356b6c5c77fcb1a7a1b3812d0f
SHA10c016d0f112852b1b49eb3701caf800cd8e3d4a5
SHA256ef37fda7c35ede97f43881123b88c38d528f8d9a01d3a13ca88201d040d06091
SHA512c2a2f48fb03c36cf300342e27cc7feaf0b579522dc63fc6464b91f1a2d3e22b4d6208e2be3ba42b916d819a25bd66e294ab09000c4e4cdb1ec66b1903ff72a25
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ad8dbb8bea900f1a4e8a7f33ef8c2107
SHA1890c79c858245a8819c6c84a657bc74f2e94e806
SHA2564b8b9e689d2b7268c36c2bf7a9337ebaf09d378eba3d91b7e917d1bb22ac64dc
SHA512c8b86d12e4608998bc639a744467e69f2b24c0b93625d646d21c4a74228f956b127c8af0ae5a9c02dbe2edd8518b1745c602c19e86a135c037f2c29466c0a742
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e16a44c34449d9f1c88676dc6f9e8605
SHA1602473e32d50d25df4b532520bb4031baced4eab
SHA256b8db806481723973c44f05b97decac4cc581033155133a2f8599c4d93ec5dc62
SHA5126310c7f02964cfdee6c68eeb420036339cfb95287d7bab8e3444979ed6d1c2d270afcd9fd86746692bef8c8f75e8e8d3325745a17ae2c309a18d128e37f63524
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD533579ae32904a36c8fa4f17441c25c89
SHA1c3b5839fd58a5adebbbf0b88c97f94f4b963e952
SHA256b1b92e688a6164758a99726e0fc5ff96c7d18fd1ad1c121503381b47c905711e
SHA5124ef054eb76257f89a716075656c5df43e6d2fac677273e2f728bf26b409fbf2907247cf75bc82eb620fd433223771178e3be978bbc6047cb1664a75109f9f6fa
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b78deeb82df468bb61d9e60ccabad77d
SHA1059e97481b79840bbbd455fb0c3460cdf75c0ebf
SHA256cd144bb3e8d11d56c50433f792d79b3867c8d0059ed8f0c3c7de26fbfd92e0e0
SHA512bbffb2dcfd8a66a4bed87646c8c4609d47adb18d3195136e66446ddd99d5cd6c975356dbb138eb834967b3f9af38d41012dbe8b4274a72482ffb27734056c433
-
Filesize
4.1MB
MD5b6c9cc6de33e5069f6bf72c955908590
SHA13b33c0d85a14936142109152ba28070c414071dd
SHA2562860b6d7bb3bce8421616938ce96c83c40408c3b0d4e3d3da61757367ecb0872
SHA5124a63747f2b16769de4177cc508d7e765bc5f773e734c1beb6da6e4b189605d900e3667581a2d3169c95ff926c334780f5a730d11a3cbb5de8ba91b426b5948bf
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec