Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe
-
Size
191KB
-
MD5
2fe1f7f7483896f0544b19dfe7969490
-
SHA1
a2e8211d41017453a6e7623af36d26019692d402
-
SHA256
b186f549a48bf83d51b27e3ca265d31f6a46a4e1d91a0cac0b5bc867c06e39bb
-
SHA512
e23f44e8b6f73f0acbe86b87039c8ef86bb118d7ca3402f4494ace74d520c5ffc9de3059f9494e324cac980b3162f87cdce6dbae2dc38044475cdacecb2b85cb
-
SSDEEP
3072:2AKEsYqqjfipJWYpWJZfGXFxUYyaJC6sOMD5Qjj9jRMKSlJ8subptbbG+X:NKE+qjfipJWYpWJZfGXFRJJRsOM9+j5L
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4760 ntuser.exe 1096 ntuser.exe 1716 ntuser.exe 2380 ntuser.exe 1468 ntuser.exe 3676 ntuser.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe File opened (read-only) \??\T: ntuser.exe File opened (read-only) \??\G: ntuser.exe File opened (read-only) \??\N: ntuser.exe File opened (read-only) \??\X: ntuser.exe File opened (read-only) \??\I: ntuser.exe File opened (read-only) \??\A: 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe File opened (read-only) \??\R: ntuser.exe File opened (read-only) \??\a: ntuser.exe File opened (read-only) \??\B: ntuser.exe File opened (read-only) \??\R: ntuser.exe File opened (read-only) \??\a: ntuser.exe File opened (read-only) \??\m: ntuser.exe File opened (read-only) \??\W: ntuser.exe File opened (read-only) \??\k: ntuser.exe File opened (read-only) \??\u: ntuser.exe File opened (read-only) \??\L: ntuser.exe File opened (read-only) \??\H: ntuser.exe File opened (read-only) \??\L: ntuser.exe File opened (read-only) \??\r: ntuser.exe File opened (read-only) \??\U: 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe File opened (read-only) \??\a: ntuser.exe File opened (read-only) \??\I: ntuser.exe File opened (read-only) \??\N: ntuser.exe File opened (read-only) \??\k: ntuser.exe File opened (read-only) \??\S: ntuser.exe File opened (read-only) \??\W: ntuser.exe File opened (read-only) \??\G: ntuser.exe File opened (read-only) \??\k: ntuser.exe File opened (read-only) \??\S: 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe File opened (read-only) \??\Y: ntuser.exe File opened (read-only) \??\x: ntuser.exe File opened (read-only) \??\G: ntuser.exe File opened (read-only) \??\A: ntuser.exe File opened (read-only) \??\J: ntuser.exe File opened (read-only) \??\h: ntuser.exe File opened (read-only) \??\m: ntuser.exe File opened (read-only) \??\r: ntuser.exe File opened (read-only) \??\E: 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe File opened (read-only) \??\V: ntuser.exe File opened (read-only) \??\S: ntuser.exe File opened (read-only) \??\l: ntuser.exe File opened (read-only) \??\n: ntuser.exe File opened (read-only) \??\P: ntuser.exe File opened (read-only) \??\L: ntuser.exe File opened (read-only) \??\R: ntuser.exe File opened (read-only) \??\T: ntuser.exe File opened (read-only) \??\q: ntuser.exe File opened (read-only) \??\K: ntuser.exe File opened (read-only) \??\I: ntuser.exe File opened (read-only) \??\Y: ntuser.exe File opened (read-only) \??\p: ntuser.exe File opened (read-only) \??\G: 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe File opened (read-only) \??\A: ntuser.exe File opened (read-only) \??\A: ntuser.exe File opened (read-only) \??\J: ntuser.exe File opened (read-only) \??\t: ntuser.exe File opened (read-only) \??\T: ntuser.exe File opened (read-only) \??\L: ntuser.exe File opened (read-only) \??\l: ntuser.exe File opened (read-only) \??\r: ntuser.exe File opened (read-only) \??\y: ntuser.exe File opened (read-only) \??\U: ntuser.exe File opened (read-only) \??\S: ntuser.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 icanhazip.com -
Maps connected drives based on registry 3 TTPs 14 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ntuser.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ntuser.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ntuser.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ntuser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum ntuser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum ntuser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum ntuser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum ntuser.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ntuser.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum ntuser.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ntuser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum ntuser.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 ntuser.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE ntuser.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies ntuser.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 ntuser.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\46HQ0BCO.txt ntuser.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" ntuser.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ntuser.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings ntuser.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" ntuser.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ntuser.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ntuser.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ntuser.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ntuser.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix ntuser.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History ntuser.exe Key created \REGISTRY\USER\.DEFAULT\Software ntuser.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows ntuser.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft ntuser.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion ntuser.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P ntuser.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\stat32\DefaultIcon ntuser.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\shell\open\command ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" ntuser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\stat32\shell\open\command ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\stat32\shell\runas\command\IsolatedCommand = "\"%1\" %*" ntuser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\Content-Type = "application/x-msdownload" 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\stat32 ntuser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\stat32\Content-Type = "application/x-msdownload" 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\stat32\shell\runas\command\IsolatedCommand = "\"%1\" %*" ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\stat32\shell\runas\command\ = "\"%1\" %*" ntuser.exe Key created \REGISTRY\MACHINE\Software\Classes\.exe 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\shell\open 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\stat32\DefaultIcon\ = "%1" ntuser.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\DefaultIcon ntuser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\stat32\shell\open\command\ = "\"C:\\ProgramData\\UserRuntime\\ntuser.exe\" /START \"%1\" %*" ntuser.exe Key created \REGISTRY\MACHINE\Software\Classes\.exe\shell\open\command ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\stat32\shell\runas\command\ = "\"%1\" %*" ntuser.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\stat32\shell\runas\command ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\Content-Type = "application/x-msdownload" ntuser.exe Key created \REGISTRY\MACHINE\Software\Classes\.exe\shell\runas\command ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\stat32\shell\open\command\IsolatedCommand = "\"%1\" %*" ntuser.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\stat32\shell\runas ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\DefaultIcon\ = "%1" ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\ = "stat32" ntuser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\shell\runas\command 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "stat32" 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\Classes\.exe\shell\open\command 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\stat32\DefaultIcon ntuser.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\shell\runas\command ntuser.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\shell\runas\command ntuser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\stat32\ = "Application" 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\DefaultIcon\ = "%1" 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\shell\open\command\ = "\"C:\\ProgramData\\UserRuntime\\ntuser.exe\" /START \"%1\" %*" 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "stat32" ntuser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\Content-Type = "application/x-msdownload" ntuser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" ntuser.exe Key created \REGISTRY\MACHINE\Software\Classes\.exe\DefaultIcon ntuser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\shell\open\command 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\stat32\shell\open\command\ = "\"C:\\ProgramData\\UserRuntime\\ntuser.exe\" /START \"%1\" %*" 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\stat32\shell\runas\command 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\Classes\stat32\shell\open\command ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\stat32\ = "Application" ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\UserRuntime\\ntuser.exe\" 1 /START \"%1\" %*" ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" ntuser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\stat32\DefaultIcon\ = "%1" 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\stat32\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\UserRuntime\\ntuser.exe\" 1 /START \"%1\" %*" ntuser.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\shell ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\UserRuntime\\ntuser.exe\" 1 /START \"%1\" %*" ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\ = "stat32" ntuser.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\shell\open ntuser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\shell\open\command\ = "\"C:\\ProgramData\\UserRuntime\\ntuser.exe\" /START \"%1\" %*" ntuser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\shell\runas\command\ = "\"%1\" %*" ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\stat32\Content-Type = "application/x-msdownload" ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\stat32\DefaultIcon\ = "%1" ntuser.exe Key created \REGISTRY\MACHINE\Software\Classes\stat32\DefaultIcon 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe ntuser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\stat32\shell\open 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\stat32\shell\runas\command\ = "\"%1\" %*" ntuser.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" ntuser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\stat32\shell\open\command 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2380 ntuser.exe 2380 ntuser.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4084 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Token: SeIncBasePriorityPrivilege 4084 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe Token: SeIncBasePriorityPrivilege 1096 ntuser.exe Token: SeIncBasePriorityPrivilege 4760 ntuser.exe Token: SeIncBasePriorityPrivilege 1468 ntuser.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2380 ntuser.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4760 4084 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe 83 PID 4084 wrote to memory of 4760 4084 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe 83 PID 4084 wrote to memory of 4760 4084 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe 83 PID 4084 wrote to memory of 1096 4084 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe 84 PID 4084 wrote to memory of 1096 4084 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe 84 PID 4084 wrote to memory of 1096 4084 2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe 84 PID 1096 wrote to memory of 1716 1096 ntuser.exe 86 PID 1096 wrote to memory of 1716 1096 ntuser.exe 86 PID 1096 wrote to memory of 1716 1096 ntuser.exe 86 PID 4760 wrote to memory of 2380 4760 ntuser.exe 87 PID 4760 wrote to memory of 2380 4760 ntuser.exe 87 PID 4760 wrote to memory of 2380 4760 ntuser.exe 87 PID 1468 wrote to memory of 3676 1468 ntuser.exe 89 PID 1468 wrote to memory of 3676 1468 ntuser.exe 89 PID 1468 wrote to memory of 3676 1468 ntuser.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2fe1f7f7483896f0544b19dfe7969490_NeikiAnalytics.exe"1⤵
- Enumerates connected drives
- Maps connected drives based on registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\ProgramData\UserRuntime\ntuser.exe"C:\ProgramData\UserRuntime\ntuser.exe" 12⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Roaming\UserRuntime\ntuser.exe"C:\Users\Admin\AppData\Roaming\UserRuntime\ntuser.exe" 13⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2380
-
-
-
C:\ProgramData\UserRuntime\ntuser.exe"C:\ProgramData\UserRuntime\ntuser.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\ProgramData\UserRuntime\ntuser.exe"C:\ProgramData\UserRuntime\ntuser.exe" 13⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
PID:1716
-
-
-
C:\ProgramData\UserRuntime\ntuser.exeC:\ProgramData\UserRuntime\ntuser.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\ProgramData\UserRuntime0\ntuser.exe"C:\ProgramData\UserRuntime0\ntuser.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD51419fa574316de80b0d0bf3cdf712630
SHA1953260a99abb718cfe8bdfa81dea91ff47c777cf
SHA2568a45195149bcfdf2e3593522901ed7e1f8eca5bf489e43bf6c4675e8e6f85f2a
SHA5128b89d36e170f965fcd76a7f1c985b6ca898556bf04557bfc7f085b53eab4c2c643387d9fbe201353fd6e6d7a434f574be3d9ca45d17710a403f2695933d2fbf3
-
Filesize
2KB
MD5473fe65d1683749fe9b883519d15aac7
SHA17d7ffc27394d91d925a0aedb8a08bc6e4b1add32
SHA25667b75b896a4adb2f5ccdfaca13f850d8a4c99054f1780c320b01985a6dc94b81
SHA512063511c0ad2b1ad22655cbc25ff835233d03c2a27c4f9db2d66e3d280ffd541c7fa43b450277748594cf6bc80e2628272aa1db2223535e7e2415e3590b68f822
-
Filesize
1KB
MD5aa5b45aef054f7aadabc9110fd876998
SHA19969539937fe68ec61fdc0d304ee8c728b480405
SHA256928c86f6218810d0fbe453fbd789c9b16b65440bd4cb8e610cd932884c823ec8
SHA5128bd7d69b266bd97660e40b725148963b78df26bd50061d1233f0307bd80b15ab57ab6a148dc2bb47ceeabebbcd22cb95102a5239df7262374aa09f9875d1f44c
-
Filesize
5KB
MD55c489b8ab4e3643a7db8e1c6e3c25f63
SHA12b15777e22a503f2f31e87695f75945cf485aa55
SHA2567b5ed57fe3e60638c30613bbfd6967c745cca138c62a39bec14efc46c14a992b
SHA5123e5778ee980d20f4fe6ee8f797f68edfe8f6b20cbb31bed81b990f8143b0dd648f8a1720b9df2007435f392498d0d589431f5c7a59746691fbedfe43e6309403
-
Filesize
5KB
MD5ab365d8976ed2b3258976c5c8239e06a
SHA14293f7526b61f84b7710dd121bf3033cc9555b31
SHA256ee4010cd1d5953af082992a5d43a9bd5141cb72d56ffe8fa1af762d9e3cb6eae
SHA5126eead0c9d5fc4c6f2e6c9ef581546a78e666b6e6b85e834b2e0947c97fc7d92ab3db013fc6862c4eab1d971b4e4fef27e4ee4d3afa966e95a94895b600433d1f
-
Filesize
3KB
MD54299e0db1510534898388f591b4c2295
SHA1f34c058f0bb6cec1d0a7bc1ad68bb49777be08ae
SHA2562d056d09e6ab3ae87db6cb374fb3b7523963f99852fa9c190b667944ad8ee34c
SHA512a3901757a2870b6f3aadc67ba5e48958b58aeb1aaa3d583c0cdd8f32e29b1ca4a208d5d312f4dab17a893f927f20103ff2ed77d01d0f9bb102427f503c178c1a
-
Filesize
8KB
MD593d12ff491e7be55ca224fa07bf313ae
SHA1cfa77beaedeafeb1e4108aed8ff045ab9252a2b2
SHA25672852ebe3bf2f28cbac6cb80a8cc98bfea05af0ca83d99706581a05f2c0a978d
SHA5126ab02d6e3ccc307bc8a7049316d45ef59d8338a0bf29c1cc2cef876919395a0fe27f84dfd3e2b7a22347f0cdad3e12741bc5a94078c8140bcf118f7bcd75ea65
-
Filesize
1KB
MD59330013c06b48138a2e4d474e224dec6
SHA17c2232c982cd9c93f75295944ed53c2f7c812bc5
SHA2562d12fefc20d94530afe46f9ae0f1741cc4913e0a22486ae56cbe2764f8b1175c
SHA51275fc679ca41e61d1e3db0e72b171e10541f4011cddaf4d015e284a1a7cd61f79e6bd33c54374a0d602fc0ebecb3408422b7742bdea25897469be2cbe6d091041
-
Filesize
8KB
MD55132fd710af4105779f70b94cad89a06
SHA1132626e35f8a2854ad11da36ef7bb4dd36f93ca3
SHA25624603bcf42cfe695fa6888a0c3664cbdb7da0337a05f74a5b9936decc1bea71f
SHA512b3981a61e47850eb250263886030de10489e62fc4864241b359cbd076c34cc46d8c94a5c27cce366533d1450aace4d49d60bb882de298f31196bcce7408b8764
-
Filesize
191KB
MD5f8941a6304ebe85953386f13fe7ca306
SHA1c85cb2e2c6adf254846da6da1a224e29636d5544
SHA2560e0837bb30fb861802742ba8299cbcd92071daa0972614ed9b682bed4db689a3
SHA512f5ec72ade81a386a5dfda6a5a56d75a3c65877da0dbb8a367a4a50474f6d210b613c3d5305e5f961a19a629b8c7f27359499ed2189c53c8f9dd017fb33db7efc
-
Filesize
2KB
MD5a0781b1c2ba122af02ec8e6ea7a30833
SHA1c1fa1782642be961ad2a681a1096094c4f4171a2
SHA2563cc84c2df684098547ea9a3fe727d752782495f942a1d71f88e1eba204832528
SHA512944a5fd9325bcaefa438b387a1955419c4d058fc0bf31994be180418bfad7cec7083ae0bebff1f4a95a9777852488cb265bf34f012d86faa5d70e9a89316da50
-
Filesize
5KB
MD5ac27da1b140ea06497e7e092e882df9e
SHA18cfb75c118a3e94b7fef85ec80c73baf2db7f974
SHA256a537ff35db3b480f3ab33f97fd1fbfd56143e3c4673c7df2116d20c5a6df595f
SHA512fae0b1fec292fe9d93834694a42890a8feb6399dd2d44edd5b797acaa388e8f06f0fedbab3e1ce978031a156abfa746b1e3243a01a736b5582f4373b2177fb05
-
Filesize
9KB
MD54d2e86d2c3b2158acdf2e1a9e2d9a568
SHA1ccb29d1f57b788acb06df0e46d43a76373b77bbc
SHA2562d1ba7bf28032315912bbb7eb0d8bfec96fb7f4b72ce87fd749350b99bfe236c
SHA512b50f16a588de77eea303527a0e8519205d62717ffe27d4c8d304490ce5970f2ff7a628405a827fdf5241115e71467e8cf2edd4c07521b8b0d145432522aa747f
-
Filesize
2KB
MD574184f164087fa614d360f22da4ac73a
SHA14f8d1093a5189f846e94f44ab55262deaeabdeb6
SHA25618a00174d839117437542236b30de0ca37049c0ab1a5741cacc10aaf40724ba2
SHA5129490c6bdecd9744962c2fef6de77d4e1f018e3e64a9e609791130f46d627dd634ec631a94a08ef89e1fb8b1ad0cd9ae32592a2a222e54b4d4b8bf955fc3d07c4
-
Filesize
7KB
MD57e83645b973980e4dbe3b69b0a9fae74
SHA1a0e524aa9e72d7732de43742a470be8f691ccc9a
SHA256bf72a40c5ace625d82f4aade642d45de6d01ef4c4ab3d41540bc8e35ff674e2b
SHA512dcd616427bddaa6ab0035f3f842762585c412e4aed7f8c81d6855c88739e0df5919e111d1529e9d9fd68e583120e371cf1fe2afd6d9d1f8fcd4fdcb2515f5138
-
Filesize
191KB
MD5eac9d748c72cd552ecddc140e078193c
SHA18deff6db450f5357de442bafde8626fd9fdd4145
SHA25671531b75b2f59e998f864ce2907fa8f406033290eb3da1aca295308267c9a6fc
SHA51296d14bf712ce7f99425a4042653b9b191ed1e7bd8dc3d1bc3b8592d870e4f1d0a2d94ee6024479d04d4d68c30088acacbb3cb402431513633924ff5b6ed8122c