Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 03:09
Behavioral task
behavioral1
Sample
9b4508be8889db6e0198922b215f06b0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
9b4508be8889db6e0198922b215f06b0_NeikiAnalytics.exe
-
Size
464KB
-
MD5
9b4508be8889db6e0198922b215f06b0
-
SHA1
f14da5fc70fc7db3be701bbbfb0706b4d80eb16e
-
SHA256
4876d713d4b278f2b87bcf6ea110be13c2b37f91c296297da53b0666abd1d17b
-
SHA512
2fcae7cb1b93ec4195aa421f49772c9c9e279c91b9f71a411f596229ecf90637243d85d68473a0d91f5abfe9d724cf2f9cddcb062fa831f6838104e6f560b046
-
SSDEEP
12288:J4wFHoSTeR0oQRkay+eFp3IDvSbh5nPVP+OKaf1Vr:VeR0oykayRFp3lztP+OKaf1Vr
Malware Config
Signatures
-
Detect Blackmoon payload 41 IoCs
Processes:
resource yara_rule behavioral1/memory/2612-10-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2560-19-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2532-32-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2680-47-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2392-65-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2416-76-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/112-84-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1656-93-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1808-103-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2332-112-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2648-121-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/956-134-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2672-131-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2300-149-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1740-168-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2708-184-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2472-202-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1032-271-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/3024-281-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2072-289-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2072-290-0x0000000000220000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/2612-317-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2068-331-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1148-352-0x0000000000220000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/1972-359-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1972-366-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2440-375-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2188-436-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2176-462-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2208-500-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2732-520-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/3052-527-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/3052-548-0x0000000000220000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/2768-561-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1112-568-0x00000000003C0000-0x00000000003FA000-memory.dmp family_blackmoon behavioral1/memory/540-595-0x0000000000220000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/2588-648-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2300-766-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1608-801-0x00000000002A0000-0x00000000002DA000-memory.dmp family_blackmoon behavioral1/memory/2708-800-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2304-853-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule behavioral1/memory/2612-0-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2560-11-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\fdnjrfn.exe family_berbew behavioral1/memory/2612-10-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2560-19-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\xnhtrfl.exe family_berbew behavioral1/memory/2560-21-0x0000000000220000-0x000000000025A000-memory.dmp family_berbew behavioral1/memory/2532-32-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\jbjnhrd.exe family_berbew C:\vhljt.exe family_berbew behavioral1/memory/2680-39-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2680-47-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\vflrrv.exe family_berbew \??\c:\nnrhr.exe family_berbew behavioral1/memory/2392-57-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2416-68-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\ntnvpp.exe family_berbew behavioral1/memory/2392-65-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2416-76-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\jblprtt.exe family_berbew C:\fnpbh.exe family_berbew behavioral1/memory/112-84-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/1656-93-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\nrjjrbj.exe family_berbew behavioral1/memory/1808-103-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\bdrnrr.exe family_berbew C:\vfnnttf.exe family_berbew behavioral1/memory/2332-112-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\xrnlrnf.exe family_berbew behavioral1/memory/2648-121-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\xrdxlr.exe family_berbew behavioral1/memory/956-134-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2672-131-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\pxjpn.exe family_berbew behavioral1/memory/2300-149-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\djbff.exe family_berbew C:\xplbv.exe family_berbew C:\vtxlbrl.exe family_berbew behavioral1/memory/1740-168-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\vbdbr.exe family_berbew C:\xbnnfjt.exe family_berbew behavioral1/memory/2708-184-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\hffrfbl.exe family_berbew behavioral1/memory/2472-202-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\rltdj.exe family_berbew C:\tnjjlpn.exe family_berbew behavioral1/memory/1924-212-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\hppdvhr.exe family_berbew C:\prfpbjl.exe family_berbew \??\c:\fxnrb.exe family_berbew C:\nphrt.exe family_berbew C:\fppth.exe family_berbew behavioral1/memory/1032-261-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\rhftjr.exe family_berbew behavioral1/memory/3024-273-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\fhpxjfb.exe family_berbew behavioral1/memory/1032-271-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/3024-281-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\ddvdvvp.exe family_berbew behavioral1/memory/2072-289-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\pbbjbbb.exe family_berbew behavioral1/memory/2072-290-0x0000000000220000-0x000000000025A000-memory.dmp family_berbew behavioral1/memory/2612-317-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2072-324-0x0000000000220000-0x000000000025A000-memory.dmp family_berbew -
Executes dropped EXE 64 IoCs
Processes:
fdnjrfn.exexnhtrfl.exejbjnhrd.exevhljt.exevflrrv.exennrhr.exentnvpp.exejblprtt.exefnpbh.exenrjjrbj.exebdrnrr.exevfnnttf.exexrnlrnf.exexrdxlr.exepxjpn.exedjbff.exexplbv.exevtxlbrl.exevbdbr.exexbnnfjt.exehffrfbl.exerltdj.exetnjjlpn.exehppdvhr.exeprfpbjl.exefxnrb.exenphrt.exefppth.exerhftjr.exefhpxjfb.exeddvdvvp.exepbbjbbb.exeljnflld.exerfrrxr.exertdfxlb.exelpjjbnj.exevbjjdn.exennjvj.exennnhb.exehbprxvd.exevbpxbf.exedjtttvb.exenbdrjjn.exetlrlvht.exedxjdr.exejbvvf.exefplpx.exelpnbpb.exerpfxnn.exedhjllbj.exebvnvnx.exevjrpbd.exebdlld.exetjfhd.exefnbpbn.exelbnll.exeflvbj.exerlxtvdh.exejnbnr.exerfhrjb.exepbdfld.exevnnxp.exextvtjjt.exelbtrx.exepid process 2560 fdnjrfn.exe 2524 xnhtrfl.exe 2532 jbjnhrd.exe 2680 vhljt.exe 2712 vflrrv.exe 2392 nnrhr.exe 2416 ntnvpp.exe 112 jblprtt.exe 1656 fnpbh.exe 1808 nrjjrbj.exe 2332 bdrnrr.exe 2648 vfnnttf.exe 2672 xrnlrnf.exe 956 xrdxlr.exe 2300 pxjpn.exe 1812 djbff.exe 1740 xplbv.exe 1292 vtxlbrl.exe 2708 vbdbr.exe 2676 xbnnfjt.exe 2472 hffrfbl.exe 588 rltdj.exe 1924 tnjjlpn.exe 2916 hppdvhr.exe 2992 prfpbjl.exe 2316 fxnrb.exe 1536 nphrt.exe 1548 fppth.exe 1032 rhftjr.exe 3024 fhpxjfb.exe 2072 ddvdvvp.exe 2200 pbbjbbb.exe 2996 ljnflld.exe 2256 rfrrxr.exe 2240 rtdfxlb.exe 2612 lpjjbnj.exe 2068 vbjjdn.exe 2940 nnjvj.exe 2528 nnnhb.exe 1148 hbprxvd.exe 2632 vbpxbf.exe 1972 djtttvb.exe 2440 nbdrjjn.exe 2496 tlrlvht.exe 2100 dxjdr.exe 1652 jbvvf.exe 2172 fplpx.exe 1744 lpnbpb.exe 828 rpfxnn.exe 1436 dhjllbj.exe 1508 bvnvnx.exe 2188 vjrpbd.exe 2180 bdlld.exe 940 tjfhd.exe 1636 fnbpbn.exe 2176 lbnll.exe 1640 flvbj.exe 2272 rlxtvdh.exe 2336 jnbnr.exe 2624 rfhrjb.exe 2704 pbdfld.exe 2208 vnnxp.exe 476 xtvtjjt.exe 2212 lbtrx.exe -
Processes:
resource yara_rule behavioral1/memory/2612-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2560-11-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\fdnjrfn.exe upx behavioral1/memory/2612-10-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2560-19-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\xnhtrfl.exe upx behavioral1/memory/2532-32-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\jbjnhrd.exe upx C:\vhljt.exe upx behavioral1/memory/2680-39-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2680-47-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\vflrrv.exe upx \??\c:\nnrhr.exe upx behavioral1/memory/2392-57-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2416-68-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\ntnvpp.exe upx behavioral1/memory/2392-65-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2416-76-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\jblprtt.exe upx C:\fnpbh.exe upx behavioral1/memory/112-84-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1656-93-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\nrjjrbj.exe upx behavioral1/memory/1808-103-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\bdrnrr.exe upx C:\vfnnttf.exe upx behavioral1/memory/2332-112-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\xrnlrnf.exe upx behavioral1/memory/2648-121-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\xrdxlr.exe upx behavioral1/memory/956-134-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2672-131-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\pxjpn.exe upx behavioral1/memory/2300-149-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\djbff.exe upx C:\xplbv.exe upx C:\vtxlbrl.exe upx behavioral1/memory/1740-168-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\vbdbr.exe upx C:\xbnnfjt.exe upx behavioral1/memory/2708-184-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\hffrfbl.exe upx behavioral1/memory/2472-202-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\rltdj.exe upx C:\tnjjlpn.exe upx behavioral1/memory/1924-212-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\hppdvhr.exe upx C:\prfpbjl.exe upx \??\c:\fxnrb.exe upx C:\nphrt.exe upx C:\fppth.exe upx behavioral1/memory/1032-261-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\rhftjr.exe upx behavioral1/memory/3024-273-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\fhpxjfb.exe upx behavioral1/memory/1032-271-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/3024-281-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\ddvdvvp.exe upx behavioral1/memory/2072-289-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\pbbjbbb.exe upx behavioral1/memory/2612-317-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2068-331-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1148-344-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1972-359-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9b4508be8889db6e0198922b215f06b0_NeikiAnalytics.exefdnjrfn.exexnhtrfl.exejbjnhrd.exevhljt.exevflrrv.exennrhr.exentnvpp.exejblprtt.exefnpbh.exenrjjrbj.exebdrnrr.exevfnnttf.exexrnlrnf.exexrdxlr.exepxjpn.exedescription pid process target process PID 2612 wrote to memory of 2560 2612 9b4508be8889db6e0198922b215f06b0_NeikiAnalytics.exe fdnjrfn.exe PID 2612 wrote to memory of 2560 2612 9b4508be8889db6e0198922b215f06b0_NeikiAnalytics.exe fdnjrfn.exe PID 2612 wrote to memory of 2560 2612 9b4508be8889db6e0198922b215f06b0_NeikiAnalytics.exe fdnjrfn.exe PID 2612 wrote to memory of 2560 2612 9b4508be8889db6e0198922b215f06b0_NeikiAnalytics.exe fdnjrfn.exe PID 2560 wrote to memory of 2524 2560 fdnjrfn.exe xnhtrfl.exe PID 2560 wrote to memory of 2524 2560 fdnjrfn.exe xnhtrfl.exe PID 2560 wrote to memory of 2524 2560 fdnjrfn.exe xnhtrfl.exe PID 2560 wrote to memory of 2524 2560 fdnjrfn.exe xnhtrfl.exe PID 2524 wrote to memory of 2532 2524 xnhtrfl.exe jbjnhrd.exe PID 2524 wrote to memory of 2532 2524 xnhtrfl.exe jbjnhrd.exe PID 2524 wrote to memory of 2532 2524 xnhtrfl.exe jbjnhrd.exe PID 2524 wrote to memory of 2532 2524 xnhtrfl.exe jbjnhrd.exe PID 2532 wrote to memory of 2680 2532 jbjnhrd.exe vhljt.exe PID 2532 wrote to memory of 2680 2532 jbjnhrd.exe vhljt.exe PID 2532 wrote to memory of 2680 2532 jbjnhrd.exe vhljt.exe PID 2532 wrote to memory of 2680 2532 jbjnhrd.exe vhljt.exe PID 2680 wrote to memory of 2712 2680 vhljt.exe vflrrv.exe PID 2680 wrote to memory of 2712 2680 vhljt.exe vflrrv.exe PID 2680 wrote to memory of 2712 2680 vhljt.exe vflrrv.exe PID 2680 wrote to memory of 2712 2680 vhljt.exe vflrrv.exe PID 2712 wrote to memory of 2392 2712 vflrrv.exe nnrhr.exe PID 2712 wrote to memory of 2392 2712 vflrrv.exe nnrhr.exe PID 2712 wrote to memory of 2392 2712 vflrrv.exe nnrhr.exe PID 2712 wrote to memory of 2392 2712 vflrrv.exe nnrhr.exe PID 2392 wrote to memory of 2416 2392 nnrhr.exe ntnvpp.exe PID 2392 wrote to memory of 2416 2392 nnrhr.exe ntnvpp.exe PID 2392 wrote to memory of 2416 2392 nnrhr.exe ntnvpp.exe PID 2392 wrote to memory of 2416 2392 nnrhr.exe ntnvpp.exe PID 2416 wrote to memory of 112 2416 ntnvpp.exe jblprtt.exe PID 2416 wrote to memory of 112 2416 ntnvpp.exe jblprtt.exe PID 2416 wrote to memory of 112 2416 ntnvpp.exe jblprtt.exe PID 2416 wrote to memory of 112 2416 ntnvpp.exe jblprtt.exe PID 112 wrote to memory of 1656 112 jblprtt.exe fnpbh.exe PID 112 wrote to memory of 1656 112 jblprtt.exe fnpbh.exe PID 112 wrote to memory of 1656 112 jblprtt.exe fnpbh.exe PID 112 wrote to memory of 1656 112 jblprtt.exe fnpbh.exe PID 1656 wrote to memory of 1808 1656 fnpbh.exe nrjjrbj.exe PID 1656 wrote to memory of 1808 1656 fnpbh.exe nrjjrbj.exe PID 1656 wrote to memory of 1808 1656 fnpbh.exe nrjjrbj.exe PID 1656 wrote to memory of 1808 1656 fnpbh.exe nrjjrbj.exe PID 1808 wrote to memory of 2332 1808 nrjjrbj.exe bdrnrr.exe PID 1808 wrote to memory of 2332 1808 nrjjrbj.exe bdrnrr.exe PID 1808 wrote to memory of 2332 1808 nrjjrbj.exe bdrnrr.exe PID 1808 wrote to memory of 2332 1808 nrjjrbj.exe bdrnrr.exe PID 2332 wrote to memory of 2648 2332 bdrnrr.exe vfnnttf.exe PID 2332 wrote to memory of 2648 2332 bdrnrr.exe vfnnttf.exe PID 2332 wrote to memory of 2648 2332 bdrnrr.exe vfnnttf.exe PID 2332 wrote to memory of 2648 2332 bdrnrr.exe vfnnttf.exe PID 2648 wrote to memory of 2672 2648 vfnnttf.exe xrnlrnf.exe PID 2648 wrote to memory of 2672 2648 vfnnttf.exe xrnlrnf.exe PID 2648 wrote to memory of 2672 2648 vfnnttf.exe xrnlrnf.exe PID 2648 wrote to memory of 2672 2648 vfnnttf.exe xrnlrnf.exe PID 2672 wrote to memory of 956 2672 xrnlrnf.exe xrdxlr.exe PID 2672 wrote to memory of 956 2672 xrnlrnf.exe xrdxlr.exe PID 2672 wrote to memory of 956 2672 xrnlrnf.exe xrdxlr.exe PID 2672 wrote to memory of 956 2672 xrnlrnf.exe xrdxlr.exe PID 956 wrote to memory of 2300 956 xrdxlr.exe pxjpn.exe PID 956 wrote to memory of 2300 956 xrdxlr.exe pxjpn.exe PID 956 wrote to memory of 2300 956 xrdxlr.exe pxjpn.exe PID 956 wrote to memory of 2300 956 xrdxlr.exe pxjpn.exe PID 2300 wrote to memory of 1812 2300 pxjpn.exe djbff.exe PID 2300 wrote to memory of 1812 2300 pxjpn.exe djbff.exe PID 2300 wrote to memory of 1812 2300 pxjpn.exe djbff.exe PID 2300 wrote to memory of 1812 2300 pxjpn.exe djbff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b4508be8889db6e0198922b215f06b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9b4508be8889db6e0198922b215f06b0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\fdnjrfn.exec:\fdnjrfn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\xnhtrfl.exec:\xnhtrfl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\jbjnhrd.exec:\jbjnhrd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\vhljt.exec:\vhljt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\vflrrv.exec:\vflrrv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\nnrhr.exec:\nnrhr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\ntnvpp.exec:\ntnvpp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2416 -
\??\c:\jblprtt.exec:\jblprtt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:112 -
\??\c:\fnpbh.exec:\fnpbh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
\??\c:\nrjjrbj.exec:\nrjjrbj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\bdrnrr.exec:\bdrnrr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\vfnnttf.exec:\vfnnttf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\xrnlrnf.exec:\xrnlrnf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\xrdxlr.exec:\xrdxlr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:956 -
\??\c:\pxjpn.exec:\pxjpn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
\??\c:\djbff.exec:\djbff.exe17⤵
- Executes dropped EXE
PID:1812 -
\??\c:\xplbv.exec:\xplbv.exe18⤵
- Executes dropped EXE
PID:1740 -
\??\c:\vtxlbrl.exec:\vtxlbrl.exe19⤵
- Executes dropped EXE
PID:1292 -
\??\c:\vbdbr.exec:\vbdbr.exe20⤵
- Executes dropped EXE
PID:2708 -
\??\c:\xbnnfjt.exec:\xbnnfjt.exe21⤵
- Executes dropped EXE
PID:2676 -
\??\c:\hffrfbl.exec:\hffrfbl.exe22⤵
- Executes dropped EXE
PID:2472 -
\??\c:\rltdj.exec:\rltdj.exe23⤵
- Executes dropped EXE
PID:588 -
\??\c:\tnjjlpn.exec:\tnjjlpn.exe24⤵
- Executes dropped EXE
PID:1924 -
\??\c:\hppdvhr.exec:\hppdvhr.exe25⤵
- Executes dropped EXE
PID:2916 -
\??\c:\prfpbjl.exec:\prfpbjl.exe26⤵
- Executes dropped EXE
PID:2992 -
\??\c:\fxnrb.exec:\fxnrb.exe27⤵
- Executes dropped EXE
PID:2316 -
\??\c:\nphrt.exec:\nphrt.exe28⤵
- Executes dropped EXE
PID:1536 -
\??\c:\fppth.exec:\fppth.exe29⤵
- Executes dropped EXE
PID:1548 -
\??\c:\rhftjr.exec:\rhftjr.exe30⤵
- Executes dropped EXE
PID:1032 -
\??\c:\fhpxjfb.exec:\fhpxjfb.exe31⤵
- Executes dropped EXE
PID:3024 -
\??\c:\ddvdvvp.exec:\ddvdvvp.exe32⤵
- Executes dropped EXE
PID:2072 -
\??\c:\pbbjbbb.exec:\pbbjbbb.exe33⤵
- Executes dropped EXE
PID:2200 -
\??\c:\ljnflld.exec:\ljnflld.exe34⤵
- Executes dropped EXE
PID:2996 -
\??\c:\rfrrxr.exec:\rfrrxr.exe35⤵
- Executes dropped EXE
PID:2256 -
\??\c:\rtdfxlb.exec:\rtdfxlb.exe36⤵
- Executes dropped EXE
PID:2240 -
\??\c:\lpjjbnj.exec:\lpjjbnj.exe37⤵
- Executes dropped EXE
PID:2612 -
\??\c:\vbjjdn.exec:\vbjjdn.exe38⤵
- Executes dropped EXE
PID:2068 -
\??\c:\nnjvj.exec:\nnjvj.exe39⤵
- Executes dropped EXE
PID:2940 -
\??\c:\nnnhb.exec:\nnnhb.exe40⤵
- Executes dropped EXE
PID:2528 -
\??\c:\hbprxvd.exec:\hbprxvd.exe41⤵
- Executes dropped EXE
PID:1148 -
\??\c:\vbpxbf.exec:\vbpxbf.exe42⤵
- Executes dropped EXE
PID:2632 -
\??\c:\djtttvb.exec:\djtttvb.exe43⤵
- Executes dropped EXE
PID:1972 -
\??\c:\nbdrjjn.exec:\nbdrjjn.exe44⤵
- Executes dropped EXE
PID:2440 -
\??\c:\tlrlvht.exec:\tlrlvht.exe45⤵
- Executes dropped EXE
PID:2496 -
\??\c:\dxjdr.exec:\dxjdr.exe46⤵
- Executes dropped EXE
PID:2100 -
\??\c:\jbvvf.exec:\jbvvf.exe47⤵
- Executes dropped EXE
PID:1652 -
\??\c:\fplpx.exec:\fplpx.exe48⤵
- Executes dropped EXE
PID:2172 -
\??\c:\lpnbpb.exec:\lpnbpb.exe49⤵
- Executes dropped EXE
PID:1744 -
\??\c:\rpfxnn.exec:\rpfxnn.exe50⤵
- Executes dropped EXE
PID:828 -
\??\c:\dhjllbj.exec:\dhjllbj.exe51⤵
- Executes dropped EXE
PID:1436 -
\??\c:\bvnvnx.exec:\bvnvnx.exe52⤵
- Executes dropped EXE
PID:1508 -
\??\c:\vjrpbd.exec:\vjrpbd.exe53⤵
- Executes dropped EXE
PID:2188 -
\??\c:\bdlld.exec:\bdlld.exe54⤵
- Executes dropped EXE
PID:2180 -
\??\c:\tjfhd.exec:\tjfhd.exe55⤵
- Executes dropped EXE
PID:940 -
\??\c:\fnbpbn.exec:\fnbpbn.exe56⤵
- Executes dropped EXE
PID:1636 -
\??\c:\lbnll.exec:\lbnll.exe57⤵
- Executes dropped EXE
PID:2176 -
\??\c:\flvbj.exec:\flvbj.exe58⤵
- Executes dropped EXE
PID:1640 -
\??\c:\rlxtvdh.exec:\rlxtvdh.exe59⤵
- Executes dropped EXE
PID:2272 -
\??\c:\jnbnr.exec:\jnbnr.exe60⤵
- Executes dropped EXE
PID:2336 -
\??\c:\rfhrjb.exec:\rfhrjb.exe61⤵
- Executes dropped EXE
PID:2624 -
\??\c:\pbdfld.exec:\pbdfld.exe62⤵
- Executes dropped EXE
PID:2704 -
\??\c:\vnnxp.exec:\vnnxp.exe63⤵
- Executes dropped EXE
PID:2208 -
\??\c:\xtvtjjt.exec:\xtvtjjt.exe64⤵
- Executes dropped EXE
PID:476 -
\??\c:\lbtrx.exec:\lbtrx.exe65⤵
- Executes dropped EXE
PID:2212 -
\??\c:\vbdfbjv.exec:\vbdfbjv.exe66⤵PID:2732
-
\??\c:\thtnh.exec:\thtnh.exe67⤵PID:3052
-
\??\c:\xphvf.exec:\xphvf.exe68⤵PID:1112
-
\??\c:\bbhpnv.exec:\bbhpnv.exe69⤵PID:2880
-
\??\c:\fjhnjnv.exec:\fjhnjnv.exe70⤵PID:1252
-
\??\c:\drbrpr.exec:\drbrpr.exe71⤵PID:2152
-
\??\c:\jrxtvhf.exec:\jrxtvhf.exe72⤵PID:2768
-
\??\c:\lvjdbhv.exec:\lvjdbhv.exe73⤵PID:1536
-
\??\c:\ddjrtll.exec:\ddjrtll.exe74⤵PID:488
-
\??\c:\nptbrl.exec:\nptbrl.exe75⤵PID:1244
-
\??\c:\pjvrddv.exec:\pjvrddv.exe76⤵PID:3024
-
\??\c:\vxppbl.exec:\vxppbl.exe77⤵PID:540
-
\??\c:\pnnhvh.exec:\pnnhvh.exe78⤵PID:2072
-
\??\c:\tptvd.exec:\tptvd.exe79⤵PID:2036
-
\??\c:\dnlptjv.exec:\dnlptjv.exe80⤵PID:888
-
\??\c:\ltlvp.exec:\ltlvp.exe81⤵PID:2308
-
\??\c:\hhlnrt.exec:\hhlnrt.exe82⤵PID:1484
-
\??\c:\hvhxnnb.exec:\hvhxnnb.exe83⤵PID:1520
-
\??\c:\dtlxnn.exec:\dtlxnn.exe84⤵PID:2484
-
\??\c:\vbjvdxv.exec:\vbjvdxv.exe85⤵PID:2588
-
\??\c:\xhrxrd.exec:\xhrxrd.exe86⤵PID:2684
-
\??\c:\nvhvpbt.exec:\nvhvpbt.exe87⤵PID:2580
-
\??\c:\ppnjdrj.exec:\ppnjdrj.exe88⤵PID:2548
-
\??\c:\jlpdlh.exec:\jlpdlh.exe89⤵PID:2396
-
\??\c:\tnppb.exec:\tnppb.exe90⤵PID:1908
-
\??\c:\xllnlv.exec:\xllnlv.exe91⤵PID:2440
-
\??\c:\bnrlrx.exec:\bnrlrx.exe92⤵PID:2832
-
\??\c:\lfnvvx.exec:\lfnvvx.exe93⤵PID:112
-
\??\c:\xbvnr.exec:\xbvnr.exe94⤵PID:1652
-
\??\c:\btrrfnp.exec:\btrrfnp.exe95⤵PID:1656
-
\??\c:\rtldd.exec:\rtldd.exe96⤵PID:1472
-
\??\c:\hlddl.exec:\hlddl.exe97⤵PID:1868
-
\??\c:\fdrrd.exec:\fdrrd.exe98⤵PID:1200
-
\??\c:\xxbdb.exec:\xxbdb.exe99⤵PID:2196
-
\??\c:\rvhbb.exec:\rvhbb.exe100⤵PID:2168
-
\??\c:\hrxvvjd.exec:\hrxvvjd.exe101⤵PID:1700
-
\??\c:\xnnxbl.exec:\xnnxbl.exe102⤵PID:1492
-
\??\c:\dpnxd.exec:\dpnxd.exe103⤵PID:1608
-
\??\c:\lxnbtj.exec:\lxnbtj.exe104⤵PID:2300
-
\??\c:\pdlpxbp.exec:\pdlpxbp.exe105⤵PID:1676
-
\??\c:\vbxvlv.exec:\vbxvlv.exe106⤵PID:2272
-
\??\c:\dndvlh.exec:\dndvlh.exe107⤵PID:1180
-
\??\c:\hxtnl.exec:\hxtnl.exe108⤵PID:2708
-
\??\c:\fhpdn.exec:\fhpdn.exe109⤵PID:2676
-
\??\c:\ptltd.exec:\ptltd.exe110⤵PID:2236
-
\??\c:\fdbtjhp.exec:\fdbtjhp.exe111⤵PID:800
-
\??\c:\xbvtp.exec:\xbvtp.exe112⤵PID:1964
-
\??\c:\pdlrxj.exec:\pdlrxj.exe113⤵PID:1968
-
\??\c:\xrfvrrj.exec:\xrfvrrj.exe114⤵PID:2896
-
\??\c:\jvxlhbr.exec:\jvxlhbr.exe115⤵PID:1112
-
\??\c:\fbhtr.exec:\fbhtr.exe116⤵PID:2880
-
\??\c:\bpdnjbf.exec:\bpdnjbf.exe117⤵PID:2304
-
\??\c:\vnxxhh.exec:\vnxxhh.exe118⤵PID:1820
-
\??\c:\dlrtp.exec:\dlrtp.exe119⤵PID:2768
-
\??\c:\rrjrff.exec:\rrjrff.exe120⤵PID:924
-
\??\c:\fnxft.exec:\fnxft.exe121⤵PID:616
-
\??\c:\xhlrh.exec:\xhlrh.exe122⤵PID:1988
-
\??\c:\thhhlhl.exec:\thhhlhl.exe123⤵PID:1396
-
\??\c:\vpxhrv.exec:\vpxhrv.exe124⤵PID:2020
-
\??\c:\pbbrtp.exec:\pbbrtp.exe125⤵PID:576
-
\??\c:\hpxnplj.exec:\hpxnplj.exe126⤵PID:1668
-
\??\c:\jhrbt.exec:\jhrbt.exe127⤵PID:2264
-
\??\c:\dfrtjdj.exec:\dfrtjdj.exe128⤵PID:2988
-
\??\c:\vvjfdv.exec:\vvjfdv.exe129⤵PID:1560
-
\??\c:\jlrxh.exec:\jlrxh.exe130⤵PID:2984
-
\??\c:\lxfntj.exec:\lxfntj.exe131⤵PID:2068
-
\??\c:\nnjth.exec:\nnjth.exe132⤵PID:2628
-
\??\c:\fvbvhn.exec:\fvbvhn.exe133⤵PID:2408
-
\??\c:\bhnnv.exec:\bhnnv.exe134⤵PID:2608
-
\??\c:\frltv.exec:\frltv.exe135⤵PID:2400
-
\??\c:\dnfrf.exec:\dnfrf.exe136⤵PID:2512
-
\??\c:\vjptfp.exec:\vjptfp.exe137⤵PID:2448
-
\??\c:\dpfljl.exec:\dpfljl.exe138⤵PID:2404
-
\??\c:\pbbtdnp.exec:\pbbtdnp.exe139⤵PID:2416
-
\??\c:\rrlbhl.exec:\rrlbhl.exe140⤵PID:1164
-
\??\c:\fjvnfxv.exec:\fjvnfxv.exe141⤵PID:2320
-
\??\c:\bjvxv.exec:\bjvxv.exe142⤵PID:1420
-
\??\c:\fpfff.exec:\fpfff.exe143⤵PID:760
-
\??\c:\bdrrt.exec:\bdrrt.exe144⤵PID:2360
-
\??\c:\ddbxxdp.exec:\ddbxxdp.exe145⤵PID:2284
-
\??\c:\xtbvfrp.exec:\xtbvfrp.exe146⤵PID:544
-
\??\c:\jntvl.exec:\jntvl.exe147⤵PID:1428
-
\??\c:\bdbhlb.exec:\bdbhlb.exe148⤵PID:2180
-
\??\c:\ntxnpfl.exec:\ntxnpfl.exe149⤵PID:1800
-
\??\c:\bvrpvf.exec:\bvrpvf.exe150⤵PID:1764
-
\??\c:\vxddh.exec:\vxddh.exe151⤵PID:1812
-
\??\c:\tvvrtv.exec:\tvvrtv.exe152⤵PID:1288
-
\??\c:\rndblv.exec:\rndblv.exe153⤵PID:2412
-
\??\c:\rthptx.exec:\rthptx.exe154⤵PID:2476
-
\??\c:\vffbtpt.exec:\vffbtpt.exe155⤵PID:2920
-
\??\c:\xfjphpx.exec:\xfjphpx.exe156⤵PID:2708
-
\??\c:\brjlt.exec:\brjlt.exe157⤵PID:1952
-
\??\c:\njxdp.exec:\njxdp.exe158⤵PID:600
-
\??\c:\jnjxnl.exec:\jnjxnl.exe159⤵PID:800
-
\??\c:\ltlvd.exec:\ltlvd.exe160⤵PID:2972
-
\??\c:\pfllt.exec:\pfllt.exe161⤵PID:1788
-
\??\c:\xpvft.exec:\xpvft.exe162⤵PID:2192
-
\??\c:\vvrlhr.exec:\vvrlhr.exe163⤵PID:704
-
\??\c:\tfrpxfb.exec:\tfrpxfb.exe164⤵PID:1584
-
\??\c:\ftltfxl.exec:\ftltfxl.exe165⤵PID:2152
-
\??\c:\fdrdrhv.exec:\fdrdrhv.exe166⤵PID:1688
-
\??\c:\bndpv.exec:\bndpv.exe167⤵PID:960
-
\??\c:\vpfhtd.exec:\vpfhtd.exe168⤵PID:1064
-
\??\c:\dfdbldh.exec:\dfdbldh.exe169⤵PID:1464
-
\??\c:\jfrbltb.exec:\jfrbltb.exe170⤵PID:3000
-
\??\c:\dnfhxp.exec:\dnfhxp.exe171⤵PID:1988
-
\??\c:\fvfxb.exec:\fvfxb.exe172⤵PID:1396
-
\??\c:\dvfrj.exec:\dvfrj.exe173⤵PID:540
-
\??\c:\fhlpx.exec:\fhlpx.exe174⤵PID:576
-
\??\c:\hxfvbtr.exec:\hxfvbtr.exe175⤵PID:2904
-
\??\c:\bvlnp.exec:\bvlnp.exe176⤵PID:1624
-
\??\c:\jxlbrf.exec:\jxlbrf.exe177⤵PID:2256
-
\??\c:\xdbfjlx.exec:\xdbfjlx.exe178⤵PID:1512
-
\??\c:\lfjnh.exec:\lfjnh.exe179⤵PID:2584
-
\??\c:\jpplxld.exec:\jpplxld.exe180⤵PID:2068
-
\??\c:\lljpbbf.exec:\lljpbbf.exe181⤵PID:2532
-
\??\c:\dfxrldl.exec:\dfxrldl.exe182⤵PID:2748
-
\??\c:\txpjvvv.exec:\txpjvvv.exe183⤵PID:2632
-
\??\c:\bfdpttn.exec:\bfdpttn.exe184⤵PID:2452
-
\??\c:\dpblvd.exec:\dpblvd.exe185⤵PID:2636
-
\??\c:\bxhjxp.exec:\bxhjxp.exe186⤵PID:1908
-
\??\c:\xfdhtv.exec:\xfdhtv.exe187⤵PID:108
-
\??\c:\rpfvntx.exec:\rpfvntx.exe188⤵PID:1324
-
\??\c:\dltxhpl.exec:\dltxhpl.exe189⤵PID:1072
-
\??\c:\bjhtrp.exec:\bjhtrp.exe190⤵PID:2836
-
\??\c:\vlhfx.exec:\vlhfx.exe191⤵PID:1452
-
\??\c:\xjjrvxf.exec:\xjjrvxf.exe192⤵PID:856
-
\??\c:\lnjvt.exec:\lnjvt.exe193⤵PID:2432
-
\??\c:\vddbb.exec:\vddbb.exe194⤵PID:1760
-
\??\c:\bfjjnr.exec:\bfjjnr.exe195⤵PID:944
-
\??\c:\nhvxr.exec:\nhvxr.exe196⤵PID:1612
-
\??\c:\dndnn.exec:\dndnn.exe197⤵PID:308
-
\??\c:\tnjrvtf.exec:\tnjrvtf.exe198⤵PID:1872
-
\??\c:\hxpjj.exec:\hxpjj.exe199⤵PID:1800
-
\??\c:\jxdnpx.exec:\jxdnpx.exe200⤵PID:1764
-
\??\c:\ttbvlp.exec:\ttbvlp.exe201⤵PID:1812
-
\??\c:\xvblh.exec:\xvblh.exe202⤵PID:1236
-
\??\c:\rlbbfp.exec:\rlbbfp.exe203⤵PID:2660
-
\??\c:\blbtjh.exec:\blbtjh.exe204⤵PID:680
-
\??\c:\fpdbnx.exec:\fpdbnx.exe205⤵PID:564
-
\??\c:\btjxnnd.exec:\btjxnnd.exe206⤵PID:2472
-
\??\c:\pxndrx.exec:\pxndrx.exe207⤵PID:2772
-
\??\c:\xbnfjbf.exec:\xbnfjbf.exe208⤵PID:2732
-
\??\c:\nllhrnt.exec:\nllhrnt.exe209⤵PID:2084
-
\??\c:\nfjrr.exec:\nfjrr.exe210⤵PID:2760
-
\??\c:\lffnbt.exec:\lffnbt.exe211⤵PID:2312
-
\??\c:\nlbff.exec:\nlbff.exe212⤵PID:2016
-
\??\c:\xvtrf.exec:\xvtrf.exe213⤵PID:1144
-
\??\c:\lvlntt.exec:\lvlntt.exe214⤵PID:1732
-
\??\c:\rjxvp.exec:\rjxvp.exe215⤵PID:1548
-
\??\c:\tfxrrj.exec:\tfxrrj.exe216⤵PID:960
-
\??\c:\rbjxbfb.exec:\rbjxbfb.exe217⤵PID:1720
-
\??\c:\jvpddrd.exec:\jvpddrd.exe218⤵PID:2704
-
\??\c:\vjnnvn.exec:\vjnnvn.exe219⤵PID:2960
-
\??\c:\nxfnxxl.exec:\nxfnxxl.exe220⤵PID:2200
-
\??\c:\jltbpj.exec:\jltbpj.exe221⤵PID:2268
-
\??\c:\lbrvdt.exec:\lbrvdt.exe222⤵PID:2848
-
\??\c:\pdvvr.exec:\pdvvr.exe223⤵PID:888
-
\??\c:\vlbdptb.exec:\vlbdptb.exe224⤵PID:1516
-
\??\c:\vrtxt.exec:\vrtxt.exe225⤵PID:2516
-
\??\c:\nrvljtv.exec:\nrvljtv.exe226⤵PID:1520
-
\??\c:\vhnnl.exec:\vhnnl.exe227⤵PID:2592
-
\??\c:\lnhtnxr.exec:\lnhtnxr.exe228⤵PID:2752
-
\??\c:\jjvvn.exec:\jjvvn.exe229⤵PID:1148
-
\??\c:\jrphnrh.exec:\jrphnrh.exe230⤵PID:2536
-
\??\c:\xnjrfrr.exec:\xnjrfrr.exe231⤵PID:2572
-
\??\c:\fdffh.exec:\fdffh.exe232⤵PID:1972
-
\??\c:\tlxhjdt.exec:\tlxhjdt.exe233⤵PID:2740
-
\??\c:\nfbntbb.exec:\nfbntbb.exe234⤵PID:3068
-
\??\c:\tvjhf.exec:\tvjhf.exe235⤵PID:1672
-
\??\c:\jvbdb.exec:\jvbdb.exe236⤵PID:344
-
\??\c:\tpfjr.exec:\tpfjr.exe237⤵PID:2160
-
\??\c:\tlnff.exec:\tlnff.exe238⤵PID:908
-
\??\c:\lnlbnh.exec:\lnlbnh.exe239⤵PID:1808
-
\??\c:\fhtdnn.exec:\fhtdnn.exe240⤵PID:1400
-
\??\c:\ndrbf.exec:\ndrbf.exe241⤵PID:2444
-
\??\c:\jxhfx.exec:\jxhfx.exe242⤵PID:948