Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 10:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
323825cd6d0fd6f5ba630760cc43f3a2b8c02dcee7c58ace0acb09fd07fc9b34_NeikiAnalytics.exe
Resource
win7-20240215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
323825cd6d0fd6f5ba630760cc43f3a2b8c02dcee7c58ace0acb09fd07fc9b34_NeikiAnalytics.exe
-
Size
389KB
-
MD5
d46a6b3aac7717a3a24e7756ce0ee5d0
-
SHA1
4291f2e96f04511262f6ba6af85ca14d5cfdbffa
-
SHA256
323825cd6d0fd6f5ba630760cc43f3a2b8c02dcee7c58ace0acb09fd07fc9b34
-
SHA512
bd6f5741998253ea1c6cf1125689e487df24ed29b2db813ec803335dc6947ab5b11f28c973d4b48d6be6132eb539b206366c79c46eecee1ba6444e3af0aadf0b
-
SSDEEP
6144:Acm7ImGddX5WrXF5lpKGYV0aTk/BO0XJm4UEPOshN/xdKnvP48bmi:m7TcJWjdpKGATTk/jYIOWN/KnnPT
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/2892-6-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2464-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5060-13-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2932-19-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2016-25-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4192-37-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4856-42-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4896-49-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4516-55-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/628-36-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/756-61-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2152-76-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3916-82-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4704-85-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3176-91-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2556-102-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2256-103-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2040-115-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2920-131-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1320-139-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2336-145-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4496-154-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2224-162-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4068-181-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4100-182-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4356-188-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4656-190-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2464-198-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3596-202-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1056-209-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1236-213-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2912-214-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4896-221-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4308-231-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1452-247-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3152-251-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4156-263-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4264-275-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4548-289-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5016-291-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1296-295-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2784-299-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3688-305-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4496-318-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2480-346-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4384-359-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3916-399-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1716-401-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3272-410-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4924-415-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2300-464-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3240-525-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/960-584-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3764-591-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3456-631-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2936-642-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/780-653-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4436-685-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1668-825-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3316-838-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/624-866-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4732-952-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4456-1379-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1600-1771-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
vpppj.exepvdvp.exe3lxrfxx.exehnnhtt.exennhbtt.exevjpjj.exeffrlfff.exexxrlrlr.exetbnhhh.exepdjvv.exenbhbtn.exe5jdpd.exexlrxrrl.exepdjvj.exexxflxrx.exexlxrrll.exeddpdp.exeflfrfxl.exennttnt.exe7vpdv.exennthnh.exerxfrfrl.exexllxlfr.exe1dpjd.exe1rxfrrl.exebnnbnn.exedvpjv.exevjjvd.exebnbnhh.exe3djdj.exexlfxrrr.exehtbhnh.exerxlxxxx.exebbhnhh.exe3llllxr.exefrrfrrf.exebbbnbt.exe7jjvj.exe1pddv.exelxlxfff.exetnhthb.exepvvjv.exelrxlfrf.exeflxrfxf.exetbhbtn.exedpjjd.exedjdpv.exexxlxrlx.exetnhhbt.exetbhtbt.exe1dpdd.exe7rrlxxr.exeflrfxrf.exebbbnhb.exeddvpj.exe1dpdv.exe7xrfrlx.exexrfrffr.exebthnhn.exedppjv.exedpjvp.exexlfrffr.exeflfrflf.exe1tbnnt.exepid process 2464 vpppj.exe 5060 pvdvp.exe 2932 3lxrfxx.exe 2016 hnnhtt.exe 628 nnhbtt.exe 4192 vjpjj.exe 4856 ffrlfff.exe 4896 xxrlrlr.exe 4516 tbnhhh.exe 756 pdjvv.exe 812 nbhbtn.exe 2152 5jdpd.exe 3916 xlrxrrl.exe 4704 pdjvj.exe 3176 xxflxrx.exe 2556 xlxrrll.exe 2256 ddpdp.exe 4928 flfrfxl.exe 2040 nnttnt.exe 2044 7vpdv.exe 692 nnthnh.exe 2920 rxfrfrl.exe 1320 xllxlfr.exe 2336 1dpjd.exe 3032 1rxfrrl.exe 4496 bnnbnn.exe 2224 dvpjv.exe 3040 vjjvd.exe 2324 bnbnhh.exe 4068 3djdj.exe 4100 xlfxrrr.exe 4356 htbhnh.exe 4656 rxlxxxx.exe 2464 bbhnhh.exe 3596 3llllxr.exe 1884 frrfrrf.exe 1056 bbbnbt.exe 1236 7jjvj.exe 2912 1pddv.exe 4856 lxlxfff.exe 4896 tnhthb.exe 712 pvvjv.exe 4308 lrxlfrf.exe 2768 flxrfxf.exe 844 tbhbtn.exe 2436 dpjjd.exe 1168 djdpv.exe 1052 xxlxrlx.exe 1452 tnhhbt.exe 3152 tbhtbt.exe 2292 1dpdd.exe 3176 7rrlxxr.exe 4156 flrfxrf.exe 1188 bbbnhb.exe 4736 ddvpj.exe 4264 1dpdv.exe 4472 7xrfrlx.exe 3428 xrfrffr.exe 1968 bthnhn.exe 4548 dppjv.exe 5016 dpjvp.exe 1296 xlfrffr.exe 2784 flfrflf.exe 3688 1tbnnt.exe -
Processes:
resource yara_rule behavioral2/memory/2892-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2464-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5060-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2932-19-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2016-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4192-37-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4856-42-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4896-49-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4516-55-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/628-36-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/756-61-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2152-76-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3916-82-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4704-85-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3176-91-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2556-96-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2556-102-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2256-103-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2040-115-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2920-131-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1320-139-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2336-145-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4496-154-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2224-162-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4068-174-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4068-181-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4100-182-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4356-188-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4656-190-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2464-198-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3596-202-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1056-209-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1236-213-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2912-214-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4896-221-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4308-231-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1452-247-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3152-251-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2292-255-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4156-263-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4264-275-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4548-285-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4548-289-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5016-291-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1296-295-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2784-299-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3688-305-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4496-318-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2480-346-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4384-359-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3916-399-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1716-401-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3272-410-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4924-415-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3980-454-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2300-464-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1976-498-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1440-514-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3616-518-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3240-525-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1652-529-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/960-584-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3764-591-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3656-613-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
323825cd6d0fd6f5ba630760cc43f3a2b8c02dcee7c58ace0acb09fd07fc9b34_NeikiAnalytics.exevpppj.exepvdvp.exe3lxrfxx.exehnnhtt.exennhbtt.exevjpjj.exeffrlfff.exexxrlrlr.exetbnhhh.exepdjvv.exenbhbtn.exe5jdpd.exexlrxrrl.exepdjvj.exexxflxrx.exexlxrrll.exeddpdp.exeflfrfxl.exennttnt.exe7vpdv.exennthnh.exedescription pid process target process PID 2892 wrote to memory of 2464 2892 323825cd6d0fd6f5ba630760cc43f3a2b8c02dcee7c58ace0acb09fd07fc9b34_NeikiAnalytics.exe vpppj.exe PID 2892 wrote to memory of 2464 2892 323825cd6d0fd6f5ba630760cc43f3a2b8c02dcee7c58ace0acb09fd07fc9b34_NeikiAnalytics.exe vpppj.exe PID 2892 wrote to memory of 2464 2892 323825cd6d0fd6f5ba630760cc43f3a2b8c02dcee7c58ace0acb09fd07fc9b34_NeikiAnalytics.exe vpppj.exe PID 2464 wrote to memory of 5060 2464 vpppj.exe pvdvp.exe PID 2464 wrote to memory of 5060 2464 vpppj.exe pvdvp.exe PID 2464 wrote to memory of 5060 2464 vpppj.exe pvdvp.exe PID 5060 wrote to memory of 2932 5060 pvdvp.exe 3lxrfxx.exe PID 5060 wrote to memory of 2932 5060 pvdvp.exe 3lxrfxx.exe PID 5060 wrote to memory of 2932 5060 pvdvp.exe 3lxrfxx.exe PID 2932 wrote to memory of 2016 2932 3lxrfxx.exe hnnhtt.exe PID 2932 wrote to memory of 2016 2932 3lxrfxx.exe hnnhtt.exe PID 2932 wrote to memory of 2016 2932 3lxrfxx.exe hnnhtt.exe PID 2016 wrote to memory of 628 2016 hnnhtt.exe nnhbtt.exe PID 2016 wrote to memory of 628 2016 hnnhtt.exe nnhbtt.exe PID 2016 wrote to memory of 628 2016 hnnhtt.exe nnhbtt.exe PID 628 wrote to memory of 4192 628 nnhbtt.exe vjpjj.exe PID 628 wrote to memory of 4192 628 nnhbtt.exe vjpjj.exe PID 628 wrote to memory of 4192 628 nnhbtt.exe vjpjj.exe PID 4192 wrote to memory of 4856 4192 vjpjj.exe ffrlfff.exe PID 4192 wrote to memory of 4856 4192 vjpjj.exe ffrlfff.exe PID 4192 wrote to memory of 4856 4192 vjpjj.exe ffrlfff.exe PID 4856 wrote to memory of 4896 4856 ffrlfff.exe xxrlrlr.exe PID 4856 wrote to memory of 4896 4856 ffrlfff.exe xxrlrlr.exe PID 4856 wrote to memory of 4896 4856 ffrlfff.exe xxrlrlr.exe PID 4896 wrote to memory of 4516 4896 xxrlrlr.exe tbnhhh.exe PID 4896 wrote to memory of 4516 4896 xxrlrlr.exe tbnhhh.exe PID 4896 wrote to memory of 4516 4896 xxrlrlr.exe tbnhhh.exe PID 4516 wrote to memory of 756 4516 tbnhhh.exe pdjvv.exe PID 4516 wrote to memory of 756 4516 tbnhhh.exe pdjvv.exe PID 4516 wrote to memory of 756 4516 tbnhhh.exe pdjvv.exe PID 756 wrote to memory of 812 756 pdjvv.exe nbhbtn.exe PID 756 wrote to memory of 812 756 pdjvv.exe nbhbtn.exe PID 756 wrote to memory of 812 756 pdjvv.exe nbhbtn.exe PID 812 wrote to memory of 2152 812 nbhbtn.exe 5jdpd.exe PID 812 wrote to memory of 2152 812 nbhbtn.exe 5jdpd.exe PID 812 wrote to memory of 2152 812 nbhbtn.exe 5jdpd.exe PID 2152 wrote to memory of 3916 2152 5jdpd.exe xlrxrrl.exe PID 2152 wrote to memory of 3916 2152 5jdpd.exe xlrxrrl.exe PID 2152 wrote to memory of 3916 2152 5jdpd.exe xlrxrrl.exe PID 3916 wrote to memory of 4704 3916 xlrxrrl.exe pdjvj.exe PID 3916 wrote to memory of 4704 3916 xlrxrrl.exe pdjvj.exe PID 3916 wrote to memory of 4704 3916 xlrxrrl.exe pdjvj.exe PID 4704 wrote to memory of 3176 4704 pdjvj.exe xxflxrx.exe PID 4704 wrote to memory of 3176 4704 pdjvj.exe xxflxrx.exe PID 4704 wrote to memory of 3176 4704 pdjvj.exe xxflxrx.exe PID 3176 wrote to memory of 2556 3176 xxflxrx.exe xlxrrll.exe PID 3176 wrote to memory of 2556 3176 xxflxrx.exe xlxrrll.exe PID 3176 wrote to memory of 2556 3176 xxflxrx.exe xlxrrll.exe PID 2556 wrote to memory of 2256 2556 xlxrrll.exe ddpdp.exe PID 2556 wrote to memory of 2256 2556 xlxrrll.exe ddpdp.exe PID 2556 wrote to memory of 2256 2556 xlxrrll.exe ddpdp.exe PID 2256 wrote to memory of 4928 2256 ddpdp.exe flfrfxl.exe PID 2256 wrote to memory of 4928 2256 ddpdp.exe flfrfxl.exe PID 2256 wrote to memory of 4928 2256 ddpdp.exe flfrfxl.exe PID 4928 wrote to memory of 2040 4928 flfrfxl.exe nnttnt.exe PID 4928 wrote to memory of 2040 4928 flfrfxl.exe nnttnt.exe PID 4928 wrote to memory of 2040 4928 flfrfxl.exe nnttnt.exe PID 2040 wrote to memory of 2044 2040 nnttnt.exe 7vpdv.exe PID 2040 wrote to memory of 2044 2040 nnttnt.exe 7vpdv.exe PID 2040 wrote to memory of 2044 2040 nnttnt.exe 7vpdv.exe PID 2044 wrote to memory of 692 2044 7vpdv.exe nnthnh.exe PID 2044 wrote to memory of 692 2044 7vpdv.exe nnthnh.exe PID 2044 wrote to memory of 692 2044 7vpdv.exe nnthnh.exe PID 692 wrote to memory of 2920 692 nnthnh.exe rxfrfrl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\323825cd6d0fd6f5ba630760cc43f3a2b8c02dcee7c58ace0acb09fd07fc9b34_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\323825cd6d0fd6f5ba630760cc43f3a2b8c02dcee7c58ace0acb09fd07fc9b34_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\vpppj.exec:\vpppj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvdvp.exec:\pvdvp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3lxrfxx.exec:\3lxrfxx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hnnhtt.exec:\hnnhtt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnhbtt.exec:\nnhbtt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjpjj.exec:\vjpjj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ffrlfff.exec:\ffrlfff.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xxrlrlr.exec:\xxrlrlr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tbnhhh.exec:\tbnhhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdjvv.exec:\pdjvv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbhbtn.exec:\nbhbtn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5jdpd.exec:\5jdpd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xlrxrrl.exec:\xlrxrrl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdjvj.exec:\pdjvj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xxflxrx.exec:\xxflxrx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xlxrrll.exec:\xlxrrll.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddpdp.exec:\ddpdp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\flfrfxl.exec:\flfrfxl.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnttnt.exec:\nnttnt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7vpdv.exec:\7vpdv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnthnh.exec:\nnthnh.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxfrfrl.exec:\rxfrfrl.exe23⤵
- Executes dropped EXE
-
\??\c:\xllxlfr.exec:\xllxlfr.exe24⤵
- Executes dropped EXE
-
\??\c:\1dpjd.exec:\1dpjd.exe25⤵
- Executes dropped EXE
-
\??\c:\1rxfrrl.exec:\1rxfrrl.exe26⤵
- Executes dropped EXE
-
\??\c:\bnnbnn.exec:\bnnbnn.exe27⤵
- Executes dropped EXE
-
\??\c:\dvpjv.exec:\dvpjv.exe28⤵
- Executes dropped EXE
-
\??\c:\vjjvd.exec:\vjjvd.exe29⤵
- Executes dropped EXE
-
\??\c:\bnbnhh.exec:\bnbnhh.exe30⤵
- Executes dropped EXE
-
\??\c:\3djdj.exec:\3djdj.exe31⤵
- Executes dropped EXE
-
\??\c:\xlfxrrr.exec:\xlfxrrr.exe32⤵
- Executes dropped EXE
-
\??\c:\htbhnh.exec:\htbhnh.exe33⤵
- Executes dropped EXE
-
\??\c:\rxlxxxx.exec:\rxlxxxx.exe34⤵
- Executes dropped EXE
-
\??\c:\bbhnhh.exec:\bbhnhh.exe35⤵
- Executes dropped EXE
-
\??\c:\3llllxr.exec:\3llllxr.exe36⤵
- Executes dropped EXE
-
\??\c:\frrfrrf.exec:\frrfrrf.exe37⤵
- Executes dropped EXE
-
\??\c:\bbbnbt.exec:\bbbnbt.exe38⤵
- Executes dropped EXE
-
\??\c:\7jjvj.exec:\7jjvj.exe39⤵
- Executes dropped EXE
-
\??\c:\1pddv.exec:\1pddv.exe40⤵
- Executes dropped EXE
-
\??\c:\lxlxfff.exec:\lxlxfff.exe41⤵
- Executes dropped EXE
-
\??\c:\tnhthb.exec:\tnhthb.exe42⤵
- Executes dropped EXE
-
\??\c:\pvvjv.exec:\pvvjv.exe43⤵
- Executes dropped EXE
-
\??\c:\lrxlfrf.exec:\lrxlfrf.exe44⤵
- Executes dropped EXE
-
\??\c:\flxrfxf.exec:\flxrfxf.exe45⤵
- Executes dropped EXE
-
\??\c:\tbhbtn.exec:\tbhbtn.exe46⤵
- Executes dropped EXE
-
\??\c:\dpjjd.exec:\dpjjd.exe47⤵
- Executes dropped EXE
-
\??\c:\djdpv.exec:\djdpv.exe48⤵
- Executes dropped EXE
-
\??\c:\xxlxrlx.exec:\xxlxrlx.exe49⤵
- Executes dropped EXE
-
\??\c:\tnhhbt.exec:\tnhhbt.exe50⤵
- Executes dropped EXE
-
\??\c:\tbhtbt.exec:\tbhtbt.exe51⤵
- Executes dropped EXE
-
\??\c:\1dpdd.exec:\1dpdd.exe52⤵
- Executes dropped EXE
-
\??\c:\7rrlxxr.exec:\7rrlxxr.exe53⤵
- Executes dropped EXE
-
\??\c:\flrfxrf.exec:\flrfxrf.exe54⤵
- Executes dropped EXE
-
\??\c:\bbbnhb.exec:\bbbnhb.exe55⤵
- Executes dropped EXE
-
\??\c:\ddvpj.exec:\ddvpj.exe56⤵
- Executes dropped EXE
-
\??\c:\1dpdv.exec:\1dpdv.exe57⤵
- Executes dropped EXE
-
\??\c:\7xrfrlx.exec:\7xrfrlx.exe58⤵
- Executes dropped EXE
-
\??\c:\xrfrffr.exec:\xrfrffr.exe59⤵
- Executes dropped EXE
-
\??\c:\bthnhn.exec:\bthnhn.exe60⤵
- Executes dropped EXE
-
\??\c:\dppjv.exec:\dppjv.exe61⤵
- Executes dropped EXE
-
\??\c:\dpjvp.exec:\dpjvp.exe62⤵
- Executes dropped EXE
-
\??\c:\xlfrffr.exec:\xlfrffr.exe63⤵
- Executes dropped EXE
-
\??\c:\flfrflf.exec:\flfrflf.exe64⤵
- Executes dropped EXE
-
\??\c:\1tbnnt.exec:\1tbnnt.exe65⤵
- Executes dropped EXE
-
\??\c:\ttthbt.exec:\ttthbt.exe66⤵
-
\??\c:\jvvpp.exec:\jvvpp.exe67⤵
-
\??\c:\xffrxrf.exec:\xffrxrf.exe68⤵
-
\??\c:\rflrrfr.exec:\rflrrfr.exe69⤵
-
\??\c:\7btnbt.exec:\7btnbt.exe70⤵
-
\??\c:\pvvjv.exec:\pvvjv.exe71⤵
-
\??\c:\vdjpv.exec:\vdjpv.exe72⤵
-
\??\c:\lllxfxr.exec:\lllxfxr.exe73⤵
-
\??\c:\lxrlxlf.exec:\lxrlxlf.exe74⤵
-
\??\c:\bbtnhb.exec:\bbtnhb.exe75⤵
-
\??\c:\jvpdj.exec:\jvpdj.exe76⤵
-
\??\c:\dvdpv.exec:\dvdpv.exe77⤵
-
\??\c:\lllxlfr.exec:\lllxlfr.exe78⤵
-
\??\c:\rlxfxfx.exec:\rlxfxfx.exe79⤵
-
\??\c:\7hbthh.exec:\7hbthh.exe80⤵
-
\??\c:\dpjjd.exec:\dpjjd.exe81⤵
-
\??\c:\dpdvp.exec:\dpdvp.exe82⤵
-
\??\c:\9pjpd.exec:\9pjpd.exe83⤵
-
\??\c:\rfrlrlx.exec:\rfrlrlx.exe84⤵
-
\??\c:\tttnbt.exec:\tttnbt.exe85⤵
-
\??\c:\tbhbnh.exec:\tbhbnh.exe86⤵
-
\??\c:\5vdpp.exec:\5vdpp.exe87⤵
-
\??\c:\pdvjv.exec:\pdvjv.exe88⤵
-
\??\c:\rxlrlfx.exec:\rxlrlfx.exe89⤵
-
\??\c:\bnnbbb.exec:\bnnbbb.exe90⤵
-
\??\c:\btbnth.exec:\btbnth.exe91⤵
-
\??\c:\pdvjv.exec:\pdvjv.exe92⤵
-
\??\c:\9jdvv.exec:\9jdvv.exe93⤵
-
\??\c:\lfrllll.exec:\lfrllll.exe94⤵
-
\??\c:\bhbnhb.exec:\bhbnhb.exe95⤵
-
\??\c:\pdjvp.exec:\pdjvp.exe96⤵
-
\??\c:\jpjvp.exec:\jpjvp.exe97⤵
-
\??\c:\frrflff.exec:\frrflff.exe98⤵
-
\??\c:\xlflfxl.exec:\xlflfxl.exe99⤵
-
\??\c:\httnnb.exec:\httnnb.exe100⤵
-
\??\c:\dpvjj.exec:\dpvjj.exe101⤵
-
\??\c:\ddppv.exec:\ddppv.exe102⤵
-
\??\c:\llfrfxl.exec:\llfrfxl.exe103⤵
-
\??\c:\7xffrlr.exec:\7xffrlr.exe104⤵
-
\??\c:\hhbthb.exec:\hhbthb.exe105⤵
-
\??\c:\1pvjp.exec:\1pvjp.exe106⤵
-
\??\c:\tnthtn.exec:\tnthtn.exe107⤵
-
\??\c:\vjjdv.exec:\vjjdv.exe108⤵
-
\??\c:\rxrrfrl.exec:\rxrrfrl.exe109⤵
-
\??\c:\rrlfrlx.exec:\rrlfrlx.exe110⤵
-
\??\c:\hnbtht.exec:\hnbtht.exe111⤵
-
\??\c:\jvdpd.exec:\jvdpd.exe112⤵
-
\??\c:\dvvpd.exec:\dvvpd.exe113⤵
-
\??\c:\5rlxlfr.exec:\5rlxlfr.exe114⤵
-
\??\c:\bbnbhh.exec:\bbnbhh.exe115⤵
-
\??\c:\bnnhhb.exec:\bnnhhb.exe116⤵
-
\??\c:\pjdvj.exec:\pjdvj.exe117⤵
-
\??\c:\llxrrrl.exec:\llxrrrl.exe118⤵
-
\??\c:\xlxlfxl.exec:\xlxlfxl.exe119⤵
-
\??\c:\ntthtn.exec:\ntthtn.exe120⤵
-
\??\c:\tntttn.exec:\tntttn.exe121⤵
-
\??\c:\djjvv.exec:\djjvv.exe122⤵
-
\??\c:\3vpdv.exec:\3vpdv.exe123⤵
-
\??\c:\rfxlxlx.exec:\rfxlxlx.exe124⤵
-
\??\c:\thtnbn.exec:\thtnbn.exe125⤵
-
\??\c:\5bthtn.exec:\5bthtn.exe126⤵
-
\??\c:\pjpvp.exec:\pjpvp.exe127⤵
-
\??\c:\frrfrlf.exec:\frrfrlf.exe128⤵
-
\??\c:\1xxllff.exec:\1xxllff.exe129⤵
-
\??\c:\htnbnh.exec:\htnbnh.exe130⤵
-
\??\c:\hhbhtn.exec:\hhbhtn.exe131⤵
-
\??\c:\pjpjv.exec:\pjpjv.exe132⤵
-
\??\c:\3lfrxxl.exec:\3lfrxxl.exe133⤵
-
\??\c:\5xxlxrf.exec:\5xxlxrf.exe134⤵
-
\??\c:\hthhth.exec:\hthhth.exe135⤵
-
\??\c:\jdpjv.exec:\jdpjv.exe136⤵
-
\??\c:\xlfxlfr.exec:\xlfxlfr.exe137⤵
-
\??\c:\bhhthh.exec:\bhhthh.exe138⤵
-
\??\c:\hthbnh.exec:\hthbnh.exe139⤵
-
\??\c:\dpdpd.exec:\dpdpd.exe140⤵
-
\??\c:\7rxlxrr.exec:\7rxlxrr.exe141⤵
-
\??\c:\ffflxrl.exec:\ffflxrl.exe142⤵
-
\??\c:\htbhht.exec:\htbhht.exe143⤵
-
\??\c:\bbthbt.exec:\bbthbt.exe144⤵
-
\??\c:\vjvjv.exec:\vjvjv.exe145⤵
-
\??\c:\rlfrffx.exec:\rlfrffx.exe146⤵
-
\??\c:\bththt.exec:\bththt.exe147⤵
-
\??\c:\3nbnhn.exec:\3nbnhn.exe148⤵
-
\??\c:\dpjvj.exec:\dpjvj.exe149⤵
-
\??\c:\fxrxlxl.exec:\fxrxlxl.exe150⤵
-
\??\c:\hbhbnh.exec:\hbhbnh.exe151⤵
-
\??\c:\hbtbhn.exec:\hbtbhn.exe152⤵
-
\??\c:\dvdpv.exec:\dvdpv.exe153⤵
-
\??\c:\dvvpd.exec:\dvvpd.exe154⤵
-
\??\c:\rffrlfr.exec:\rffrlfr.exe155⤵
-
\??\c:\7nnbnb.exec:\7nnbnb.exe156⤵
-
\??\c:\vdvvv.exec:\vdvvv.exe157⤵
-
\??\c:\9xrfrll.exec:\9xrfrll.exe158⤵
-
\??\c:\xfxlfrf.exec:\xfxlfrf.exe159⤵
-
\??\c:\tbbnht.exec:\tbbnht.exe160⤵
-
\??\c:\tnhbnh.exec:\tnhbnh.exe161⤵
-
\??\c:\pdvvj.exec:\pdvvj.exe162⤵
-
\??\c:\rffrfxf.exec:\rffrfxf.exe163⤵
-
\??\c:\rxrfrrl.exec:\rxrfrrl.exe164⤵
-
\??\c:\nbnbtn.exec:\nbnbtn.exe165⤵
-
\??\c:\jvdpp.exec:\jvdpp.exe166⤵
-
\??\c:\xlxxxfl.exec:\xlxxxfl.exe167⤵
-
\??\c:\lrfllxx.exec:\lrfllxx.exe168⤵
-
\??\c:\btbnht.exec:\btbnht.exe169⤵
-
\??\c:\btbntn.exec:\btbntn.exe170⤵
-
\??\c:\5pvjv.exec:\5pvjv.exe171⤵
-
\??\c:\flflrlr.exec:\flflrlr.exe172⤵
-
\??\c:\bnbtht.exec:\bnbtht.exe173⤵
-
\??\c:\djdvp.exec:\djdvp.exe174⤵
-
\??\c:\xfrrlxx.exec:\xfrrlxx.exe175⤵
-
\??\c:\5xrrxfr.exec:\5xrrxfr.exe176⤵
-
\??\c:\bbtnbt.exec:\bbtnbt.exe177⤵
-
\??\c:\vjpdp.exec:\vjpdp.exe178⤵
-
\??\c:\dpjvj.exec:\dpjvj.exe179⤵
-
\??\c:\fxrflfr.exec:\fxrflfr.exe180⤵
-
\??\c:\bnnbnh.exec:\bnnbnh.exe181⤵
-
\??\c:\1bthtn.exec:\1bthtn.exe182⤵
-
\??\c:\dpvjd.exec:\dpvjd.exe183⤵
-
\??\c:\jjdvj.exec:\jjdvj.exe184⤵
-
\??\c:\xxlfrlf.exec:\xxlfrlf.exe185⤵
-
\??\c:\5hthth.exec:\5hthth.exe186⤵
-
\??\c:\hhbnbn.exec:\hhbnbn.exe187⤵
-
\??\c:\dddpd.exec:\dddpd.exe188⤵
-
\??\c:\5xrlrlf.exec:\5xrlrlf.exe189⤵
-
\??\c:\5frfrfr.exec:\5frfrfr.exe190⤵
-
\??\c:\1tbthb.exec:\1tbthb.exe191⤵
-
\??\c:\3jvpd.exec:\3jvpd.exe192⤵
-
\??\c:\pppjd.exec:\pppjd.exe193⤵
-
\??\c:\5frlxrl.exec:\5frlxrl.exe194⤵
-
\??\c:\lxxlxlx.exec:\lxxlxlx.exe195⤵
-
\??\c:\nbtnbt.exec:\nbtnbt.exe196⤵
-
\??\c:\djdpd.exec:\djdpd.exe197⤵
-
\??\c:\vdvpd.exec:\vdvpd.exe198⤵
-
\??\c:\frxlxrx.exec:\frxlxrx.exe199⤵
-
\??\c:\lxrxlfr.exec:\lxrxlfr.exe200⤵
-
\??\c:\bnhtht.exec:\bnhtht.exe201⤵
-
\??\c:\vjdvp.exec:\vjdvp.exe202⤵
-
\??\c:\llrfrrf.exec:\llrfrrf.exe203⤵
-
\??\c:\hbhhnn.exec:\hbhhnn.exe204⤵
-
\??\c:\3dvpd.exec:\3dvpd.exe205⤵
-
\??\c:\dppjd.exec:\dppjd.exe206⤵
-
\??\c:\xlfrfrr.exec:\xlfrfrr.exe207⤵
-
\??\c:\xxxrllf.exec:\xxxrllf.exe208⤵
-
\??\c:\bthntt.exec:\bthntt.exe209⤵
-
\??\c:\9vpjd.exec:\9vpjd.exe210⤵
-
\??\c:\9pjdd.exec:\9pjdd.exe211⤵
-
\??\c:\rrfrlff.exec:\rrfrlff.exe212⤵
-
\??\c:\fxxfrxl.exec:\fxxfrxl.exe213⤵
-
\??\c:\tnhhtt.exec:\tnhhtt.exe214⤵
-
\??\c:\dvvpj.exec:\dvvpj.exe215⤵
-
\??\c:\pdjdv.exec:\pdjdv.exe216⤵
-
\??\c:\xflfrxr.exec:\xflfrxr.exe217⤵
-
\??\c:\nbtnbh.exec:\nbtnbh.exe218⤵
-
\??\c:\pddjv.exec:\pddjv.exe219⤵
-
\??\c:\5lxrxrf.exec:\5lxrxrf.exe220⤵
-
\??\c:\5nnnhn.exec:\5nnnhn.exe221⤵
-
\??\c:\9hhbhh.exec:\9hhbhh.exe222⤵
-
\??\c:\1ppvv.exec:\1ppvv.exe223⤵
-
\??\c:\lxfrxfx.exec:\lxfrxfx.exe224⤵
-
\??\c:\rxxlxrf.exec:\rxxlxrf.exe225⤵
-
\??\c:\nnbhnn.exec:\nnbhnn.exe226⤵
-
\??\c:\5pvjp.exec:\5pvjp.exe227⤵
-
\??\c:\rrffrrl.exec:\rrffrrl.exe228⤵
-
\??\c:\rrrfrlx.exec:\rrrfrlx.exe229⤵
-
\??\c:\hbbbtt.exec:\hbbbtt.exe230⤵
-
\??\c:\bhbtbb.exec:\bhbtbb.exe231⤵
-
\??\c:\ppvdj.exec:\ppvdj.exe232⤵
-
\??\c:\xlxrffx.exec:\xlxrffx.exe233⤵
-
\??\c:\9rrrrxr.exec:\9rrrrxr.exe234⤵
-
\??\c:\htthbb.exec:\htthbb.exe235⤵
-
\??\c:\djvjp.exec:\djvjp.exe236⤵
-
\??\c:\flrrfff.exec:\flrrfff.exe237⤵
-
\??\c:\lxxrflx.exec:\lxxrflx.exe238⤵
-
\??\c:\bhnbth.exec:\bhnbth.exe239⤵
-
\??\c:\jpvjp.exec:\jpvjp.exe240⤵
-
\??\c:\5fxrllf.exec:\5fxrllf.exe241⤵