Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 13:26
Behavioral task
behavioral1
Sample
55233345c4166d0d340d8070a494990945c8a3a40ecf3d9c4a21e74ea2c348e5_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
55233345c4166d0d340d8070a494990945c8a3a40ecf3d9c4a21e74ea2c348e5_NeikiAnalytics.exe
-
Size
464KB
-
MD5
a5e048590ae0b3dadad860f2c26384f0
-
SHA1
95173bf1fc5567a7c718e9dc4a50ba7ba2b7322e
-
SHA256
55233345c4166d0d340d8070a494990945c8a3a40ecf3d9c4a21e74ea2c348e5
-
SHA512
a22f0ba0bbf3e25603d178eb7c154987b510c9a42d79d1de14b744675f998e04e3dc305bc2f286a4cca511d5c541c74c3afe948540c6ed047e8ac1d7b340ce4a
-
SSDEEP
12288:J4wFHoSTeR0oQRkay+eFp3IDvSbh5nPVP+OKaf1V/:VeR0oykayRFp3lztP+OKaf1V/
Malware Config
Signatures
-
Detect Blackmoon payload 42 IoCs
Processes:
resource yara_rule behavioral1/memory/1952-1-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2000-16-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/3000-19-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2772-47-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2572-70-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2980-112-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1756-148-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2680-164-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/684-173-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/696-226-0x0000000000220000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/944-244-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2600-324-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2524-364-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2796-424-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1788-489-0x00000000002C0000-0x00000000002FA000-memory.dmp family_blackmoon behavioral1/memory/2408-540-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1056-713-0x00000000005D0000-0x000000000060A000-memory.dmp family_blackmoon behavioral1/memory/1736-813-0x00000000001B0000-0x00000000001EA000-memory.dmp family_blackmoon behavioral1/memory/2920-970-0x0000000000220000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/1488-983-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2944-944-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1616-570-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2408-547-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1788-527-0x00000000002C0000-0x00000000002FA000-memory.dmp family_blackmoon behavioral1/memory/1816-482-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1488-450-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1028-423-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2924-384-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1540-345-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2564-325-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1708-303-0x0000000077240000-0x000000007735F000-memory.dmp family_blackmoon behavioral1/memory/1740-279-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/712-269-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2304-201-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1652-192-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1732-131-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1936-129-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2120-87-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2524-79-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2812-66-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1540-57-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2604-35-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule behavioral1/memory/1952-1-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\8240662.exe family_berbew behavioral1/memory/2000-8-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\9lffrrf.exe family_berbew behavioral1/memory/2000-16-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/3000-19-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\a8628.exe family_berbew behavioral1/memory/2604-27-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\lfrfxxf.exe family_berbew behavioral1/memory/2772-38-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2772-47-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\046244.exe family_berbew \??\c:\g6408.exe family_berbew behavioral1/memory/2812-58-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2572-70-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\2028006.exe family_berbew \??\c:\a0846.exe family_berbew C:\hhhnbb.exe family_berbew behavioral1/memory/2980-112-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/1936-120-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\26462.exe family_berbew \??\c:\24628.exe family_berbew C:\vvpjd.exe family_berbew behavioral1/memory/1756-148-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\jdvpd.exe family_berbew behavioral1/memory/2680-164-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/684-173-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\k82208.exe family_berbew C:\400002.exe family_berbew C:\vpjpj.exe family_berbew C:\thbbnn.exe family_berbew \??\c:\2684228.exe family_berbew \??\c:\64284.exe family_berbew behavioral1/memory/696-226-0x0000000000220000-0x000000000025A000-memory.dmp family_berbew behavioral1/memory/944-244-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\q26806.exe family_berbew behavioral1/memory/712-262-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\vvjvp.exe family_berbew \??\c:\e48022.exe family_berbew behavioral1/memory/2600-324-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2864-332-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2524-364-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2712-371-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2740-385-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2796-424-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/1788-489-0x00000000002C0000-0x00000000002FA000-memory.dmp family_berbew behavioral1/memory/924-514-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2408-540-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2924-639-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2944-937-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2480-951-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/1488-983-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2944-944-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2396-800-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/1240-787-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/1556-756-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/1616-570-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2212-548-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2408-547-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/1788-527-0x00000000002C0000-0x00000000002FA000-memory.dmp family_berbew behavioral1/memory/1816-482-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/1488-450-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/1028-423-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2924-384-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew -
Executes dropped EXE 64 IoCs
Processes:
8240662.exe9lffrrf.exea8628.exelfrfxxf.exe046244.exeg6408.exenbntnt.exe2028006.exe2684680.exea0846.exehhhnbb.exe24628.exe26462.exe260620.exevvpjd.exevvpvd.exejdvpd.exehbhhtb.exek82208.exe400002.exevpjpj.exethbbnn.exe2684228.exe64284.exe202806.exe6684040.exe64284.exeq26806.exehbtthh.exetnntnn.exevvjvp.exee48022.exe08622.exefxllllx.exe9jvvv.exek86688.exe2462068.exe048440.exe0424280.exerfxrrrf.exe646622.exevpjpj.exes2006.exe9lffllr.exe0484028.exe424448.exe9rfffff.exefxlrxrx.exe42028.exe08040.exerfrxlfl.exe4802048.exe042402.exebnbthh.exe646888.exebbnbtb.exee80626.exe60802.exeddpdp.exes8626.exeu644028.exe0462006.exepjddp.exehthhnh.exepid process 2000 8240662.exe 3000 9lffrrf.exe 2604 a8628.exe 2772 lfrfxxf.exe 1540 046244.exe 2812 g6408.exe 2572 nbntnt.exe 2524 2028006.exe 2120 2684680.exe 2024 a0846.exe 2684 hhhnbb.exe 2980 24628.exe 1936 26462.exe 1732 260620.exe 1696 vvpjd.exe 1756 vvpvd.exe 2680 jdvpd.exe 684 hbhhtb.exe 1056 k82208.exe 1964 400002.exe 1652 vpjpj.exe 2304 thbbnn.exe 2256 2684228.exe 696 64284.exe 408 202806.exe 1524 6684040.exe 944 64284.exe 1240 q26806.exe 712 hbtthh.exe 1740 tnntnn.exe 2244 vvjvp.exe 1516 e48022.exe 1952 08622.exe 1708 fxllllx.exe 2836 9jvvv.exe 2600 k86688.exe 2564 2462068.exe 2864 048440.exe 1540 0424280.exe 2812 rfxrrrf.exe 2752 646622.exe 2524 vpjpj.exe 2236 s2006.exe 2712 9lffllr.exe 2924 0484028.exe 2740 424448.exe 108 9rfffff.exe 2968 fxlrxrx.exe 1936 42028.exe 240 08040.exe 1028 rfrxlfl.exe 2796 4802048.exe 2700 042402.exe 536 bnbthh.exe 1488 646888.exe 1032 bbnbtb.exe 1964 e80626.exe 1508 60802.exe 1776 ddpdp.exe 1816 s8626.exe 1788 u644028.exe 1300 0462006.exe 2340 pjddp.exe 976 hthhnh.exe -
Processes:
resource yara_rule behavioral1/memory/1952-1-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\8240662.exe upx behavioral1/memory/2000-8-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\9lffrrf.exe upx behavioral1/memory/2000-16-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/3000-19-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\a8628.exe upx behavioral1/memory/2604-27-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\lfrfxxf.exe upx behavioral1/memory/2772-38-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2772-47-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\046244.exe upx \??\c:\g6408.exe upx behavioral1/memory/2812-58-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2572-70-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\2028006.exe upx \??\c:\a0846.exe upx C:\hhhnbb.exe upx behavioral1/memory/2980-112-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1936-120-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\26462.exe upx \??\c:\24628.exe upx C:\vvpjd.exe upx behavioral1/memory/1756-148-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\jdvpd.exe upx behavioral1/memory/2680-164-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/684-173-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\k82208.exe upx C:\400002.exe upx C:\vpjpj.exe upx C:\thbbnn.exe upx \??\c:\2684228.exe upx \??\c:\64284.exe upx behavioral1/memory/944-244-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\q26806.exe upx behavioral1/memory/712-262-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\vvjvp.exe upx \??\c:\e48022.exe upx behavioral1/memory/2600-324-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2864-332-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2524-364-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2712-371-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2740-385-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2796-424-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/924-514-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2408-540-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1616-577-0x00000000003B0000-0x00000000003EA000-memory.dmp upx behavioral1/memory/2924-639-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1056-713-0x00000000005D0000-0x000000000060A000-memory.dmp upx behavioral1/memory/2944-937-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2480-951-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1488-983-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2944-944-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2396-800-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1240-787-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1556-756-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1616-570-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2212-548-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2408-547-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1816-482-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1488-450-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1028-423-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2924-384-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1540-345-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
55233345c4166d0d340d8070a494990945c8a3a40ecf3d9c4a21e74ea2c348e5_NeikiAnalytics.exe8240662.exe9lffrrf.exea8628.exelfrfxxf.exe046244.exeg6408.exenbntnt.exe2028006.exe2684680.exea0846.exehhhnbb.exe24628.exe26462.exe260620.exevvpjd.exedescription pid process target process PID 1952 wrote to memory of 2000 1952 55233345c4166d0d340d8070a494990945c8a3a40ecf3d9c4a21e74ea2c348e5_NeikiAnalytics.exe 00464.exe PID 1952 wrote to memory of 2000 1952 55233345c4166d0d340d8070a494990945c8a3a40ecf3d9c4a21e74ea2c348e5_NeikiAnalytics.exe 00464.exe PID 1952 wrote to memory of 2000 1952 55233345c4166d0d340d8070a494990945c8a3a40ecf3d9c4a21e74ea2c348e5_NeikiAnalytics.exe 00464.exe PID 1952 wrote to memory of 2000 1952 55233345c4166d0d340d8070a494990945c8a3a40ecf3d9c4a21e74ea2c348e5_NeikiAnalytics.exe 00464.exe PID 2000 wrote to memory of 3000 2000 8240662.exe 9lffrrf.exe PID 2000 wrote to memory of 3000 2000 8240662.exe 9lffrrf.exe PID 2000 wrote to memory of 3000 2000 8240662.exe 9lffrrf.exe PID 2000 wrote to memory of 3000 2000 8240662.exe 9lffrrf.exe PID 3000 wrote to memory of 2604 3000 9lffrrf.exe lxxxllx.exe PID 3000 wrote to memory of 2604 3000 9lffrrf.exe lxxxllx.exe PID 3000 wrote to memory of 2604 3000 9lffrrf.exe lxxxllx.exe PID 3000 wrote to memory of 2604 3000 9lffrrf.exe lxxxllx.exe PID 2604 wrote to memory of 2772 2604 a8628.exe lfrfxxf.exe PID 2604 wrote to memory of 2772 2604 a8628.exe lfrfxxf.exe PID 2604 wrote to memory of 2772 2604 a8628.exe lfrfxxf.exe PID 2604 wrote to memory of 2772 2604 a8628.exe lfrfxxf.exe PID 2772 wrote to memory of 1540 2772 lfrfxxf.exe 0424280.exe PID 2772 wrote to memory of 1540 2772 lfrfxxf.exe 0424280.exe PID 2772 wrote to memory of 1540 2772 lfrfxxf.exe 0424280.exe PID 2772 wrote to memory of 1540 2772 lfrfxxf.exe 0424280.exe PID 1540 wrote to memory of 2812 1540 046244.exe g6408.exe PID 1540 wrote to memory of 2812 1540 046244.exe g6408.exe PID 1540 wrote to memory of 2812 1540 046244.exe g6408.exe PID 1540 wrote to memory of 2812 1540 046244.exe g6408.exe PID 2812 wrote to memory of 2572 2812 g6408.exe nbntnt.exe PID 2812 wrote to memory of 2572 2812 g6408.exe nbntnt.exe PID 2812 wrote to memory of 2572 2812 g6408.exe nbntnt.exe PID 2812 wrote to memory of 2572 2812 g6408.exe nbntnt.exe PID 2572 wrote to memory of 2524 2572 nbntnt.exe 2028006.exe PID 2572 wrote to memory of 2524 2572 nbntnt.exe 2028006.exe PID 2572 wrote to memory of 2524 2572 nbntnt.exe 2028006.exe PID 2572 wrote to memory of 2524 2572 nbntnt.exe 2028006.exe PID 2524 wrote to memory of 2120 2524 2028006.exe 2684680.exe PID 2524 wrote to memory of 2120 2524 2028006.exe 2684680.exe PID 2524 wrote to memory of 2120 2524 2028006.exe 2684680.exe PID 2524 wrote to memory of 2120 2524 2028006.exe 2684680.exe PID 2120 wrote to memory of 2024 2120 2684680.exe a0846.exe PID 2120 wrote to memory of 2024 2120 2684680.exe a0846.exe PID 2120 wrote to memory of 2024 2120 2684680.exe a0846.exe PID 2120 wrote to memory of 2024 2120 2684680.exe a0846.exe PID 2024 wrote to memory of 2684 2024 a0846.exe hhhnbb.exe PID 2024 wrote to memory of 2684 2024 a0846.exe hhhnbb.exe PID 2024 wrote to memory of 2684 2024 a0846.exe hhhnbb.exe PID 2024 wrote to memory of 2684 2024 a0846.exe hhhnbb.exe PID 2684 wrote to memory of 2980 2684 hhhnbb.exe 24628.exe PID 2684 wrote to memory of 2980 2684 hhhnbb.exe 24628.exe PID 2684 wrote to memory of 2980 2684 hhhnbb.exe 24628.exe PID 2684 wrote to memory of 2980 2684 hhhnbb.exe 24628.exe PID 2980 wrote to memory of 1936 2980 24628.exe 42028.exe PID 2980 wrote to memory of 1936 2980 24628.exe 42028.exe PID 2980 wrote to memory of 1936 2980 24628.exe 42028.exe PID 2980 wrote to memory of 1936 2980 24628.exe 42028.exe PID 1936 wrote to memory of 1732 1936 26462.exe 260620.exe PID 1936 wrote to memory of 1732 1936 26462.exe 260620.exe PID 1936 wrote to memory of 1732 1936 26462.exe 260620.exe PID 1936 wrote to memory of 1732 1936 26462.exe 260620.exe PID 1732 wrote to memory of 1696 1732 260620.exe vvpjd.exe PID 1732 wrote to memory of 1696 1732 260620.exe vvpjd.exe PID 1732 wrote to memory of 1696 1732 260620.exe vvpjd.exe PID 1732 wrote to memory of 1696 1732 260620.exe vvpjd.exe PID 1696 wrote to memory of 1756 1696 vvpjd.exe vvpvd.exe PID 1696 wrote to memory of 1756 1696 vvpjd.exe vvpvd.exe PID 1696 wrote to memory of 1756 1696 vvpjd.exe vvpvd.exe PID 1696 wrote to memory of 1756 1696 vvpjd.exe vvpvd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55233345c4166d0d340d8070a494990945c8a3a40ecf3d9c4a21e74ea2c348e5_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\55233345c4166d0d340d8070a494990945c8a3a40ecf3d9c4a21e74ea2c348e5_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\8240662.exec:\8240662.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9lffrrf.exec:\9lffrrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\a8628.exec:\a8628.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfrfxxf.exec:\lfrfxxf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\046244.exec:\046244.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\g6408.exec:\g6408.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbntnt.exec:\nbntnt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\2028006.exec:\2028006.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\2684680.exec:\2684680.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\a0846.exec:\a0846.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hhhnbb.exec:\hhhnbb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\24628.exec:\24628.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\26462.exec:\26462.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\260620.exec:\260620.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvpjd.exec:\vvpjd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvpvd.exec:\vvpvd.exe17⤵
- Executes dropped EXE
-
\??\c:\jdvpd.exec:\jdvpd.exe18⤵
- Executes dropped EXE
-
\??\c:\hbhhtb.exec:\hbhhtb.exe19⤵
- Executes dropped EXE
-
\??\c:\k82208.exec:\k82208.exe20⤵
- Executes dropped EXE
-
\??\c:\400002.exec:\400002.exe21⤵
- Executes dropped EXE
-
\??\c:\vpjpj.exec:\vpjpj.exe22⤵
- Executes dropped EXE
-
\??\c:\thbbnn.exec:\thbbnn.exe23⤵
- Executes dropped EXE
-
\??\c:\2684228.exec:\2684228.exe24⤵
- Executes dropped EXE
-
\??\c:\64284.exec:\64284.exe25⤵
- Executes dropped EXE
-
\??\c:\202806.exec:\202806.exe26⤵
- Executes dropped EXE
-
\??\c:\6684040.exec:\6684040.exe27⤵
- Executes dropped EXE
-
\??\c:\64284.exec:\64284.exe28⤵
- Executes dropped EXE
-
\??\c:\q26806.exec:\q26806.exe29⤵
- Executes dropped EXE
-
\??\c:\hbtthh.exec:\hbtthh.exe30⤵
- Executes dropped EXE
-
\??\c:\tnntnn.exec:\tnntnn.exe31⤵
- Executes dropped EXE
-
\??\c:\vvjvp.exec:\vvjvp.exe32⤵
- Executes dropped EXE
-
\??\c:\e48022.exec:\e48022.exe33⤵
- Executes dropped EXE
-
\??\c:\08622.exec:\08622.exe34⤵
- Executes dropped EXE
-
\??\c:\fxllllx.exec:\fxllllx.exe35⤵
- Executes dropped EXE
-
\??\c:\20464.exec:\20464.exe36⤵
-
\??\c:\9jvvv.exec:\9jvvv.exe37⤵
- Executes dropped EXE
-
\??\c:\k86688.exec:\k86688.exe38⤵
- Executes dropped EXE
-
\??\c:\2462068.exec:\2462068.exe39⤵
- Executes dropped EXE
-
\??\c:\048440.exec:\048440.exe40⤵
- Executes dropped EXE
-
\??\c:\0424280.exec:\0424280.exe41⤵
- Executes dropped EXE
-
\??\c:\rfxrrrf.exec:\rfxrrrf.exe42⤵
- Executes dropped EXE
-
\??\c:\646622.exec:\646622.exe43⤵
- Executes dropped EXE
-
\??\c:\vpjpj.exec:\vpjpj.exe44⤵
- Executes dropped EXE
-
\??\c:\s2006.exec:\s2006.exe45⤵
- Executes dropped EXE
-
\??\c:\9lffllr.exec:\9lffllr.exe46⤵
- Executes dropped EXE
-
\??\c:\0484028.exec:\0484028.exe47⤵
- Executes dropped EXE
-
\??\c:\424448.exec:\424448.exe48⤵
- Executes dropped EXE
-
\??\c:\9rfffff.exec:\9rfffff.exe49⤵
- Executes dropped EXE
-
\??\c:\fxlrxrx.exec:\fxlrxrx.exe50⤵
- Executes dropped EXE
-
\??\c:\42028.exec:\42028.exe51⤵
- Executes dropped EXE
-
\??\c:\08040.exec:\08040.exe52⤵
- Executes dropped EXE
-
\??\c:\rfrxlfl.exec:\rfrxlfl.exe53⤵
- Executes dropped EXE
-
\??\c:\4802048.exec:\4802048.exe54⤵
- Executes dropped EXE
-
\??\c:\042402.exec:\042402.exe55⤵
- Executes dropped EXE
-
\??\c:\bnbthh.exec:\bnbthh.exe56⤵
- Executes dropped EXE
-
\??\c:\646888.exec:\646888.exe57⤵
- Executes dropped EXE
-
\??\c:\bbnbtb.exec:\bbnbtb.exe58⤵
- Executes dropped EXE
-
\??\c:\e80626.exec:\e80626.exe59⤵
- Executes dropped EXE
-
\??\c:\60802.exec:\60802.exe60⤵
- Executes dropped EXE
-
\??\c:\ddpdp.exec:\ddpdp.exe61⤵
- Executes dropped EXE
-
\??\c:\s8626.exec:\s8626.exe62⤵
- Executes dropped EXE
-
\??\c:\u644028.exec:\u644028.exe63⤵
- Executes dropped EXE
-
\??\c:\0462006.exec:\0462006.exe64⤵
- Executes dropped EXE
-
\??\c:\pjddp.exec:\pjddp.exe65⤵
- Executes dropped EXE
-
\??\c:\hthhnh.exec:\hthhnh.exe66⤵
- Executes dropped EXE
-
\??\c:\g8446.exec:\g8446.exe67⤵
-
\??\c:\o004044.exec:\o004044.exe68⤵
-
\??\c:\g0846.exec:\g0846.exe69⤵
-
\??\c:\7htbbb.exec:\7htbbb.exe70⤵
-
\??\c:\5rflxfx.exec:\5rflxfx.exe71⤵
-
\??\c:\w20006.exec:\w20006.exe72⤵
-
\??\c:\flxrffl.exec:\flxrffl.exe73⤵
-
\??\c:\00464.exec:\00464.exe74⤵
-
\??\c:\u606402.exec:\u606402.exe75⤵
-
\??\c:\hbbhnt.exec:\hbbhnt.exe76⤵
-
\??\c:\60842.exec:\60842.exe77⤵
-
\??\c:\frxxflr.exec:\frxxflr.exe78⤵
-
\??\c:\04624.exec:\04624.exe79⤵
-
\??\c:\266240.exec:\266240.exe80⤵
-
\??\c:\fxlrxfr.exec:\fxlrxfr.exe81⤵
-
\??\c:\pppdp.exec:\pppdp.exe82⤵
-
\??\c:\2602620.exec:\2602620.exe83⤵
-
\??\c:\xrffflr.exec:\xrffflr.exe84⤵
-
\??\c:\2640620.exec:\2640620.exe85⤵
-
\??\c:\rlxrlll.exec:\rlxrlll.exe86⤵
-
\??\c:\dvvpv.exec:\dvvpv.exe87⤵
-
\??\c:\604628.exec:\604628.exe88⤵
-
\??\c:\6828480.exec:\6828480.exe89⤵
-
\??\c:\pdvvv.exec:\pdvvv.exe90⤵
-
\??\c:\tthhnn.exec:\tthhnn.exe91⤵
-
\??\c:\nhtthb.exec:\nhtthb.exe92⤵
-
\??\c:\5bnntt.exec:\5bnntt.exe93⤵
-
\??\c:\0466402.exec:\0466402.exe94⤵
-
\??\c:\6428606.exec:\6428606.exe95⤵
-
\??\c:\1rlrxxl.exec:\1rlrxxl.exe96⤵
-
\??\c:\0424668.exec:\0424668.exe97⤵
-
\??\c:\1frrxxx.exec:\1frrxxx.exe98⤵
-
\??\c:\c642880.exec:\c642880.exe99⤵
-
\??\c:\42624.exec:\42624.exe100⤵
-
\??\c:\4202882.exec:\4202882.exe101⤵
-
\??\c:\nbbbhh.exec:\nbbbhh.exe102⤵
-
\??\c:\3jjpd.exec:\3jjpd.exe103⤵
-
\??\c:\046240.exec:\046240.exe104⤵
-
\??\c:\7ntnhn.exec:\7ntnhn.exe105⤵
-
\??\c:\4200664.exec:\4200664.exe106⤵
-
\??\c:\5tnttn.exec:\5tnttn.exe107⤵
-
\??\c:\608400.exec:\608400.exe108⤵
-
\??\c:\482206.exec:\482206.exe109⤵
-
\??\c:\s8888.exec:\s8888.exe110⤵
-
\??\c:\424684.exec:\424684.exe111⤵
-
\??\c:\4868624.exec:\4868624.exe112⤵
-
\??\c:\1xrrxfr.exec:\1xrrxfr.exe113⤵
-
\??\c:\djjvv.exec:\djjvv.exe114⤵
-
\??\c:\tnbbnn.exec:\tnbbnn.exe115⤵
-
\??\c:\c266446.exec:\c266446.exe116⤵
-
\??\c:\646288.exec:\646288.exe117⤵
-
\??\c:\0462442.exec:\0462442.exe118⤵
-
\??\c:\nhbbhn.exec:\nhbbhn.exe119⤵
-
\??\c:\3tnhnn.exec:\3tnhnn.exe120⤵
-
\??\c:\86484.exec:\86484.exe121⤵
-
\??\c:\u426288.exec:\u426288.exe122⤵
-
\??\c:\lxxxllx.exec:\lxxxllx.exe123⤵
-
\??\c:\1hnttb.exec:\1hnttb.exe124⤵
-
\??\c:\820684.exec:\820684.exe125⤵
-
\??\c:\o484064.exec:\o484064.exe126⤵
-
\??\c:\rfrrffl.exec:\rfrrffl.exe127⤵
-
\??\c:\s6468.exec:\s6468.exe128⤵
-
\??\c:\2062406.exec:\2062406.exe129⤵
-
\??\c:\nhbnbb.exec:\nhbnbb.exe130⤵
-
\??\c:\26060.exec:\26060.exe131⤵
-
\??\c:\a0220.exec:\a0220.exe132⤵
-
\??\c:\2022880.exec:\2022880.exe133⤵
-
\??\c:\xrlxffr.exec:\xrlxffr.exe134⤵
-
\??\c:\646244.exec:\646244.exe135⤵
-
\??\c:\m6446.exec:\m6446.exe136⤵
-
\??\c:\jdvdj.exec:\jdvdj.exe137⤵
-
\??\c:\fxllllr.exec:\fxllllr.exe138⤵
-
\??\c:\jdppp.exec:\jdppp.exe139⤵
-
\??\c:\pdpdd.exec:\pdpdd.exe140⤵
-
\??\c:\bbnhhh.exec:\bbnhhh.exe141⤵
-
\??\c:\4680224.exec:\4680224.exe142⤵
-
\??\c:\nhbbtt.exec:\nhbbtt.exe143⤵
-
\??\c:\860082.exec:\860082.exe144⤵
-
\??\c:\hthbtt.exec:\hthbtt.exe145⤵
-
\??\c:\826688.exec:\826688.exe146⤵
-
\??\c:\q66862.exec:\q66862.exe147⤵
-
\??\c:\xrlxfrf.exec:\xrlxfrf.exe148⤵
-
\??\c:\2206246.exec:\2206246.exe149⤵
-
\??\c:\ffrxffl.exec:\ffrxffl.exe150⤵
-
\??\c:\048028.exec:\048028.exe151⤵
-
\??\c:\g8680.exec:\g8680.exe152⤵
-
\??\c:\djpjp.exec:\djpjp.exe153⤵
-
\??\c:\llflflf.exec:\llflflf.exe154⤵
-
\??\c:\k20648.exec:\k20648.exe155⤵
-
\??\c:\7vdjj.exec:\7vdjj.exe156⤵
-
\??\c:\fxffrrx.exec:\fxffrrx.exe157⤵
-
\??\c:\hbbtbb.exec:\hbbtbb.exe158⤵
-
\??\c:\86406.exec:\86406.exe159⤵
-
\??\c:\26246.exec:\26246.exe160⤵
-
\??\c:\646284.exec:\646284.exe161⤵
-
\??\c:\4866442.exec:\4866442.exe162⤵
-
\??\c:\0486880.exec:\0486880.exe163⤵
-
\??\c:\1nbbhn.exec:\1nbbhn.exe164⤵
-
\??\c:\hhttht.exec:\hhttht.exe165⤵
-
\??\c:\86208.exec:\86208.exe166⤵
-
\??\c:\vjdjp.exec:\vjdjp.exe167⤵
-
\??\c:\w68846.exec:\w68846.exe168⤵
-
\??\c:\lrrfxlr.exec:\lrrfxlr.exe169⤵
-
\??\c:\486228.exec:\486228.exe170⤵
-
\??\c:\266880.exec:\266880.exe171⤵
-
\??\c:\u600622.exec:\u600622.exe172⤵
-
\??\c:\fxrlxrf.exec:\fxrlxrf.exe173⤵
-
\??\c:\7ntbbn.exec:\7ntbbn.exe174⤵
-
\??\c:\w20644.exec:\w20644.exe175⤵
-
\??\c:\20668.exec:\20668.exe176⤵
-
\??\c:\1vdpd.exec:\1vdpd.exe177⤵
-
\??\c:\82280.exec:\82280.exe178⤵
-
\??\c:\22642.exec:\22642.exe179⤵
-
\??\c:\042062.exec:\042062.exe180⤵
-
\??\c:\420628.exec:\420628.exe181⤵
-
\??\c:\i480446.exec:\i480446.exe182⤵
-
\??\c:\608028.exec:\608028.exe183⤵
-
\??\c:\48286.exec:\48286.exe184⤵
-
\??\c:\82284.exec:\82284.exe185⤵
-
\??\c:\2088064.exec:\2088064.exe186⤵
-
\??\c:\7xxfrfx.exec:\7xxfrfx.exe187⤵
-
\??\c:\6646202.exec:\6646202.exe188⤵
-
\??\c:\k20028.exec:\k20028.exe189⤵
-
\??\c:\086606.exec:\086606.exe190⤵
-
\??\c:\04000.exec:\04000.exe191⤵
-
\??\c:\pdjjp.exec:\pdjjp.exe192⤵
-
\??\c:\lxxrfff.exec:\lxxrfff.exe193⤵
-
\??\c:\26068.exec:\26068.exe194⤵
-
\??\c:\08242.exec:\08242.exe195⤵
-
\??\c:\fllxllf.exec:\fllxllf.exe196⤵
-
\??\c:\1vjdj.exec:\1vjdj.exe197⤵
-
\??\c:\lxxlrfr.exec:\lxxlrfr.exe198⤵
-
\??\c:\i002406.exec:\i002406.exe199⤵
-
\??\c:\xxxrlrl.exec:\xxxrlrl.exe200⤵
-
\??\c:\82028.exec:\82028.exe201⤵
-
\??\c:\rrrfrlx.exec:\rrrfrlx.exe202⤵
-
\??\c:\w04020.exec:\w04020.exe203⤵
-
\??\c:\rffxfff.exec:\rffxfff.exe204⤵
-
\??\c:\dpdpd.exec:\dpdpd.exe205⤵
-
\??\c:\xxxrffr.exec:\xxxrffr.exe206⤵
-
\??\c:\pjdpv.exec:\pjdpv.exe207⤵
-
\??\c:\btntbb.exec:\btntbb.exe208⤵
-
\??\c:\vvpdp.exec:\vvpdp.exe209⤵
-
\??\c:\60828.exec:\60828.exe210⤵
-
\??\c:\8264624.exec:\8264624.exe211⤵
-
\??\c:\rfxrrrl.exec:\rfxrrrl.exe212⤵
-
\??\c:\3xfflfr.exec:\3xfflfr.exe213⤵
-
\??\c:\1ppvv.exec:\1ppvv.exe214⤵
-
\??\c:\882468.exec:\882468.exe215⤵
-
\??\c:\dvjpv.exec:\dvjpv.exe216⤵
-
\??\c:\3jvjv.exec:\3jvjv.exe217⤵
-
\??\c:\6428446.exec:\6428446.exe218⤵
-
\??\c:\i806424.exec:\i806424.exe219⤵
-
\??\c:\e48086.exec:\e48086.exe220⤵
-
\??\c:\826282.exec:\826282.exe221⤵
-
\??\c:\rfffrrr.exec:\rfffrrr.exe222⤵
-
\??\c:\e42284.exec:\e42284.exe223⤵
-
\??\c:\bnhhhh.exec:\bnhhhh.exe224⤵
-
\??\c:\btnntt.exec:\btnntt.exe225⤵
-
\??\c:\jjvpv.exec:\jjvpv.exe226⤵
-
\??\c:\rxxrllf.exec:\rxxrllf.exe227⤵
-
\??\c:\rxrlxlx.exec:\rxrlxlx.exe228⤵
-
\??\c:\04462.exec:\04462.exe229⤵
-
\??\c:\06204.exec:\06204.exe230⤵
-
\??\c:\btnbnn.exec:\btnbnn.exe231⤵
-
\??\c:\ntntnn.exec:\ntntnn.exe232⤵
-
\??\c:\226808.exec:\226808.exe233⤵
-
\??\c:\9rlfxff.exec:\9rlfxff.exe234⤵
-
\??\c:\q28844.exec:\q28844.exe235⤵
-
\??\c:\e80488.exec:\e80488.exe236⤵
-
\??\c:\m8620.exec:\m8620.exe237⤵
-
\??\c:\2202442.exec:\2202442.exe238⤵
-
\??\c:\c088002.exec:\c088002.exe239⤵
-
\??\c:\048240.exec:\048240.exe240⤵
-
\??\c:\8200486.exec:\8200486.exe241⤵