Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:19
Static task
static1
Behavioral task
behavioral1
Sample
4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
4aa4d001ce93bfaaadcfa7c6908ce200
-
SHA1
561f6ae63b1dcece2397383ec1ea1ea0061cdf7c
-
SHA256
1d8d5a60f1283b2bdde405dfa76084bac9230ad846ac6d6fb239487e9a27295a
-
SHA512
d19987b45cf706ece4fdd086985327d44bf2e4291067d928f753ba814e8192100a6fb46a1ee1cef83c3d9a21085bccf531f8d96bf8c24c8958f3b17cee41201d
-
SSDEEP
24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4ez:ObCjPKNqQEfsw43qtmVfq4i
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.me.com - Port:
587 - Username:
[email protected] - Password:
RICHARD205lord
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
jhdfkldfhndfkjdfnbfklfnf.exewinmgr119.exewinmgr119.exepid process 2312 jhdfkldfhndfkjdfnbfklfnf.exe 1832 winmgr119.exe 2588 winmgr119.exe -
Loads dropped DLL 1 IoCs
Processes:
4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exepid process 2020 4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2400-22-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2400-23-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2400-24-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2400-29-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/268-34-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/268-35-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/268-36-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/268-77-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
cvtres.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts cvtres.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
jhdfkldfhndfkjdfnbfklfnf.exe4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" jhdfkldfhndfkjdfnbfklfnf.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" 4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 icanhazip.com 6 ipinfo.io -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe autoit_exe C:\ProgramData\winmgr119.exe autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
jhdfkldfhndfkjdfnbfklfnf.exeRegAsm.exedescription pid process target process PID 2312 set thread context of 2664 2312 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 2664 set thread context of 2400 2664 RegAsm.exe cvtres.exe PID 2664 set thread context of 268 2664 RegAsm.exe cvtres.exe PID 2664 set thread context of 1948 2664 RegAsm.exe cvtres.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 27 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1328 schtasks.exe 668 schtasks.exe 2232 schtasks.exe 2476 schtasks.exe 2532 schtasks.exe 3012 schtasks.exe 1108 schtasks.exe 988 schtasks.exe 748 schtasks.exe 1624 schtasks.exe 2492 schtasks.exe 928 schtasks.exe 1496 schtasks.exe 1192 schtasks.exe 1920 schtasks.exe 2472 schtasks.exe 1076 schtasks.exe 1360 schtasks.exe 1844 schtasks.exe 2096 schtasks.exe 2088 schtasks.exe 1808 schtasks.exe 868 schtasks.exe 2152 schtasks.exe 2116 schtasks.exe 620 schtasks.exe 2796 schtasks.exe -
Processes:
RegAsm.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe -
NTFS ADS 4 IoCs
Processes:
4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exejhdfkldfhndfkjdfnbfklfnf.exewinmgr119.exewinmgr119.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exe:Zone.Identifier:$DATA 4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exe File created C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe:Zone.Identifier:$DATA jhdfkldfhndfkjdfnbfklfnf.exe File created C:\ProgramData\winmgr119.exe:Zone.Identifier:$DATA winmgr119.exe File opened for modification C:\ProgramData\winmgr119.exe:Zone.Identifier:$DATA winmgr119.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exejhdfkldfhndfkjdfnbfklfnf.exeRegAsm.exewinmgr119.exewinmgr119.exepid process 2020 4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2664 RegAsm.exe 2664 RegAsm.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 1832 winmgr119.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2588 winmgr119.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2664 RegAsm.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe 2312 jhdfkldfhndfkjdfnbfklfnf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
RegAsm.execvtres.execvtres.execvtres.exedescription pid process Token: SeDebugPrivilege 2664 RegAsm.exe Token: SeDebugPrivilege 2400 cvtres.exe Token: SeDebugPrivilege 268 cvtres.exe Token: SeDebugPrivilege 1948 cvtres.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 2664 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exejhdfkldfhndfkjdfnbfklfnf.exeRegAsm.exedescription pid process target process PID 2020 wrote to memory of 2312 2020 4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exe jhdfkldfhndfkjdfnbfklfnf.exe PID 2020 wrote to memory of 2312 2020 4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exe jhdfkldfhndfkjdfnbfklfnf.exe PID 2020 wrote to memory of 2312 2020 4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exe jhdfkldfhndfkjdfnbfklfnf.exe PID 2020 wrote to memory of 2312 2020 4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exe jhdfkldfhndfkjdfnbfklfnf.exe PID 2312 wrote to memory of 2664 2312 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 2312 wrote to memory of 2664 2312 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 2312 wrote to memory of 2664 2312 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 2312 wrote to memory of 2664 2312 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 2312 wrote to memory of 2664 2312 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 2312 wrote to memory of 2664 2312 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 2312 wrote to memory of 2664 2312 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 2312 wrote to memory of 2664 2312 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 2312 wrote to memory of 2664 2312 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 2312 wrote to memory of 2532 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2532 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2532 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2532 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2664 wrote to memory of 2400 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 2400 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 2400 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 2400 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 2400 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 2400 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 2400 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 2400 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 268 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 268 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 268 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 268 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 268 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 268 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 268 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 268 2664 RegAsm.exe cvtres.exe PID 2312 wrote to memory of 1496 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 1496 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 1496 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 1496 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2664 wrote to memory of 1948 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 1948 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 1948 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 1948 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 1948 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 1948 2664 RegAsm.exe cvtres.exe PID 2664 wrote to memory of 1948 2664 RegAsm.exe cvtres.exe PID 2312 wrote to memory of 1844 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 1844 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 1844 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 1844 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 1624 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 1624 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 1624 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 1624 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2096 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2096 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2096 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2096 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2116 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2116 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2116 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2116 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2088 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2088 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2088 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2312 wrote to memory of 2088 2312 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4aa4d001ce93bfaaadcfa7c6908ce200_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exeC:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe03⤵
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpBE6F.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpC0B1.tmp"4⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpD5A1.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2532
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1496
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1844
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1624
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2096
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2116
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2088
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:620
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1808
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1328
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3012
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:668
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2232
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1108
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:868
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1920
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2152
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2492
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:988
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2796
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2476
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2472
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1192
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1076
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1360
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:928
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:748
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3009FDD9-118F-44FE-9740-35EDD2D0C4F5} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵PID:2264
-
C:\ProgramData\winmgr119.exeC:\ProgramData\winmgr119.exe2⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\ProgramData\winmgr119.exeC:\ProgramData\winmgr119.exe2⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD545802b1012b1106160269ac40941c3de
SHA1756cfe201529d02217f2d58d2fcf539a6b585864
SHA25615f13ee8e9b57b87f8f2947b22c497e3bf1d2aedae8cc36bc7a82ba97c41412a
SHA5120afb1dbe4410fb7c134b578f083407cf5975b6301f28cba6da1a7f8d2b332a3a5565483fe6a8b6fa3c7c0bc12bd84479d0d83f32743003f3fc7adf25323849ea
-
Filesize
2.6MB
MD5390056b7e605ebbb53a425fa40af161b
SHA198430f764ca76232f126ef549fbc6af54ba37f0a
SHA2564b2ec573e1bfe3ae6c08e2861932321b758566586f9a32d278d53ed309f6086c
SHA5126c9f55be08c9eb21d94438ea74cd1ee3fe11cd0b449c752739104727d3dc2918c99fc87f7f310e97b8274a6b4bfa727c4b824c5c4e290e9c0509391a89be2c7e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
399B
MD5e4bf4f7accc657622fe419c0d62419ab
SHA1c2856936dd3de05bad0da5ca94d6b521e40ab5a2
SHA256b32fa68b79c5a7ceaa89e8e537efe33a963c499666202611329944bd2c09318e
SHA51285dc223e39a16ddeba53a4b3d6c9eff14d30ec67dfda1e650da2c9057f640edd033a31868915a31caac0d325d240a7f634f62cd52fbd2adc68bd1d9cb6281431
-
Filesize
400B
MD5de4e5ff058882957cf8a3b5f839a031f
SHA10b3d8279120fb5fa27efbd9eee89695aa040fc24
SHA256ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49
SHA512a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72
-
Filesize
391B
MD53525ea58bba48993ea0d01b65ea71381
SHA11b917678fdd969e5ee5916e5899e7c75a979cf4d
SHA256681bcee53cf679ac674e700136f9229b9184fe60ed6410dbd7a33d462ed13ae2
SHA5125aad8dca43ec85882daf50c469bd04dcf0b62affc8bc605b3e289496a2679d4d548fea8bb0aea7080bbfbcdcab9d275fc6797b9c95b64f9f97ecf79583a83986
-
Filesize
2.6MB
MD53829111836c6571f80ab202e08bf0548
SHA1fbfc8ba8ee81d7345320adca578fe28d95ee5afd
SHA256ed5ceaef3311457861e30c25f11c081922d1084aefca25f6b12a1df12c8af4f5
SHA512c20bad1fa6396baf9226296edba80654d4d034c927a9ae50c06b8b3e21836e8eaeeabd85ae9d6988b0e6e7175f94add68f7d8955b37bc3dfc1310f55736a08ad