Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:37
Static task
static1
Behavioral task
behavioral1
Sample
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe
-
Size
91KB
-
MD5
5962c117eb1df6cb926a2755e81e95b0
-
SHA1
9c0ac139ff6179b984a6a03587d805cec98f6fc0
-
SHA256
71af9668af296c05e01a3b76d12d92e0a2aded6f561acf43c7465b29b65fa7ee
-
SHA512
2382427a90eb55b0ccd4d62863079a80b83fd36f3c608f9afa06bcbc732b45be1ee34fc0daf7c0caf6eb29a2aa44fad7b0f0f0b1a6f3e655a7f8bef9eb991476
-
SSDEEP
1536:FAwEmBGz1lNNqDaG0PoxhlzmqAwEmBGz1lNNqDaG0Poxhlzm+:FGmUXNQDaG0A8qGmUXNQDaG0A8+
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
Processes:
xk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 2020 xk.exe 2744 IExplorer.exe 2880 WINLOGON.EXE 1360 CSRSS.EXE 2032 SERVICES.EXE 344 LSASS.EXE 992 SMSS.EXE -
Loads dropped DLL 12 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exepid process 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe -
Drops file in System32 directory 6 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exedescription ioc process File created C:\Windows\SysWOW64\Mig2.scr 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\IExplorer.exe 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\shell.exe 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\shell.exe 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exedescription ioc process File created C:\Windows\xk.exe 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe File opened for modification C:\Windows\xk.exe 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 4 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\ 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe -
Modifies registry class 15 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exepid process 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exexk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe 2020 xk.exe 2744 IExplorer.exe 2880 WINLOGON.EXE 1360 CSRSS.EXE 2032 SERVICES.EXE 344 LSASS.EXE 992 SMSS.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exedescription pid process target process PID 2676 wrote to memory of 2020 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe xk.exe PID 2676 wrote to memory of 2020 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe xk.exe PID 2676 wrote to memory of 2020 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe xk.exe PID 2676 wrote to memory of 2020 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe xk.exe PID 2676 wrote to memory of 2744 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe IExplorer.exe PID 2676 wrote to memory of 2744 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe IExplorer.exe PID 2676 wrote to memory of 2744 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe IExplorer.exe PID 2676 wrote to memory of 2744 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe IExplorer.exe PID 2676 wrote to memory of 2880 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe WINLOGON.EXE PID 2676 wrote to memory of 2880 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe WINLOGON.EXE PID 2676 wrote to memory of 2880 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe WINLOGON.EXE PID 2676 wrote to memory of 2880 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe WINLOGON.EXE PID 2676 wrote to memory of 1360 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe CSRSS.EXE PID 2676 wrote to memory of 1360 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe CSRSS.EXE PID 2676 wrote to memory of 1360 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe CSRSS.EXE PID 2676 wrote to memory of 1360 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe CSRSS.EXE PID 2676 wrote to memory of 2032 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe SERVICES.EXE PID 2676 wrote to memory of 2032 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe SERVICES.EXE PID 2676 wrote to memory of 2032 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe SERVICES.EXE PID 2676 wrote to memory of 2032 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe SERVICES.EXE PID 2676 wrote to memory of 344 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe LSASS.EXE PID 2676 wrote to memory of 344 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe LSASS.EXE PID 2676 wrote to memory of 344 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe LSASS.EXE PID 2676 wrote to memory of 344 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe LSASS.EXE PID 2676 wrote to memory of 992 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe SMSS.EXE PID 2676 wrote to memory of 992 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe SMSS.EXE PID 2676 wrote to memory of 992 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe SMSS.EXE PID 2676 wrote to memory of 992 2676 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe SMSS.EXE -
System policy modification 1 TTPs 4 IoCs
Processes:
5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5962c117eb1df6cb926a2755e81e95b0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2676 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1360
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:344
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:992
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD55962c117eb1df6cb926a2755e81e95b0
SHA19c0ac139ff6179b984a6a03587d805cec98f6fc0
SHA25671af9668af296c05e01a3b76d12d92e0a2aded6f561acf43c7465b29b65fa7ee
SHA5122382427a90eb55b0ccd4d62863079a80b83fd36f3c608f9afa06bcbc732b45be1ee34fc0daf7c0caf6eb29a2aa44fad7b0f0f0b1a6f3e655a7f8bef9eb991476
-
Filesize
91KB
MD5f256bbdcec8b383d0c4c690c8f419726
SHA1b8e7ebea55905fe82be7b72452eb434654ed9ada
SHA256405d10fdac9a7eda61fed20297d1d83e57ae30904e2b1b478ce3a394ae4cd24e
SHA512f45af82fad5134688faa22708432c4c1d26edfbc1b17177d6a594776119f96995b4a3a53bc7584ba480f8a7db5c96bcb25c66bf5064548d463d43e54e1408f23
-
Filesize
91KB
MD58cacb9aa571d28fade0b28c90561af56
SHA1279f181c54c677e8b53f1c8112936cc068806f52
SHA25600c60ee34c13d6bfeec60ead36ca8b31b9ab78e8858b60915afbca8282e2d001
SHA512977de1831c7779ca5bde7300c0b46a49e8a54ee644ca33908d85307cec2c5dafa44cb15f70bd1ed8ec8b7705c89901c7ba71a1a7170bb37d9cb8d4a3e73a8103
-
Filesize
91KB
MD5d8552e358ed1374897d3431dcde01ac4
SHA16b03b79259b5cf643e9cc67c123c582f485d9035
SHA2566aca691b13310ff100e3db2f0945566ca345acb79ca56f7d76a96749056307b1
SHA51231429fd23947a3e62212054dce5c70ee0810e9f740d3d9ed89f659dc934edff964007effb1b4913c689e0eec9d5dce0730b0b324459d56c179882becd6b50732
-
Filesize
91KB
MD59ce857bc660d8b5e2e9ab3d0b9a09433
SHA15e6cdc044cec9a1d24b2c010fb9da4f20a4142cc
SHA256f9e21aad8e639e3843d583e5fe1c80e862d986a3cb2977ae92114a169de7e833
SHA512d76aec10af5f67aab93e7c2d4a3e7bad6e7b0e8af3332c2672ca3c0c45c5fd9bb0fdc5a270cc7bc3470e70db7f59590808f700347de64ba68cf59382648b3a83
-
Filesize
91KB
MD53a6c01bbe02041805d9820255019e6c1
SHA1ef9dbe96a93526a45ef09273e3fd37cfb289f703
SHA256a45f71a543417e1b1fe9867a706b09dd9832d3be0525eb668ff6125b2318be0f
SHA5120e952f631865edafa452aedaa8b90af08e1e988e35b025c592bee205fd64401d254e9bec6aac3ea73fe1c7bbe014868ffba5decee66ca99027e7e41a130d7f8d
-
Filesize
91KB
MD51583e16e48a2ec82c0c1fa42ccc834f7
SHA1307fa6bd62d3292f4966719e48b4020060bb38d1
SHA25687c91d763f8fb73d4291118b6b1b656ceb544d30647ab1939c4cd726aabba42d
SHA512c79a4068240cc2737b553df5eb8bad5947499d0ac75e88aed452557eb072254618de978d128f7101d2a1dc3d692923db507eeee1fa04ffcaa763f1f4ec7cc48d
-
Filesize
91KB
MD51339b9ed4fce80d8e4d82f3aa5ac9b63
SHA1393186f4ae3cbabdf6462c2fa0a9deb07627d18f
SHA2568cf33d406b0608b5eab8997b66dff66ec5a5413a2824af805ff59eda029db475
SHA5121949ad8f2f4e4b3084450596f8c18c0057298ad215d239b77c52d910804f3b7eba96769d2ecb2bc93c4cdbc1a6f314901f7e3e313ebf8446815e079e9735bea0