Analysis
-
max time kernel
134s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:41
Behavioral task
behavioral1
Sample
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe
-
Size
91KB
-
MD5
5a108210269af0b88ca4eef1dc0fa910
-
SHA1
92de8c2d188a41254f5fac7be61e9e08339d10f6
-
SHA256
31ddfe29a74d876dce7fd5827b8ffa35df4bc24888cb1ec8972e282587481cf0
-
SHA512
1ef5bd036251fc2ca91343f95552f88baf5cf9c10fa0a5075c71b35b8bc75dcc645025c72e29af7692fcbe037ffef668551e896dc9eb10dd9b9a9387019869ad
-
SSDEEP
1536:QRsjdIZfaif4YrxCjjKnouy8VzTRsjdIZfaif4YrxCjjKnouy8VzK:QOyZy9wCjOouttTOyZy9wCjOouttK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
Processes:
xk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 2576 xk.exe 4092 IExplorer.exe 2192 WINLOGON.EXE 2352 CSRSS.EXE 3416 SERVICES.EXE 2432 LSASS.EXE 4800 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
Processes:
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral2/memory/3316-0-0x0000000000400000-0x000000000042F000-memory.dmp upx C:\Users\Admin\AppData\Local\winlogon.exe upx C:\Windows\xk.exe upx C:\Windows\SysWOW64\IExplorer.exe upx behavioral2/memory/2576-113-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/4092-115-0x0000000000400000-0x000000000042F000-memory.dmp upx C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE upx behavioral2/memory/4092-118-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/2192-125-0x0000000000400000-0x000000000042F000-memory.dmp upx C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE upx behavioral2/memory/2352-131-0x0000000000400000-0x000000000042F000-memory.dmp upx C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE upx behavioral2/memory/3416-135-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/3416-139-0x0000000000400000-0x000000000042F000-memory.dmp upx C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE upx C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE upx behavioral2/memory/2432-147-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/4800-152-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/3316-154-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe -
Drops file in System32 directory 6 IoCs
Processes:
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\SysWOW64\IExplorer.exe 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\shell.exe 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe File created C:\Windows\SysWOW64\shell.exe 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Mig2.scr 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe File created C:\Windows\SysWOW64\IExplorer.exe 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\xk.exe 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe File created C:\Windows\xk.exe 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe -
Modifies Control Panel 4 IoCs
Processes:
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\Desktop\ 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe -
Modifies registry class 15 IoCs
Processes:
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exepid process 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exexk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe 2576 xk.exe 4092 IExplorer.exe 2192 WINLOGON.EXE 2352 CSRSS.EXE 3416 SERVICES.EXE 2432 LSASS.EXE 4800 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exedescription pid process target process PID 3316 wrote to memory of 2576 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe xk.exe PID 3316 wrote to memory of 2576 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe xk.exe PID 3316 wrote to memory of 2576 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe xk.exe PID 3316 wrote to memory of 4092 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe IExplorer.exe PID 3316 wrote to memory of 4092 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe IExplorer.exe PID 3316 wrote to memory of 4092 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe IExplorer.exe PID 3316 wrote to memory of 2192 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe WINLOGON.EXE PID 3316 wrote to memory of 2192 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe WINLOGON.EXE PID 3316 wrote to memory of 2192 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe WINLOGON.EXE PID 3316 wrote to memory of 2352 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe CSRSS.EXE PID 3316 wrote to memory of 2352 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe CSRSS.EXE PID 3316 wrote to memory of 2352 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe CSRSS.EXE PID 3316 wrote to memory of 3416 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe SERVICES.EXE PID 3316 wrote to memory of 3416 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe SERVICES.EXE PID 3316 wrote to memory of 3416 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe SERVICES.EXE PID 3316 wrote to memory of 2432 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe LSASS.EXE PID 3316 wrote to memory of 2432 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe LSASS.EXE PID 3316 wrote to memory of 2432 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe LSASS.EXE PID 3316 wrote to memory of 4800 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe SMSS.EXE PID 3316 wrote to memory of 4800 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe SMSS.EXE PID 3316 wrote to memory of 4800 3316 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe SMSS.EXE -
System policy modification 1 TTPs 4 IoCs
Processes:
5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5a108210269af0b88ca4eef1dc0fa910_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3316 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2576 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4092 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3416 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4800
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5768be6660d00e480dbf74b2ee42d0205
SHA1b284d8cff7333e038b108ee8141585b3ef096f81
SHA2567030dee2ee6f7363ed3174abb2dfa1931f8923c8b1670c675fce71b8a86ee438
SHA512f396d2f1bcee7b61ebab2f477e54e97b70cdbf962222d70eef0df79898fef8d2436fe58209a384000a9a8ea56f0dbb05eb8041287140361e96ab7f697f947336
-
Filesize
91KB
MD547779725dc9c2b0f42348b777e3f23da
SHA164536a535deccfa287ec3f64337b3aecd279f83a
SHA256e965ac00c75ed30bf594c804f4d901295ccbabbf52b954d8dcb9d6f2fff8b737
SHA51272e8bfe834ad01507e403ff8a63600734de46833d5adad4061fa98c2ff3c4f96debaa4b3f3bbbcd9ac6ff68a434fb9a285348d6c4e4fdf4d39c6f72426005c74
-
Filesize
91KB
MD52c6d4b2b8a65577412956cf569d72eec
SHA1ccedb5a66784bab11a1938c4db1161d00e3bad81
SHA2560e646e126b7928e2490ea96bf422bd7a251571e0626bad7e6e05a5a3c9c392e0
SHA512bbf2a2263ac86f89ea681c497da3cfae3860df82629056ab25bf5ebed62c1d742f87f3b3e9cef518723ac3a8610ee8430b7af6949654c400c7d548951a23b143
-
Filesize
91KB
MD5006459f59e33572b916e8eb12639e965
SHA1313dc506f54b0eccc7b5440b1c27b8710c5b0bab
SHA256c1cfee5268ebd3cfbfe809fa6eb1be49d19cccb1447c5ea8564dc008ebc71ab0
SHA512ddaf7739e2ff41b0c5acd434780261da0ef133ef4285c154376d3b4800f5d40855131c1f5caaac7b787e98074edf1dc8ac38fdfbb678cf273c347c2eb2366d47
-
Filesize
91KB
MD581b76194b84685e37c2b2ec825aecf69
SHA1326da74582e9072f45105e2b5bf2f92b82e4056a
SHA25605a2cf0494b54f9fc3646f847dc3108ac3c6ebcc749f87c3ab33a522ee58e34f
SHA51201c84d9f25c03788c92c7f5b69bebcb643ec8855f724a9ace7438d116e9f6f1504fa3c1d67703d5d7a898136f2c4f16028dba69d657e14b83a75ae2e83c4c8b7
-
Filesize
91KB
MD55a108210269af0b88ca4eef1dc0fa910
SHA192de8c2d188a41254f5fac7be61e9e08339d10f6
SHA25631ddfe29a74d876dce7fd5827b8ffa35df4bc24888cb1ec8972e282587481cf0
SHA5121ef5bd036251fc2ca91343f95552f88baf5cf9c10fa0a5075c71b35b8bc75dcc645025c72e29af7692fcbe037ffef668551e896dc9eb10dd9b9a9387019869ad
-
Filesize
91KB
MD58988f3549a285de43533e3620f446223
SHA1430d2c801201307e5ad4543fd019f39bfa61205f
SHA2562c35f36528e1ee01330057ac93f49f7469a0b60d5f16ec043927f5da328d6f47
SHA51269e9f9eefe21d0071ad3a50dd4f328ebb38a4faaa1730f26082fb305edc4b8415f627ab3d629bf033efe2edcc35ef672d08ecb5584ce6e07e04bf714cbfe8283
-
Filesize
91KB
MD565ff50ed63f0dde44f8f7f321c7bdd99
SHA14d4d10fd5fbd7c0465db96cbebc91ae927f1cf5d
SHA25654bb838f9dbae8f38e849790a6dde891da43c1f5a33f2123cfc60c062d7c9c48
SHA51254ec1bd676f676195fa22bb7e6a44c2d8fdd1257c7eb53b89364e87b44691a26c2130563406a9cfabc22fd1303b77765533cf4885cdbda8adf64e76880519510