Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:48
Behavioral task
behavioral1
Sample
5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
5b6f02c5bb34856edef5cdc9221fd240
-
SHA1
79c9d4b9c9268791bc9b6d3d57abd1fbeffae70a
-
SHA256
5c9d5959167f2a880e8ccca4b2922db8e59997a6d7ac86e37b94fe89bb14bcca
-
SHA512
30690107120881f8aa12a6d0518f56cde74d1c44e9c726a0e66c6503263aa3f9f208bf59a51b2126ca8a23c0919b9dbef4cb1c9046a752e96d0805beaa70ee31
-
SSDEEP
12288:sl+4Tcyct/JWT7yckBlepmbMsBXYHOWyAh5+djVyKDGpiRe7FaS+ug82qGeJ3btU:xyc5JWackYm7dZ1Oq2nn2qPJ3btV3+f
Malware Config
Signatures
-
DcRat 64 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exe5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2576 schtasks.exe 1512 schtasks.exe 492 schtasks.exe 1636 schtasks.exe 2264 schtasks.exe 1292 schtasks.exe 2892 schtasks.exe 1488 schtasks.exe 2628 schtasks.exe 2164 schtasks.exe 2956 schtasks.exe 1796 schtasks.exe 2872 schtasks.exe 1812 schtasks.exe 2076 schtasks.exe 604 schtasks.exe 2104 schtasks.exe 2804 schtasks.exe 772 schtasks.exe 1320 schtasks.exe 1528 schtasks.exe 2720 schtasks.exe 1812 schtasks.exe 2252 schtasks.exe 1748 schtasks.exe 2176 schtasks.exe 808 schtasks.exe File created C:\Program Files\7-Zip\Lang\886983d96e3d3e 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 2896 schtasks.exe 2432 schtasks.exe 2792 schtasks.exe 1964 schtasks.exe 2380 schtasks.exe 2396 schtasks.exe 2992 schtasks.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 2836 schtasks.exe 716 schtasks.exe 1880 schtasks.exe 1708 schtasks.exe 2920 schtasks.exe 2548 schtasks.exe 1740 schtasks.exe 2340 schtasks.exe 1984 schtasks.exe 444 schtasks.exe 2816 schtasks.exe 788 schtasks.exe 2156 schtasks.exe 1636 schtasks.exe 1204 schtasks.exe 1028 schtasks.exe 2768 schtasks.exe 2888 schtasks.exe 2960 schtasks.exe 1684 schtasks.exe 2292 schtasks.exe 324 schtasks.exe 2396 schtasks.exe 2056 schtasks.exe 1720 schtasks.exe 2860 schtasks.exe 320 schtasks.exe 2208 schtasks.exe -
Process spawned unexpected child process 63 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2252 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2768 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2896 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2892 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1488 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2836 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2396 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1748 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2956 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2264 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1796 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2076 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2792 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2104 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2888 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2804 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2960 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2548 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1292 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2176 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2576 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 772 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1964 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 788 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1720 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1320 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2156 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1204 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1528 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2292 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2340 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2720 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 320 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 716 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2432 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2208 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1684 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1984 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1880 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2164 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 808 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 324 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2380 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2944 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 604 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 444 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1028 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1512 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2396 2200 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 492 2200 schtasks.exe -
Processes:
5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exesmss.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe -
Processes:
resource yara_rule behavioral1/memory/2348-1-0x00000000002B0000-0x00000000003D0000-memory.dmp dcrat C:\Program Files\7-Zip\Lang\csrss.exe dcrat behavioral1/memory/1672-250-0x0000000000EC0000-0x0000000000FE0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 24 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 1344 powershell.exe 2756 powershell.exe 2180 powershell.exe 2976 powershell.exe 2972 powershell.exe 2116 powershell.exe 2984 powershell.exe 2040 powershell.exe 2624 powershell.exe 2008 powershell.exe 2532 powershell.exe 2588 powershell.exe 2076 powershell.exe 2780 powershell.exe 2632 powershell.exe 2620 powershell.exe 2512 powershell.exe 2636 powershell.exe 3048 powershell.exe 2428 powershell.exe 2264 powershell.exe 844 powershell.exe 2472 powershell.exe 2280 powershell.exe -
Executes dropped EXE 2 IoCs
Processes:
5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exesmss.exepid process 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1672 smss.exe -
Processes:
5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exesmss.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe -
Drops file in Program Files directory 27 IoCs
Processes:
5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exedescription ioc process File opened for modification C:\Program Files (x86)\Uninstall Information\powershell.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\conhost.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files\7-Zip\Lang\csrss.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\Lang\RCX209D.tmp 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\5940a34987c991 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\Lang\RCX20BD.tmp 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\conhost.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files\Reference Assemblies\winlogon.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files\Reference Assemblies\cc11b995f2a76d 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files (x86)\Uninstall Information\powershell.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File opened for modification C:\Program Files\Reference Assemblies\winlogon.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files (x86)\Windows NT\TableTextService\dwm.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files (x86)\Uninstall Information\e978f868350d50 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\WmiPrvSE.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\24dbde2999530e 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Uninstall Information\e978f868350d50 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\System\en-US\conhost.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files\Common Files\System\en-US\conhost.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files\Common Files\System\en-US\088424020bedd6 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\Lang\csrss.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files (x86)\Windows NT\TableTextService\6cb0b6c459d5d3 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\088424020bedd6 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\dwm.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files\7-Zip\Lang\886983d96e3d3e 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\WmiPrvSE.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe -
Drops file in Windows directory 6 IoCs
Processes:
5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exedescription ioc process File created C:\Windows\Vss\Writers\Idle.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File opened for modification C:\Windows\Vss\Writers\Idle.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Windows\Vss\Writers\6ccacd8608530f 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Windows\Microsoft.NET\powershell.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File created C:\Windows\Microsoft.NET\e978f868350d50 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe File opened for modification C:\Windows\Microsoft.NET\powershell.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 63 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1488 schtasks.exe 2836 schtasks.exe 1636 schtasks.exe 2960 schtasks.exe 444 schtasks.exe 2896 schtasks.exe 1720 schtasks.exe 1812 schtasks.exe 808 schtasks.exe 2164 schtasks.exe 2252 schtasks.exe 2956 schtasks.exe 2816 schtasks.exe 2056 schtasks.exe 1984 schtasks.exe 1320 schtasks.exe 320 schtasks.exe 2380 schtasks.exe 2860 schtasks.exe 1512 schtasks.exe 2888 schtasks.exe 2804 schtasks.exe 2628 schtasks.exe 1740 schtasks.exe 2920 schtasks.exe 788 schtasks.exe 1708 schtasks.exe 2176 schtasks.exe 772 schtasks.exe 1204 schtasks.exe 2208 schtasks.exe 1880 schtasks.exe 2872 schtasks.exe 604 schtasks.exe 1028 schtasks.exe 2104 schtasks.exe 2156 schtasks.exe 2396 schtasks.exe 1528 schtasks.exe 324 schtasks.exe 2944 schtasks.exe 1684 schtasks.exe 1636 schtasks.exe 2396 schtasks.exe 2076 schtasks.exe 2292 schtasks.exe 716 schtasks.exe 2264 schtasks.exe 2720 schtasks.exe 2432 schtasks.exe 492 schtasks.exe 2892 schtasks.exe 1292 schtasks.exe 1964 schtasks.exe 2992 schtasks.exe 2548 schtasks.exe 2768 schtasks.exe 1748 schtasks.exe 2576 schtasks.exe 1812 schtasks.exe 1796 schtasks.exe 2792 schtasks.exe 2340 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exepowershell.exepowershell.exepowershell.exepowershell.exe5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 2532 powershell.exe 2512 powershell.exe 2588 powershell.exe 2972 powershell.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 2976 powershell.exe 2040 powershell.exe 2116 powershell.exe 2636 powershell.exe 3048 powershell.exe 2180 powershell.exe 2428 powershell.exe 2984 powershell.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 2264 powershell.exe 2624 powershell.exe 2280 powershell.exe 2076 powershell.exe 2472 powershell.exe 2008 powershell.exe 2756 powershell.exe 2632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
Processes:
5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exepowershell.exepowershell.exepowershell.exe5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exesmss.exedescription pid process Token: SeDebugPrivilege 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Token: SeDebugPrivilege 2532 powershell.exe Token: SeDebugPrivilege 2512 powershell.exe Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Token: SeDebugPrivilege 2972 powershell.exe Token: SeDebugPrivilege 2976 powershell.exe Token: SeDebugPrivilege 2040 powershell.exe Token: SeDebugPrivilege 2116 powershell.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeDebugPrivilege 2180 powershell.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 2984 powershell.exe Token: SeDebugPrivilege 2264 powershell.exe Token: SeDebugPrivilege 2624 powershell.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 2076 powershell.exe Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 2008 powershell.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 2632 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe Token: SeDebugPrivilege 2620 powershell.exe Token: SeDebugPrivilege 1344 powershell.exe Token: SeDebugPrivilege 844 powershell.exe Token: SeDebugPrivilege 1672 smss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exedescription pid process target process PID 2348 wrote to memory of 2512 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2512 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2512 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2532 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2532 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2532 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2588 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2588 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2588 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2636 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2636 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2636 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2180 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2180 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2180 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2976 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2976 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2976 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2972 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2972 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2972 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 3048 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 3048 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 3048 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2116 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2116 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2116 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2984 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2984 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2984 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2428 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2428 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2428 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2040 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2040 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 2040 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 2348 wrote to memory of 1660 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe PID 2348 wrote to memory of 1660 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe PID 2348 wrote to memory of 1660 2348 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe PID 1660 wrote to memory of 2264 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2264 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2264 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2624 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2624 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2624 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2008 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2008 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2008 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2280 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2280 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2280 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 1344 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 1344 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 1344 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2780 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2780 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2780 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2472 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2472 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2472 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2620 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2620 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2620 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe PID 1660 wrote to memory of 2756 1660 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe powershell.exe -
System policy modification 1 TTPs 9 IoCs
Processes:
5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exesmss.exe5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" smss.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe"1⤵
- DcRat
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
-
C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\smss.exe"C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\smss.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files\7-Zip\Lang\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files\7-Zip\Lang\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Recovery\96702242-0d98-11ef-bfa8-5aba25856535\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\96702242-0d98-11ef-bfa8-5aba25856535\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Recovery\96702242-0d98-11ef-bfa8-5aba25856535\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Windows\Vss\Writers\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\Vss\Writers\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Windows\Vss\Writers\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\smss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Recovery\96702242-0d98-11ef-bfa8-5aba25856535\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\96702242-0d98-11ef-bfa8-5aba25856535\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Recovery\96702242-0d98-11ef-bfa8-5aba25856535\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics5" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Cookies\5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics" /sc ONLOGON /tr "'C:\Users\Default\Cookies\5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics5" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Cookies\5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Downloads\winlogon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default\Downloads\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Downloads\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershellp" /sc MINUTE /mo 14 /tr "'C:\Windows\Microsoft.NET\powershell.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\Windows\Microsoft.NET\powershell.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershellp" /sc MINUTE /mo 8 /tr "'C:\Windows\Microsoft.NET\powershell.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\conhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\All Users\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershellp" /sc MINUTE /mo 10 /tr "'C:\Recovery\96702242-0d98-11ef-bfa8-5aba25856535\powershell.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\Recovery\96702242-0d98-11ef-bfa8-5aba25856535\powershell.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershellp" /sc MINUTE /mo 6 /tr "'C:\Recovery\96702242-0d98-11ef-bfa8-5aba25856535\powershell.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\conhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Program Files\Reference Assemblies\winlogon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 11 /tr "'C:\Program Files\Reference Assemblies\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershellp" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Uninstall Information\powershell.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\Program Files (x86)\Uninstall Information\powershell.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershellp" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Uninstall Information\powershell.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics5" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics5" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\5b6f02c5bb34856edef5cdc9221fd240_NeikiAnalytics.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershellp" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Uninstall Information\powershell.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\Program Files (x86)\Uninstall Information\powershell.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershellp" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Uninstall Information\powershell.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Public\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Users\Public\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\MSOCache\All Users\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Common Files\System\en-US\conhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Common Files\System\en-US\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Program Files\Common Files\System\en-US\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\7-Zip\Lang\csrss.exeFilesize
1.1MB
MD55b6f02c5bb34856edef5cdc9221fd240
SHA179c9d4b9c9268791bc9b6d3d57abd1fbeffae70a
SHA2565c9d5959167f2a880e8ccca4b2922db8e59997a6d7ac86e37b94fe89bb14bcca
SHA51230690107120881f8aa12a6d0518f56cde74d1c44e9c726a0e66c6503263aa3f9f208bf59a51b2126ca8a23c0919b9dbef4cb1c9046a752e96d0805beaa70ee31
-
C:\Recovery\96702242-0d98-11ef-bfa8-5aba25856535\886983d96e3d3eFilesize
115B
MD57a55d6e32e56a1a500d051d08273595d
SHA1db997ca122dd8f4a1a62e019ca98c0579755b68d
SHA256c51369d54d438e086b91a1f9df6dd22d11400045fefae8c6cbe9a588407dc81d
SHA512a1bd3a64c33ed9065e9e53d049d256839ad89cc8737a762cbf9621b31766379358a04db09ab63d3e24b1066356e6e2d2de9b2247423d1a4ac321983ed0fe971e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD53d5c84cfdc5a7c3c63f590b094ac9c9b
SHA124f394d602eb50579d2b6c78e3ae0eb702a678fc
SHA256d9cd4b00b40c647cf54fd38dccb44297608d2b7e1ac7516a8c9834ebab24c703
SHA51213230b3b66d8f132b705df27f4d2bb51f13d715c248682f4528643d8dd7d86c5194637624d9a9164c5ddcda825de560611e4ea2e964e7aaee829ce05aad8ef44
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5fe232fdd7f2fff400a2408618d021e2b
SHA1f67b77a24669ea7e9530be67e29c3216ff68275e
SHA256589219744e5ba6a51657d309b0305ab3b6619ee255e2356e7b1ef11036750c7e
SHA512408c16bc6f1913e9c1171950dbde4bf4359a98b510747f47df31f2b8a4f4d53846db579d5bcc70f73a71fdba63a5c341423e4e8b198cb053fd245cd0e311aa18
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1672-250-0x0000000000EC0000-0x0000000000FE0000-memory.dmpFilesize
1.1MB
-
memory/2264-193-0x0000000001D20000-0x0000000001D28000-memory.dmpFilesize
32KB
-
memory/2264-192-0x000000001B7B0000-0x000000001BA92000-memory.dmpFilesize
2.9MB
-
memory/2348-1-0x00000000002B0000-0x00000000003D0000-memory.dmpFilesize
1.1MB
-
memory/2348-2-0x000007FEF5F80000-0x000007FEF696C000-memory.dmpFilesize
9.9MB
-
memory/2348-0-0x000007FEF5F83000-0x000007FEF5F84000-memory.dmpFilesize
4KB
-
memory/2348-66-0x000007FEF5F80000-0x000007FEF696C000-memory.dmpFilesize
9.9MB
-
memory/2348-8-0x0000000000290000-0x000000000029C000-memory.dmpFilesize
48KB
-
memory/2348-3-0x0000000000140000-0x000000000014E000-memory.dmpFilesize
56KB
-
memory/2348-7-0x0000000000280000-0x000000000028C000-memory.dmpFilesize
48KB
-
memory/2348-6-0x0000000000270000-0x000000000027A000-memory.dmpFilesize
40KB
-
memory/2348-5-0x0000000000160000-0x0000000000170000-memory.dmpFilesize
64KB
-
memory/2348-4-0x0000000000150000-0x0000000000158000-memory.dmpFilesize
32KB
-
memory/2532-54-0x000000001B740000-0x000000001BA22000-memory.dmpFilesize
2.9MB
-
memory/2532-55-0x0000000001E60000-0x0000000001E68000-memory.dmpFilesize
32KB