Analysis
-
max time kernel
130s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:41
Behavioral task
behavioral1
Sample
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe
-
Size
91KB
-
MD5
6fb16f7e16f7b7cbbda908fb4f7eb4f0
-
SHA1
27c0f978201c994c7e19d7ea33d8c7ca867d0c66
-
SHA256
d21386b9e80499cc3edc46a20063059a228cc6764e370b8887a61cd21e8bc694
-
SHA512
cd7dfcd6bd0add6d01ad87560ed8dd48d8be64181203bc0cf87122933e717df977b09da73e6a1c80e0db81ae325a1e58a9aba5a5c9100dcd954679d21dcacb04
-
SSDEEP
1536:XJRtlEnBHHIgabuYotV/JbJCX5SBijJRtlEnBHHIgabuYotV/JbJCX5SBiE:XvtYxOuYotvYQIjvtYxOuYotvYQIE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
Processes:
xk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 2276 xk.exe 4060 IExplorer.exe 3764 WINLOGON.EXE 1004 CSRSS.EXE 4856 SERVICES.EXE 4780 LSASS.EXE 2324 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral2/memory/216-0-0x0000000000400000-0x000000000042F000-memory.dmp upx C:\Users\Admin\AppData\Local\winlogon.exe upx C:\Windows\xk.exe upx C:\Windows\SysWOW64\IExplorer.exe upx behavioral2/memory/2276-112-0x0000000000400000-0x000000000042F000-memory.dmp upx C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE upx behavioral2/memory/4060-118-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/3764-123-0x0000000000400000-0x000000000042F000-memory.dmp upx C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE upx behavioral2/memory/1004-129-0x0000000000400000-0x000000000042F000-memory.dmp upx C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE upx behavioral2/memory/4856-133-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/4856-137-0x0000000000400000-0x000000000042F000-memory.dmp upx C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE upx behavioral2/memory/4780-144-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/2324-151-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/216-153-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Drops file in System32 directory 6 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\SysWOW64\shell.exe 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\shell.exe 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Mig2.scr 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\IExplorer.exe 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\xk.exe 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe File created C:\Windows\xk.exe 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Modifies Control Panel 4 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Modifies registry class 15 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exepid process 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exexk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe 2276 xk.exe 4060 IExplorer.exe 3764 WINLOGON.EXE 1004 CSRSS.EXE 4856 SERVICES.EXE 4780 LSASS.EXE 2324 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription pid process target process PID 216 wrote to memory of 2276 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe xk.exe PID 216 wrote to memory of 2276 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe xk.exe PID 216 wrote to memory of 2276 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe xk.exe PID 216 wrote to memory of 4060 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe IExplorer.exe PID 216 wrote to memory of 4060 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe IExplorer.exe PID 216 wrote to memory of 4060 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe IExplorer.exe PID 216 wrote to memory of 3764 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe WINLOGON.EXE PID 216 wrote to memory of 3764 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe WINLOGON.EXE PID 216 wrote to memory of 3764 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe WINLOGON.EXE PID 216 wrote to memory of 1004 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe CSRSS.EXE PID 216 wrote to memory of 1004 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe CSRSS.EXE PID 216 wrote to memory of 1004 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe CSRSS.EXE PID 216 wrote to memory of 4856 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe SERVICES.EXE PID 216 wrote to memory of 4856 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe SERVICES.EXE PID 216 wrote to memory of 4856 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe SERVICES.EXE PID 216 wrote to memory of 4780 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe LSASS.EXE PID 216 wrote to memory of 4780 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe LSASS.EXE PID 216 wrote to memory of 4780 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe LSASS.EXE PID 216 wrote to memory of 2324 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe SMSS.EXE PID 216 wrote to memory of 2324 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe SMSS.EXE PID 216 wrote to memory of 2324 216 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe SMSS.EXE -
System policy modification 1 TTPs 4 IoCs
Processes:
6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6fb16f7e16f7b7cbbda908fb4f7eb4f0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:216 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2276 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4060 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3764 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1004 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4856 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4780 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2324
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5eaadc44bc1367c2b32eb0a4200c29f1f
SHA1c1a9d01fabdd832a336d0c13d65bbfad1769ac4c
SHA256237585ec3499013f38d4beab4777e4cdb68795233f027ec3df2d6ce005b308b0
SHA51246d84f0b3ffb4ea37327fa4888f5f20c7bd9fd9e8dc92024071473da1884d8cdb10c5ec03b253aff68b63bf60f8e8c6f18e0af76fd74e37c868b9a9674140a79
-
Filesize
91KB
MD5ce8795e26851ed6ceba2121b35eb5ce9
SHA179087222d507ba4a637506b324c19815105ba030
SHA2561918d29e2fd8a7b51d1df5304adef0d400b600498a3fed772ca21e15fc34e23e
SHA512f3d28188a0460c63aa4fbbfc68c4c5c7f1cd20df3af0992016eb0df1d4f78bef8c476f8781993cb1f1181cffca4eb7d18fb63ee2e55fe94f31bc25a6a071c09f
-
Filesize
91KB
MD5cf4b928260c138ea2d9c5b85cf71b3f1
SHA1bef87d916cebbb9896246af0ddc4d7c2b39a9ce3
SHA256f82213e68cdfa6459f9f2bd3010463c4b9dde0440d405417b4ad303a2a5dbba5
SHA512afa27b8c091359bc59ad7721b803787622dcda20f0f201392deea5a88d3ddb229f415fead510df19b4f6c4fb528777effe3bee1a0545edef2332ebf83f053b02
-
Filesize
91KB
MD58540aed4eb383d86bdb98a1cb8d01139
SHA187edbf77f73c131874a9cd04fb6dedc99cd2c079
SHA2562aefdb56575976031992d8bfa339aa05b0d413db73cffd8cf901dc1119da6b4a
SHA512430e7cdc20781fa155d07788a36d02a40145a9a6fdf616b86b46c9172b1292218db3a1b3802103b697013da4d3dc388e3ed6d24ade773f70dae36a3f3088e936
-
Filesize
91KB
MD56fb16f7e16f7b7cbbda908fb4f7eb4f0
SHA127c0f978201c994c7e19d7ea33d8c7ca867d0c66
SHA256d21386b9e80499cc3edc46a20063059a228cc6764e370b8887a61cd21e8bc694
SHA512cd7dfcd6bd0add6d01ad87560ed8dd48d8be64181203bc0cf87122933e717df977b09da73e6a1c80e0db81ae325a1e58a9aba5a5c9100dcd954679d21dcacb04
-
Filesize
91KB
MD594afcc6df44b6b9514003d4a67b36b38
SHA1a4ad53e5c2a0b994387f5494364a740fe042a3fb
SHA256c65c3bab66c40ba636c58c7808b17524ee9b084650f4700fb9c9c604d8abb28c
SHA5127300fbe33d09a4d65e68cdd17a0686cc8e276714d6a40cda961d054f0f652ea844abffe68e4d449a951d74f6d1242b7220e9a29592d6130d3aaeac2d6a765b4f
-
Filesize
91KB
MD5895e6a30dd3b1187ae74aa1f713eebc3
SHA164e20de4b8a5e1a33ae45bfeba55d0d90f114dce
SHA256296bd8f90e58fd9f6687b3a04715d0289425957573bccb3b55693b56b709b182
SHA5123f8c278c7dd0bb26107f7b2be4f3c417dc0403a9f50f3128611edd03831691753b4b4f9bab5c82240d2c2314a7e183cd8c724f0e28149dc985434c4a9657d448