Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe
-
Size
91KB
-
MD5
719bea0f7b927ed6dc1e0040b1d358b0
-
SHA1
88b64a29556f66e75dcd47d129819a05584f3418
-
SHA256
ee337ca89999e8f945c95e99f064ea4998518dc54a47d3fa299f310ab1813238
-
SHA512
d7375e7807c106bf3f33b742ee141222b23b9d776427c6b984d99865de5e64cc27aa177702fdebdf1c8b63b887f3e97dba681ad7c907c8cb26d353ddc0a21dd4
-
SSDEEP
768:E3gRYjXbUeHORIC4ZxBMldNKm8Mxm8I+IxrjPfAQ4o3Imuo3gRYjXbUeHORIC4ZR:uT3OA3+KQsxfS41T3OA3+KQsxfS4N
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
Processes:
xk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 2576 xk.exe 1588 IExplorer.exe 1672 WINLOGON.EXE 1612 CSRSS.EXE 1600 SERVICES.EXE 640 LSASS.EXE 2028 SMSS.EXE -
Loads dropped DLL 12 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exepid process 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Drops file in System32 directory 6 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process File created C:\Windows\SysWOW64\shell.exe 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Mig2.scr 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\IExplorer.exe 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\shell.exe 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\xk.exe 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe File created C:\Windows\xk.exe 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 4 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop\ 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Modifies registry class 15 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exepid process 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exexk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe 2576 xk.exe 1588 IExplorer.exe 1672 WINLOGON.EXE 1612 CSRSS.EXE 1600 SERVICES.EXE 640 LSASS.EXE 2028 SMSS.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription pid process target process PID 2292 wrote to memory of 2576 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe xk.exe PID 2292 wrote to memory of 2576 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe xk.exe PID 2292 wrote to memory of 2576 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe xk.exe PID 2292 wrote to memory of 2576 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe xk.exe PID 2292 wrote to memory of 1588 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe IExplorer.exe PID 2292 wrote to memory of 1588 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe IExplorer.exe PID 2292 wrote to memory of 1588 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe IExplorer.exe PID 2292 wrote to memory of 1588 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe IExplorer.exe PID 2292 wrote to memory of 1672 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe WINLOGON.EXE PID 2292 wrote to memory of 1672 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe WINLOGON.EXE PID 2292 wrote to memory of 1672 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe WINLOGON.EXE PID 2292 wrote to memory of 1672 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe WINLOGON.EXE PID 2292 wrote to memory of 1612 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe CSRSS.EXE PID 2292 wrote to memory of 1612 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe CSRSS.EXE PID 2292 wrote to memory of 1612 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe CSRSS.EXE PID 2292 wrote to memory of 1612 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe CSRSS.EXE PID 2292 wrote to memory of 1600 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SERVICES.EXE PID 2292 wrote to memory of 1600 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SERVICES.EXE PID 2292 wrote to memory of 1600 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SERVICES.EXE PID 2292 wrote to memory of 1600 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SERVICES.EXE PID 2292 wrote to memory of 640 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe LSASS.EXE PID 2292 wrote to memory of 640 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe LSASS.EXE PID 2292 wrote to memory of 640 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe LSASS.EXE PID 2292 wrote to memory of 640 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe LSASS.EXE PID 2292 wrote to memory of 2028 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SMSS.EXE PID 2292 wrote to memory of 2028 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SMSS.EXE PID 2292 wrote to memory of 2028 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SMSS.EXE PID 2292 wrote to memory of 2028 2292 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe SMSS.EXE -
System policy modification 1 TTPs 4 IoCs
Processes:
719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\719bea0f7b927ed6dc1e0040b1d358b0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2292 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2576 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1588 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:640 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2028
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5f818c6ebca0e51026d6860af728bc6e1
SHA1fc1c71c4cfdb7105be9191c4de13073a400b3044
SHA25666da54b49df2a959dad3e6274a15c67393d5ed2fd2e39302fbbd1bb927812111
SHA512beb4863e2d6ba1a8a6d2ea3a1a8fd9b0bc9a1e1dd9865b1c8cd0b8def25d45ce5c9ecd4bc7eac0c57eebe456f9ecc842b46fc078637353930e420381ba15179e
-
Filesize
91KB
MD5719bea0f7b927ed6dc1e0040b1d358b0
SHA188b64a29556f66e75dcd47d129819a05584f3418
SHA256ee337ca89999e8f945c95e99f064ea4998518dc54a47d3fa299f310ab1813238
SHA512d7375e7807c106bf3f33b742ee141222b23b9d776427c6b984d99865de5e64cc27aa177702fdebdf1c8b63b887f3e97dba681ad7c907c8cb26d353ddc0a21dd4
-
Filesize
91KB
MD53fc75e257e199baac87dc72e5ae50e47
SHA1c9158b4485bfcf37033bb34cc9605af67bb07e13
SHA2564170d5cb349d1dfae6645fe8b7f7d19bb9e28b2b6a86fa184f881f823f7ab3c3
SHA5122843cd75faf7bf6df2c0cf61e3b86ada1a8762fc1e5772abdb15c296e746407462cfa128fc9c0d0984a106d7109586c11087bbad2f10be21a563433824fe2b7c
-
Filesize
91KB
MD5942a260f63f64be55592928e9e44d0d4
SHA1c474b26afccce5d611936d1e3d3b3c9ada53ec18
SHA256a52f63f6dede34463a7e240fa8a3e99d8ac05971d22361e0f473f52c57872f1f
SHA512a6b721e0b2e72e3ca646fd01e13bf49c4b6781d45a42c9d4a715e9c67c5c1cf566e208b405cc37e55f4b3dcde88cf50bb50088e0e0f3c706b5aa055e245b9710
-
Filesize
91KB
MD5de2f81f034e49fc87d6624295a79be87
SHA12bc722ce6b9c703f6428a71227175828389b08eb
SHA25606d81ef45517c540bebe42dcb75320caa67cc641abe66df273ee9f2ae5561948
SHA512d68bf520cad9ccfe06e408c5c77476758d371c463ac900968786d4c93301be6ddfd233c4e5fa6dad3db8be53cef3df11ae4dfeafd9b31c2bdae76c441ed5750b
-
Filesize
91KB
MD56a6b4950a918ee665592ec5cb68ecab6
SHA1d6b7e64199922de14809c9dcba89e100af7bacae
SHA25650340e653170632f5a207a113d787a52e9959c8b651f73c17fd0ac22bad59eb0
SHA512179fd9da6189cc511ebd14a25cee66e5829b0e4505d85820b70bed10831c9009a434efc9c01a90c57e2e1407300b1ca6f8e961a72c6194e023481ca685bc14d0
-
Filesize
91KB
MD5b30c4b548ff545a5d0e09ed5e885ce2b
SHA1dc524b05fd49bfc8d00ec75cf124744f6d899c35
SHA256ba7b4fd16c61ff1cc08806bcf581fd77849605143c8def4a911f7aa05c9a08e2
SHA5125beec0edee95658f171172963255a8c19539aa9ecc38e8b05a906e39713539381f309d9f7fb504884c5e96d25ca9cbfbf3d8bcacf1e90bb81e4fbdf80617061d
-
Filesize
91KB
MD5926faedeafd9ed55c75b7aee913e843b
SHA16796842b951052940cf16d9f70d57af30dc02aa4
SHA256cda9dc84dbd561a838471283e523d3af0a1514c90be6f93c9f4b3af8a12aded7
SHA512bf5d1c528abfbb14758f177221ce5a3e2bee62cfccdbd476a3def84fe1da1884245651545bc00ac1af32095c09bb3ae14d187722446c5f81102339dd2fadfb8b