Analysis
-
max time kernel
149s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 05:50
Static task
static1
Behavioral task
behavioral1
Sample
7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe
-
Size
64KB
-
MD5
7abae39050b21603339f64cd6d228590
-
SHA1
0ac1780652eb03bad6a883d9ddd6024a34a35eed
-
SHA256
d35fba75d05df718acf99dc34a4fdf50e9f3b6edde90a731b7248caa2ba4c7fc
-
SHA512
2dd7f3a2a29db81b2a956a838cb57cf5ef8a5c396fe31c8915b0c7d6f5fb450870545796b58aa22bd8d539528cf75126e5c31c3f03931f771adf893d78612404
-
SSDEEP
384:ObLwOs8AHsc4HMPwhKQLrog4/CFsrdHWMZw:Ovw981xvhKQLrog4/wQpWMZw
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{309C3F18-F078-46fb-8C66-137ECE4E5F94}\stubpath = "C:\\Windows\\{309C3F18-F078-46fb-8C66-137ECE4E5F94}.exe" {906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3B85B032-CDAC-4855-B52F-1BB9B71BEE98} {72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1EC9E976-4ED8-4560-A3A4-60BE2A5650DD}\stubpath = "C:\\Windows\\{1EC9E976-4ED8-4560-A3A4-60BE2A5650DD}.exe" {3B85B032-CDAC-4855-B52F-1BB9B71BEE98}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{82FAB796-0698-4708-92EE-B77A3B7AFE61} {2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{72B33383-9756-4fc0-AD4E-8DE62FCB713A} {82FAB796-0698-4708-92EE-B77A3B7AFE61}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{72B33383-9756-4fc0-AD4E-8DE62FCB713A}\stubpath = "C:\\Windows\\{72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exe" {82FAB796-0698-4708-92EE-B77A3B7AFE61}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}\stubpath = "C:\\Windows\\{26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exe" 7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{854C5374-3AA8-4300-BFF9-7DB25A05673F}\stubpath = "C:\\Windows\\{854C5374-3AA8-4300-BFF9-7DB25A05673F}.exe" {26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F9706835-B702-42d8-A726-5704461EC494} {309C3F18-F078-46fb-8C66-137ECE4E5F94}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1EC9E976-4ED8-4560-A3A4-60BE2A5650DD} {3B85B032-CDAC-4855-B52F-1BB9B71BEE98}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C2DD8506-CEE3-4313-B048-333AD0BCEF6B} {1EC9E976-4ED8-4560-A3A4-60BE2A5650DD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{309C3F18-F078-46fb-8C66-137ECE4E5F94} {906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F9706835-B702-42d8-A726-5704461EC494}\stubpath = "C:\\Windows\\{F9706835-B702-42d8-A726-5704461EC494}.exe" {309C3F18-F078-46fb-8C66-137ECE4E5F94}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}\stubpath = "C:\\Windows\\{2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exe" {2B94999A-286C-4865-A18B-2E8686118FD6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}\stubpath = "C:\\Windows\\{906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exe" {854C5374-3AA8-4300-BFF9-7DB25A05673F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2B94999A-286C-4865-A18B-2E8686118FD6} {F9706835-B702-42d8-A726-5704461EC494}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2B94999A-286C-4865-A18B-2E8686118FD6}\stubpath = "C:\\Windows\\{2B94999A-286C-4865-A18B-2E8686118FD6}.exe" {F9706835-B702-42d8-A726-5704461EC494}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2C008995-5CAC-4d8f-A2BF-E778A7C36C4A} {2B94999A-286C-4865-A18B-2E8686118FD6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{82FAB796-0698-4708-92EE-B77A3B7AFE61}\stubpath = "C:\\Windows\\{82FAB796-0698-4708-92EE-B77A3B7AFE61}.exe" {2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C} 7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{854C5374-3AA8-4300-BFF9-7DB25A05673F} {26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE} {854C5374-3AA8-4300-BFF9-7DB25A05673F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3B85B032-CDAC-4855-B52F-1BB9B71BEE98}\stubpath = "C:\\Windows\\{3B85B032-CDAC-4855-B52F-1BB9B71BEE98}.exe" {72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C2DD8506-CEE3-4313-B048-333AD0BCEF6B}\stubpath = "C:\\Windows\\{C2DD8506-CEE3-4313-B048-333AD0BCEF6B}.exe" {1EC9E976-4ED8-4560-A3A4-60BE2A5650DD}.exe -
Executes dropped EXE 12 IoCs
pid Process 3112 {26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exe 3976 {854C5374-3AA8-4300-BFF9-7DB25A05673F}.exe 780 {906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exe 2656 {309C3F18-F078-46fb-8C66-137ECE4E5F94}.exe 1924 {F9706835-B702-42d8-A726-5704461EC494}.exe 1144 {2B94999A-286C-4865-A18B-2E8686118FD6}.exe 5116 {2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exe 2920 {82FAB796-0698-4708-92EE-B77A3B7AFE61}.exe 2948 {72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exe 2540 {3B85B032-CDAC-4855-B52F-1BB9B71BEE98}.exe 3652 {1EC9E976-4ED8-4560-A3A4-60BE2A5650DD}.exe 1200 {C2DD8506-CEE3-4313-B048-333AD0BCEF6B}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{309C3F18-F078-46fb-8C66-137ECE4E5F94}.exe {906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exe File created C:\Windows\{F9706835-B702-42d8-A726-5704461EC494}.exe {309C3F18-F078-46fb-8C66-137ECE4E5F94}.exe File created C:\Windows\{2B94999A-286C-4865-A18B-2E8686118FD6}.exe {F9706835-B702-42d8-A726-5704461EC494}.exe File created C:\Windows\{2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exe {2B94999A-286C-4865-A18B-2E8686118FD6}.exe File created C:\Windows\{82FAB796-0698-4708-92EE-B77A3B7AFE61}.exe {2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exe File created C:\Windows\{72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exe {82FAB796-0698-4708-92EE-B77A3B7AFE61}.exe File created C:\Windows\{854C5374-3AA8-4300-BFF9-7DB25A05673F}.exe {26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exe File created C:\Windows\{906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exe {854C5374-3AA8-4300-BFF9-7DB25A05673F}.exe File created C:\Windows\{C2DD8506-CEE3-4313-B048-333AD0BCEF6B}.exe {1EC9E976-4ED8-4560-A3A4-60BE2A5650DD}.exe File created C:\Windows\{1EC9E976-4ED8-4560-A3A4-60BE2A5650DD}.exe {3B85B032-CDAC-4855-B52F-1BB9B71BEE98}.exe File created C:\Windows\{26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exe 7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe File created C:\Windows\{3B85B032-CDAC-4855-B52F-1BB9B71BEE98}.exe {72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3440 7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe Token: SeIncBasePriorityPrivilege 3112 {26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exe Token: SeIncBasePriorityPrivilege 3976 {854C5374-3AA8-4300-BFF9-7DB25A05673F}.exe Token: SeIncBasePriorityPrivilege 780 {906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exe Token: SeIncBasePriorityPrivilege 2656 {309C3F18-F078-46fb-8C66-137ECE4E5F94}.exe Token: SeIncBasePriorityPrivilege 1924 {F9706835-B702-42d8-A726-5704461EC494}.exe Token: SeIncBasePriorityPrivilege 1144 {2B94999A-286C-4865-A18B-2E8686118FD6}.exe Token: SeIncBasePriorityPrivilege 5116 {2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exe Token: SeIncBasePriorityPrivilege 2920 {82FAB796-0698-4708-92EE-B77A3B7AFE61}.exe Token: SeIncBasePriorityPrivilege 2948 {72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exe Token: SeIncBasePriorityPrivilege 2540 {3B85B032-CDAC-4855-B52F-1BB9B71BEE98}.exe Token: SeIncBasePriorityPrivilege 3652 {1EC9E976-4ED8-4560-A3A4-60BE2A5650DD}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3440 wrote to memory of 3112 3440 7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe 97 PID 3440 wrote to memory of 3112 3440 7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe 97 PID 3440 wrote to memory of 3112 3440 7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe 97 PID 3440 wrote to memory of 1708 3440 7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe 98 PID 3440 wrote to memory of 1708 3440 7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe 98 PID 3440 wrote to memory of 1708 3440 7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe 98 PID 3112 wrote to memory of 3976 3112 {26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exe 99 PID 3112 wrote to memory of 3976 3112 {26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exe 99 PID 3112 wrote to memory of 3976 3112 {26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exe 99 PID 3112 wrote to memory of 884 3112 {26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exe 100 PID 3112 wrote to memory of 884 3112 {26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exe 100 PID 3112 wrote to memory of 884 3112 {26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exe 100 PID 3976 wrote to memory of 780 3976 {854C5374-3AA8-4300-BFF9-7DB25A05673F}.exe 103 PID 3976 wrote to memory of 780 3976 {854C5374-3AA8-4300-BFF9-7DB25A05673F}.exe 103 PID 3976 wrote to memory of 780 3976 {854C5374-3AA8-4300-BFF9-7DB25A05673F}.exe 103 PID 3976 wrote to memory of 3144 3976 {854C5374-3AA8-4300-BFF9-7DB25A05673F}.exe 104 PID 3976 wrote to memory of 3144 3976 {854C5374-3AA8-4300-BFF9-7DB25A05673F}.exe 104 PID 3976 wrote to memory of 3144 3976 {854C5374-3AA8-4300-BFF9-7DB25A05673F}.exe 104 PID 780 wrote to memory of 2656 780 {906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exe 105 PID 780 wrote to memory of 2656 780 {906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exe 105 PID 780 wrote to memory of 2656 780 {906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exe 105 PID 780 wrote to memory of 4588 780 {906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exe 106 PID 780 wrote to memory of 4588 780 {906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exe 106 PID 780 wrote to memory of 4588 780 {906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exe 106 PID 2656 wrote to memory of 1924 2656 {309C3F18-F078-46fb-8C66-137ECE4E5F94}.exe 107 PID 2656 wrote to memory of 1924 2656 {309C3F18-F078-46fb-8C66-137ECE4E5F94}.exe 107 PID 2656 wrote to memory of 1924 2656 {309C3F18-F078-46fb-8C66-137ECE4E5F94}.exe 107 PID 2656 wrote to memory of 3780 2656 {309C3F18-F078-46fb-8C66-137ECE4E5F94}.exe 108 PID 2656 wrote to memory of 3780 2656 {309C3F18-F078-46fb-8C66-137ECE4E5F94}.exe 108 PID 2656 wrote to memory of 3780 2656 {309C3F18-F078-46fb-8C66-137ECE4E5F94}.exe 108 PID 1924 wrote to memory of 1144 1924 {F9706835-B702-42d8-A726-5704461EC494}.exe 110 PID 1924 wrote to memory of 1144 1924 {F9706835-B702-42d8-A726-5704461EC494}.exe 110 PID 1924 wrote to memory of 1144 1924 {F9706835-B702-42d8-A726-5704461EC494}.exe 110 PID 1924 wrote to memory of 2292 1924 {F9706835-B702-42d8-A726-5704461EC494}.exe 111 PID 1924 wrote to memory of 2292 1924 {F9706835-B702-42d8-A726-5704461EC494}.exe 111 PID 1924 wrote to memory of 2292 1924 {F9706835-B702-42d8-A726-5704461EC494}.exe 111 PID 1144 wrote to memory of 5116 1144 {2B94999A-286C-4865-A18B-2E8686118FD6}.exe 112 PID 1144 wrote to memory of 5116 1144 {2B94999A-286C-4865-A18B-2E8686118FD6}.exe 112 PID 1144 wrote to memory of 5116 1144 {2B94999A-286C-4865-A18B-2E8686118FD6}.exe 112 PID 1144 wrote to memory of 2300 1144 {2B94999A-286C-4865-A18B-2E8686118FD6}.exe 113 PID 1144 wrote to memory of 2300 1144 {2B94999A-286C-4865-A18B-2E8686118FD6}.exe 113 PID 1144 wrote to memory of 2300 1144 {2B94999A-286C-4865-A18B-2E8686118FD6}.exe 113 PID 5116 wrote to memory of 2920 5116 {2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exe 117 PID 5116 wrote to memory of 2920 5116 {2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exe 117 PID 5116 wrote to memory of 2920 5116 {2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exe 117 PID 5116 wrote to memory of 1692 5116 {2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exe 118 PID 5116 wrote to memory of 1692 5116 {2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exe 118 PID 5116 wrote to memory of 1692 5116 {2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exe 118 PID 2920 wrote to memory of 2948 2920 {82FAB796-0698-4708-92EE-B77A3B7AFE61}.exe 122 PID 2920 wrote to memory of 2948 2920 {82FAB796-0698-4708-92EE-B77A3B7AFE61}.exe 122 PID 2920 wrote to memory of 2948 2920 {82FAB796-0698-4708-92EE-B77A3B7AFE61}.exe 122 PID 2920 wrote to memory of 1856 2920 {82FAB796-0698-4708-92EE-B77A3B7AFE61}.exe 123 PID 2920 wrote to memory of 1856 2920 {82FAB796-0698-4708-92EE-B77A3B7AFE61}.exe 123 PID 2920 wrote to memory of 1856 2920 {82FAB796-0698-4708-92EE-B77A3B7AFE61}.exe 123 PID 2948 wrote to memory of 2540 2948 {72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exe 124 PID 2948 wrote to memory of 2540 2948 {72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exe 124 PID 2948 wrote to memory of 2540 2948 {72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exe 124 PID 2948 wrote to memory of 3020 2948 {72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exe 125 PID 2948 wrote to memory of 3020 2948 {72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exe 125 PID 2948 wrote to memory of 3020 2948 {72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exe 125 PID 2540 wrote to memory of 3652 2540 {3B85B032-CDAC-4855-B52F-1BB9B71BEE98}.exe 128 PID 2540 wrote to memory of 3652 2540 {3B85B032-CDAC-4855-B52F-1BB9B71BEE98}.exe 128 PID 2540 wrote to memory of 3652 2540 {3B85B032-CDAC-4855-B52F-1BB9B71BEE98}.exe 128 PID 2540 wrote to memory of 1048 2540 {3B85B032-CDAC-4855-B52F-1BB9B71BEE98}.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7abae39050b21603339f64cd6d228590_NeikiAnalytics.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\{26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exeC:\Windows\{26A0F5A6-31D5-4fcd-A9C6-CBBF8125AE2C}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\{854C5374-3AA8-4300-BFF9-7DB25A05673F}.exeC:\Windows\{854C5374-3AA8-4300-BFF9-7DB25A05673F}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\{906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exeC:\Windows\{906AB8F6-4CC8-47bf-8A0D-FDD338D0DACE}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\{309C3F18-F078-46fb-8C66-137ECE4E5F94}.exeC:\Windows\{309C3F18-F078-46fb-8C66-137ECE4E5F94}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\{F9706835-B702-42d8-A726-5704461EC494}.exeC:\Windows\{F9706835-B702-42d8-A726-5704461EC494}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\{2B94999A-286C-4865-A18B-2E8686118FD6}.exeC:\Windows\{2B94999A-286C-4865-A18B-2E8686118FD6}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\{2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exeC:\Windows\{2C008995-5CAC-4d8f-A2BF-E778A7C36C4A}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\{82FAB796-0698-4708-92EE-B77A3B7AFE61}.exeC:\Windows\{82FAB796-0698-4708-92EE-B77A3B7AFE61}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\{72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exeC:\Windows\{72B33383-9756-4fc0-AD4E-8DE62FCB713A}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\{3B85B032-CDAC-4855-B52F-1BB9B71BEE98}.exeC:\Windows\{3B85B032-CDAC-4855-B52F-1BB9B71BEE98}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\{1EC9E976-4ED8-4560-A3A4-60BE2A5650DD}.exeC:\Windows\{1EC9E976-4ED8-4560-A3A4-60BE2A5650DD}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3652 -
C:\Windows\{C2DD8506-CEE3-4313-B048-333AD0BCEF6B}.exeC:\Windows\{C2DD8506-CEE3-4313-B048-333AD0BCEF6B}.exe13⤵
- Executes dropped EXE
PID:1200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1EC9E~1.EXE > nul13⤵PID:832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3B85B~1.EXE > nul12⤵PID:1048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{72B33~1.EXE > nul11⤵PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{82FAB~1.EXE > nul10⤵PID:1856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2C008~1.EXE > nul9⤵PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2B949~1.EXE > nul8⤵PID:2300
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F9706~1.EXE > nul7⤵PID:2292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{309C3~1.EXE > nul6⤵PID:3780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{906AB~1.EXE > nul5⤵PID:4588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{854C5~1.EXE > nul4⤵PID:3144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26A0F~1.EXE > nul3⤵PID:884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\7ABAE3~1.EXE > nul2⤵PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD524cb34fefa5c6c95e2b19cdf146df4aa
SHA1245c9099141ff479ed2cbda06a69d65bdc0baf17
SHA256a201f9e63d38786da1de3f4d03908d5864b837e417ff310fca0252ef7cc01c63
SHA5124a7e61fde29e9ff49fa03ce1c28582ff35236f65fe68cc8aae67b094ed23642162be33633079d514124474dc368de494bad631f132327b67e147142bdd1553bc
-
Filesize
64KB
MD55e9137a39b22f2f6fe833b2ad57d12c6
SHA144ec8fe20c720f10ff6b749a31fe8e1508548f2d
SHA256d04c817e7ea9de628c46c3fb3432883909bfe5ec9d4b950ef7af0bc53afc97a2
SHA512d2ff57b013181121a9e75eb6d43726749691cfc7522ae7cf79c2f75dfc4616e35757305b6923ca931f3a9c88d9fb4a36cb5d40cdec607d3629ee8e204ea44608
-
Filesize
64KB
MD5e3873f0e05c848390a79db3a5fea404d
SHA144ec8af4e16be40139dc9d665119c4032e92c020
SHA256b75d024e6269f650010364d63a5a217d1c0d85d512c7c3f0e538ce4e200edb13
SHA5127b2a93cd59ed07e2d61c6bd78ce1689eb7c5357665262d73d9a9e6a434b3d35d9f81cfb404055e561d7fb29e1be4b6793d04a4c3e9fda907be3a62355fb40ef5
-
Filesize
64KB
MD526deba8eab015fb9f295772750e26288
SHA11a3f36cc3493e1cb110ed519c1ca26608ef60135
SHA25678d52b3b18f8aacdf5bc1485d55cab3de710fe0ddc299b81300a0dfd576d1c78
SHA5122920ac30d85a4d4ffef8f5a6986564a70d294e15f3d633ea53ab20fa14e99facb09b3d40112aef48f6bc02867cb4b545d85cbd237af27d9640b98b6ae18794a6
-
Filesize
64KB
MD598f5b8d6c58987f5a6ce2294b26b74da
SHA114a148745d5aa5cae2f0021e7fd6fc4abee98704
SHA256ac0d356cff12f4ac244cee20f9cbb303f6c35752fea09f39e4be4562ab174482
SHA51263543e50e67ab7b375e9bb9a6fa04331198d1343ee6fc1515cfd11cc6104a36e7df13c4aaac61d278fdef2ec02d4eeebc412465a1dc5535ae9d229045bf50638
-
Filesize
64KB
MD501ecbf5b5ccb0d58fc0f9766a8ebffd2
SHA1123c343ba1b377570c74966d89ec0176613692f0
SHA256f8b34e83ba2b3767bc39b7216b790d3c652c04cf78d98e241c25ff766dfd3717
SHA51228d656db885e5b38ab43436329d0bbff7e01306ebb27a690f023940d372f186b8281484c992aba490690c7f57f3fe166981e3552da5dc729eb0e5ea6ff0e8397
-
Filesize
64KB
MD56c8a43bb6b4658432981c2f83f8ec91d
SHA185a7c13fb3c2e02ecf90b6a0bba1ce6e4997b4fe
SHA25601b33a9a1e94289d2cc215b2486b2b2bfaca3d620c96ab92de20c37ed51d4d3d
SHA5124531b1960a9bdbd418a5ef05a1eb9763cb210f20fb0c5021d44ba69f662dcb8fbadd632d129235b4f488ee32332d92b838ae1f0266279eee0cac8dc3f2c210e6
-
Filesize
64KB
MD5cd5354f1d60fc27ca58407fa91832b9e
SHA1fd265abba6a07aa6bf891649139a41b4b1629e57
SHA2561c7a6bb5c1de3bfc7e1fc1c02657be7cf54854124ebbdfa92a262dbf2487529b
SHA512a8bf6c75187267277ee356fbf29dde14f14d6a2c84963e6cc86da45ca7ba1b5d85bc0e96855888a16262d3728e5ac34120199e6423d993a07f8fd929a62cc5bd
-
Filesize
64KB
MD581a059fce40eac8825ada43f2ddf020c
SHA198b9e882eff4acb8cfed1d76eefc50b02502fc04
SHA2560d141c1553c0f7c1a345c0aeb7b4f76ca50b55d0be96347073422446298b9932
SHA512135686991dcfdf0a4ebdac08ed171ed3bf5b9fd354250ff242b68e17719c2edef8de290da50a996cb4abb08fbb64037b62220f017e288ea6c78e897e7cab9592
-
Filesize
64KB
MD553d6653eebb0857f366be2a9e7372a7d
SHA1e62a329b1928b34c07ba97262022c81af3f255f6
SHA256c02153eb3f3dde60521edf901502703aee523949eb6ee3711be805341b31c925
SHA5121e6a73aaaaf2d76284964fbc865782d3a416177bebe0d30153890c9fbe3d150a25350a7017d253956cabfbf110a6d43a1176b0c56fea1f006991a2d17d2baa37
-
Filesize
64KB
MD511b22a0355315e082523a787bf933594
SHA1f98fc28ae92d0bdfac9779f3ca9c7a1264d5183b
SHA256aae050d7b16e8be82fd5bd7c5f0aed6f72fff11155df2706d12ccb4cac926fc7
SHA5120e3d30fed3b6369644a567106cb7c7ce584b5126c37fa5191f09140e09268d4974abab559105e14cb25a314e46c978eb8d8c37dc0b474cbf4d034e5c894dc853
-
Filesize
64KB
MD510dec0f4148b6ae7ccd5f43f7be4af05
SHA141e426b38b3f022f74c24a1328fe6966947c1e28
SHA2563718dd866e5a2a0ac3223d7d11947174d48f65b9de0403b93d9757f07bdba6ce
SHA51254120b6f577fee795e64ea36b65ba563d4b5cf764a2c9ff3dbcff898e48543068cd85beef49364289a00fbdc3a83028e37c211d09f3de01236a1c29aefef2f25