Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe
-
Size
60KB
-
MD5
fdb89067b1ffa6ece1b8e9bcae4d1140
-
SHA1
668bb27b71d1ddfd36a6951634ff3867d7e10f82
-
SHA256
ff66ea209a92bc02fff6e62ce0515a0dbaecd103983d6decddb377b4a5feeaaa
-
SHA512
914b327f59ed7c61b1e3ea935af9f7170353d5b0e57e862fac743764527d6017fc04ede022838946cbbfda55fddf01892a5a931aa46506c0cf86fdef50ed41d3
-
SSDEEP
192:vbOzawOs81elJHsc45CcRZOgtShcWaOT2QLrCqwnh4/CFxyNhoy5t:vbLwOs8AHsc4sMfwhKQLroh4/CFsrd
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71B6476F-EF62-4e76-9408-D2BA8941BA82}\stubpath = "C:\\Windows\\{71B6476F-EF62-4e76-9408-D2BA8941BA82}.exe" {486B8941-7578-4b5e-A280-871FE51673AA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{58D6402A-FA53-453d-BE60-A59F56E9FAD9} {E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}\stubpath = "C:\\Windows\\{9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe" {9168B936-D438-4574-A4BC-DE5381234067}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6640FD06-3106-4fa0-B413-2AA8E9EB10B8}\stubpath = "C:\\Windows\\{6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe" {9203D674-8E7A-40e0-B978-0368B476453A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF0BBE6C-DB91-4a8a-8882-EFEE614951AD}\stubpath = "C:\\Windows\\{AF0BBE6C-DB91-4a8a-8882-EFEE614951AD}.exe" {6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71B6476F-EF62-4e76-9408-D2BA8941BA82} {486B8941-7578-4b5e-A280-871FE51673AA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{58D6402A-FA53-453d-BE60-A59F56E9FAD9}\stubpath = "C:\\Windows\\{58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe" {E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9203D674-8E7A-40e0-B978-0368B476453A} {AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FF4463E3-D14C-4ee5-8209-BF9201DF69FF} {AF0BBE6C-DB91-4a8a-8882-EFEE614951AD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FF4463E3-D14C-4ee5-8209-BF9201DF69FF}\stubpath = "C:\\Windows\\{FF4463E3-D14C-4ee5-8209-BF9201DF69FF}.exe" {AF0BBE6C-DB91-4a8a-8882-EFEE614951AD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{486B8941-7578-4b5e-A280-871FE51673AA} {FF4463E3-D14C-4ee5-8209-BF9201DF69FF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9} fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}\stubpath = "C:\\Windows\\{E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe" fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF753B19-C0D9-4e19-B435-3CD98A0FB2C8} {9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}\stubpath = "C:\\Windows\\{AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe" {9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF0BBE6C-DB91-4a8a-8882-EFEE614951AD} {6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{486B8941-7578-4b5e-A280-871FE51673AA}\stubpath = "C:\\Windows\\{486B8941-7578-4b5e-A280-871FE51673AA}.exe" {FF4463E3-D14C-4ee5-8209-BF9201DF69FF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9168B936-D438-4574-A4BC-DE5381234067} {58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9168B936-D438-4574-A4BC-DE5381234067}\stubpath = "C:\\Windows\\{9168B936-D438-4574-A4BC-DE5381234067}.exe" {58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9B1E5C49-E46E-4d2b-B155-2656DF24FB3C} {9168B936-D438-4574-A4BC-DE5381234067}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9203D674-8E7A-40e0-B978-0368B476453A}\stubpath = "C:\\Windows\\{9203D674-8E7A-40e0-B978-0368B476453A}.exe" {AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6640FD06-3106-4fa0-B413-2AA8E9EB10B8} {9203D674-8E7A-40e0-B978-0368B476453A}.exe -
Deletes itself 1 IoCs
pid Process 2120 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2716 {E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe 2632 {58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe 2468 {9168B936-D438-4574-A4BC-DE5381234067}.exe 2896 {9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe 2732 {AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe 1984 {9203D674-8E7A-40e0-B978-0368B476453A}.exe 1976 {6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe 1572 {AF0BBE6C-DB91-4a8a-8882-EFEE614951AD}.exe 2112 {FF4463E3-D14C-4ee5-8209-BF9201DF69FF}.exe 2832 {486B8941-7578-4b5e-A280-871FE51673AA}.exe 1116 {71B6476F-EF62-4e76-9408-D2BA8941BA82}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe {9168B936-D438-4574-A4BC-DE5381234067}.exe File created C:\Windows\{AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe {9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe File created C:\Windows\{9203D674-8E7A-40e0-B978-0368B476453A}.exe {AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe File created C:\Windows\{FF4463E3-D14C-4ee5-8209-BF9201DF69FF}.exe {AF0BBE6C-DB91-4a8a-8882-EFEE614951AD}.exe File created C:\Windows\{71B6476F-EF62-4e76-9408-D2BA8941BA82}.exe {486B8941-7578-4b5e-A280-871FE51673AA}.exe File created C:\Windows\{9168B936-D438-4574-A4BC-DE5381234067}.exe {58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe File created C:\Windows\{58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe {E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe File created C:\Windows\{6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe {9203D674-8E7A-40e0-B978-0368B476453A}.exe File created C:\Windows\{AF0BBE6C-DB91-4a8a-8882-EFEE614951AD}.exe {6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe File created C:\Windows\{486B8941-7578-4b5e-A280-871FE51673AA}.exe {FF4463E3-D14C-4ee5-8209-BF9201DF69FF}.exe File created C:\Windows\{E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 340 fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe Token: SeIncBasePriorityPrivilege 2716 {E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe Token: SeIncBasePriorityPrivilege 2632 {58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe Token: SeIncBasePriorityPrivilege 2468 {9168B936-D438-4574-A4BC-DE5381234067}.exe Token: SeIncBasePriorityPrivilege 2896 {9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe Token: SeIncBasePriorityPrivilege 2732 {AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe Token: SeIncBasePriorityPrivilege 1984 {9203D674-8E7A-40e0-B978-0368B476453A}.exe Token: SeIncBasePriorityPrivilege 1976 {6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe Token: SeIncBasePriorityPrivilege 1572 {AF0BBE6C-DB91-4a8a-8882-EFEE614951AD}.exe Token: SeIncBasePriorityPrivilege 2112 {FF4463E3-D14C-4ee5-8209-BF9201DF69FF}.exe Token: SeIncBasePriorityPrivilege 2832 {486B8941-7578-4b5e-A280-871FE51673AA}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 340 wrote to memory of 2716 340 fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe 28 PID 340 wrote to memory of 2716 340 fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe 28 PID 340 wrote to memory of 2716 340 fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe 28 PID 340 wrote to memory of 2716 340 fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe 28 PID 340 wrote to memory of 2120 340 fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe 29 PID 340 wrote to memory of 2120 340 fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe 29 PID 340 wrote to memory of 2120 340 fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe 29 PID 340 wrote to memory of 2120 340 fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe 29 PID 2716 wrote to memory of 2632 2716 {E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe 30 PID 2716 wrote to memory of 2632 2716 {E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe 30 PID 2716 wrote to memory of 2632 2716 {E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe 30 PID 2716 wrote to memory of 2632 2716 {E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe 30 PID 2716 wrote to memory of 2264 2716 {E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe 31 PID 2716 wrote to memory of 2264 2716 {E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe 31 PID 2716 wrote to memory of 2264 2716 {E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe 31 PID 2716 wrote to memory of 2264 2716 {E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe 31 PID 2632 wrote to memory of 2468 2632 {58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe 32 PID 2632 wrote to memory of 2468 2632 {58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe 32 PID 2632 wrote to memory of 2468 2632 {58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe 32 PID 2632 wrote to memory of 2468 2632 {58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe 32 PID 2632 wrote to memory of 2736 2632 {58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe 33 PID 2632 wrote to memory of 2736 2632 {58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe 33 PID 2632 wrote to memory of 2736 2632 {58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe 33 PID 2632 wrote to memory of 2736 2632 {58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe 33 PID 2468 wrote to memory of 2896 2468 {9168B936-D438-4574-A4BC-DE5381234067}.exe 36 PID 2468 wrote to memory of 2896 2468 {9168B936-D438-4574-A4BC-DE5381234067}.exe 36 PID 2468 wrote to memory of 2896 2468 {9168B936-D438-4574-A4BC-DE5381234067}.exe 36 PID 2468 wrote to memory of 2896 2468 {9168B936-D438-4574-A4BC-DE5381234067}.exe 36 PID 2468 wrote to memory of 628 2468 {9168B936-D438-4574-A4BC-DE5381234067}.exe 37 PID 2468 wrote to memory of 628 2468 {9168B936-D438-4574-A4BC-DE5381234067}.exe 37 PID 2468 wrote to memory of 628 2468 {9168B936-D438-4574-A4BC-DE5381234067}.exe 37 PID 2468 wrote to memory of 628 2468 {9168B936-D438-4574-A4BC-DE5381234067}.exe 37 PID 2896 wrote to memory of 2732 2896 {9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe 38 PID 2896 wrote to memory of 2732 2896 {9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe 38 PID 2896 wrote to memory of 2732 2896 {9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe 38 PID 2896 wrote to memory of 2732 2896 {9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe 38 PID 2896 wrote to memory of 2784 2896 {9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe 39 PID 2896 wrote to memory of 2784 2896 {9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe 39 PID 2896 wrote to memory of 2784 2896 {9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe 39 PID 2896 wrote to memory of 2784 2896 {9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe 39 PID 2732 wrote to memory of 1984 2732 {AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe 40 PID 2732 wrote to memory of 1984 2732 {AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe 40 PID 2732 wrote to memory of 1984 2732 {AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe 40 PID 2732 wrote to memory of 1984 2732 {AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe 40 PID 2732 wrote to memory of 2392 2732 {AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe 41 PID 2732 wrote to memory of 2392 2732 {AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe 41 PID 2732 wrote to memory of 2392 2732 {AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe 41 PID 2732 wrote to memory of 2392 2732 {AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe 41 PID 1984 wrote to memory of 1976 1984 {9203D674-8E7A-40e0-B978-0368B476453A}.exe 42 PID 1984 wrote to memory of 1976 1984 {9203D674-8E7A-40e0-B978-0368B476453A}.exe 42 PID 1984 wrote to memory of 1976 1984 {9203D674-8E7A-40e0-B978-0368B476453A}.exe 42 PID 1984 wrote to memory of 1976 1984 {9203D674-8E7A-40e0-B978-0368B476453A}.exe 42 PID 1984 wrote to memory of 1616 1984 {9203D674-8E7A-40e0-B978-0368B476453A}.exe 43 PID 1984 wrote to memory of 1616 1984 {9203D674-8E7A-40e0-B978-0368B476453A}.exe 43 PID 1984 wrote to memory of 1616 1984 {9203D674-8E7A-40e0-B978-0368B476453A}.exe 43 PID 1984 wrote to memory of 1616 1984 {9203D674-8E7A-40e0-B978-0368B476453A}.exe 43 PID 1976 wrote to memory of 1572 1976 {6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe 44 PID 1976 wrote to memory of 1572 1976 {6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe 44 PID 1976 wrote to memory of 1572 1976 {6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe 44 PID 1976 wrote to memory of 1572 1976 {6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe 44 PID 1976 wrote to memory of 3028 1976 {6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe 45 PID 1976 wrote to memory of 3028 1976 {6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe 45 PID 1976 wrote to memory of 3028 1976 {6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe 45 PID 1976 wrote to memory of 3028 1976 {6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\fdb89067b1ffa6ece1b8e9bcae4d1140_NeikiAnalytics.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\{E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exeC:\Windows\{E5CE73E7-FF04-4381-8E2D-F186E4D0E3F9}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\{58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exeC:\Windows\{58D6402A-FA53-453d-BE60-A59F56E9FAD9}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\{9168B936-D438-4574-A4BC-DE5381234067}.exeC:\Windows\{9168B936-D438-4574-A4BC-DE5381234067}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\{9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exeC:\Windows\{9B1E5C49-E46E-4d2b-B155-2656DF24FB3C}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\{AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exeC:\Windows\{AF753B19-C0D9-4e19-B435-3CD98A0FB2C8}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\{9203D674-8E7A-40e0-B978-0368B476453A}.exeC:\Windows\{9203D674-8E7A-40e0-B978-0368B476453A}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\{6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exeC:\Windows\{6640FD06-3106-4fa0-B413-2AA8E9EB10B8}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\{AF0BBE6C-DB91-4a8a-8882-EFEE614951AD}.exeC:\Windows\{AF0BBE6C-DB91-4a8a-8882-EFEE614951AD}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1572 -
C:\Windows\{FF4463E3-D14C-4ee5-8209-BF9201DF69FF}.exeC:\Windows\{FF4463E3-D14C-4ee5-8209-BF9201DF69FF}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2112 -
C:\Windows\{486B8941-7578-4b5e-A280-871FE51673AA}.exeC:\Windows\{486B8941-7578-4b5e-A280-871FE51673AA}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Windows\{71B6476F-EF62-4e76-9408-D2BA8941BA82}.exeC:\Windows\{71B6476F-EF62-4e76-9408-D2BA8941BA82}.exe12⤵
- Executes dropped EXE
PID:1116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{486B8~1.EXE > nul12⤵PID:576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FF446~1.EXE > nul11⤵PID:2232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AF0BB~1.EXE > nul10⤵PID:2088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6640F~1.EXE > nul9⤵PID:3028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9203D~1.EXE > nul8⤵PID:1616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AF753~1.EXE > nul7⤵PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9B1E5~1.EXE > nul6⤵PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9168B~1.EXE > nul5⤵PID:628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{58D64~1.EXE > nul4⤵PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E5CE7~1.EXE > nul3⤵PID:2264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\FDB890~1.EXE > nul2⤵
- Deletes itself
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD521a67835005ed230ae073b774b5a8069
SHA196e5b1e9eb7af394edad9c20f9763464e3a170ba
SHA256fcdfea351d825c4c466cbd3c5be266d125bea655eab0e8c44e8ed6b6ff299e48
SHA512b53d0f64f5889f637fa3628192a0d1478108870c75e46197b2643113fe859215070fb4078059e468389d74bd248429f1e4abcddde03316cbd0b1751aab903bc6
-
Filesize
60KB
MD5e2af8f9555fcff62da2ecb0de355f6ad
SHA1bd2d12b47f6abaafb4821e62fc1e9205ae631ba6
SHA2565ecea0a784173de7e8cec359dde3235e840b873031546456390e4ad4a921aeb9
SHA5127fe559dec77495cad018e76561d05ff12de97b1db069b197fd87568be3809fe31cd6c2636e40953e590473e956604e519c9c75a36d92b4c82c94e8e11438561b
-
Filesize
60KB
MD5cd68c0d7dcf3ab8f3ed95cb22e2efd4f
SHA12093b3fd902ce8da3af5010111f51ed408919fdc
SHA256f0b442e243006a52b65bc83b3fefe53e7b13de6ec4bd06025b467a6edea1fd43
SHA51209bb192dabfc3231bf1138702bb0b6c44930aab7bebce22d34fd1852504488f6fbc17e034f52c7b9c23f008ad7c028d8309882097de46fd049cb9dcbf8a6642f
-
Filesize
60KB
MD55f093c28d92c81da90b42802cc1ef083
SHA124c8bf92fe1649cbea4585a9973bdf5ea69ae4f3
SHA256723c5f2fc6b2a6af5a766d273112aceab402ebfba812a7cc11669ab70bb47b35
SHA51278527d34bc2a4f9d56be10bcd37eb6e304eaf721dad1f5e8a3ad973f2c450ad6998fe8d9a898fbe8ec0e0dfa718d73fc5492548964fea5b61ccedafbe0b50f6a
-
Filesize
60KB
MD5fcd94f688add91ad6570838f00be17aa
SHA1370c20f1c0d76fa1ca0a98a885117d9bb381a54b
SHA256ee37864e1056e8fecaceb3b94c2f5f1f7159296a4e7ea527dffa61a2c3ed52f6
SHA512aa57e3077ee91ea1abe2714409624a08e15084da1941d6a3d022f58dec2676e7db7c608d3bd7c3e5e4f7de30bd1bbad3e8a141264764b94ad0aa9f4847a3ed02
-
Filesize
60KB
MD5b6ed93862fe713808f2a9e6689f027fa
SHA11f731f94b9d4660e315cfad8d91282a139c919f1
SHA25689635932953068130651fb4ace5dcea95bb98b10c2a94e5c11d02f9bc1689cdc
SHA51289f323141915995a2e1fcbb2d6fafa380ecd99c766e136f0f1ff041eed7d9fdc8490af7e46e9365e3a42a8556ac416af6df8d9870c2386cb04bfeff504bf761c
-
Filesize
60KB
MD5cdf95e5204217910ab79e6234ed9e248
SHA12a9d1b7c7e734f8a21ab5fbab202a64b3d0a754a
SHA256629dee7da3c4195e833ee09cd7ad3660e1bb515e8442f45939478198057a889e
SHA512c4591b3b6f0f06d82d06ef9aa06c471d46033669e6c0050fbda2ac8af0970850cc317d35816c0f750a24a456532ff65b5feb84ff833fb25b27933800ef812ac3
-
Filesize
60KB
MD517f23393612fde3b5e40d7d9c4758e58
SHA1d8104ed353c75497ffd3bb83a5bb85f25774def4
SHA256d33fddc62c4f7b4bffcce04f4913b5bf09630ddaa94c1dfd1eab8d4c5b04ddb2
SHA5121faeb1c1a3138be52fc7bdc418ec2e05559cc6ff7cc7b9c07ab91dc84bfe3285a1da25534d0bdcd38887283101bd000d2f7281c1f3a5cdc3b717dccf60c7ce99
-
Filesize
60KB
MD5f952208afeb5387ce01c4e052e45a19d
SHA1d98b9dd0e6d364ec33efa5bf9d068e97895a843f
SHA25631ce0ab94ae658d6ed3aacf70451b5c861e723a75ca4518883246e1d7b89da1c
SHA512aa0eb6f705ffb528dae0c82077e71bce6df21285bcfff369981bfa240f8ab873af74124ecec2b7f6bd77f0af78c1d91b61dd34d458333c61d8f58bd58d3f1b63
-
Filesize
60KB
MD5e840ba6a5c866371b9875161e99b15f1
SHA15339953ef65cf992c4ec46ec82b934d3a29fc334
SHA2567d3770611ce747e25ee87050a9a18123aac09fd9828409900ceb702c4ff9e2ab
SHA512aacf902d24d19f10023390266bf1a9809d2c4f0cb6d0a881288c8c72f3b7d73a5fac3636b9af6ee0732f5d9175a76f33d47b2a3a347bb10c3f55dc69a6e3d8ef
-
Filesize
60KB
MD5012aa101881546c5b2c5422d9752d29e
SHA104981be5358c997db0b3fc6846385225586958dd
SHA256e2cbfebad7a879c343bdba636bc9b93c7339adb497b18f529a596d635a9f83df
SHA51271e3ce9dba61307738850d29f9108101b294bc853b311b302bd0f2d30bb83cd1e67c1bb2d26ea600ee5c9f1e16178409c6056db3e5a0588294f5a743104251f3