Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 23:09
Static task
static1
Behavioral task
behavioral1
Sample
320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe
-
Size
146KB
-
MD5
320867c337db174c60200b23d21a16a0
-
SHA1
49032d1539d5cb93d4bd0dbf28f40cf983c5e004
-
SHA256
1cf92536c3efe3af302b54ecd48cea8a301ce1a0b68a6c6231c7783aa4866a95
-
SHA512
8d171fc12e6c0d11babab2b0b3badfa677c269b41ba5087fb96c234ded97a4ee33a398b87745233fbd994d8d49d14e0a34faa16f8ad82c0574c6b91e72b9b7ba
-
SSDEEP
3072:tx6AHjYzaFXg+w17jsgS/jHagQg1dxiEVO:txzYzaFXi17jWO
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
Processes:
320867c337db174c60200b23d21a16a0_NeikiAnalytics.exesmss.exeGaara.execsrss.exeKazekage.exesystem32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" system32.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
Processes:
system32.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.exesmss.exeGaara.execsrss.exeKazekage.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" system32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Gaara.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Kazekage.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
Processes:
320867c337db174c60200b23d21a16a0_NeikiAnalytics.exesmss.exeGaara.execsrss.exeKazekage.exesystem32.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Gaara.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Kazekage.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" system32.exe -
Processes:
smss.exeGaara.execsrss.exeKazekage.exesystem32.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
csrss.exeKazekage.exesystem32.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.exesmss.exeGaara.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Kazekage.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" system32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Gaara.exe -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 24 IoCs
Processes:
smss.execsrss.exeKazekage.exesystem32.exeGaara.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe smss.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe system32.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe system32.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe Gaara.exe File created C:\Windows\SysWOW64\drivers\system32.exe Kazekage.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe smss.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe csrss.exe File created C:\Windows\SysWOW64\drivers\system32.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe Gaara.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe Kazekage.exe File created C:\Windows\SysWOW64\drivers\system32.exe system32.exe File created C:\Windows\SysWOW64\drivers\system32.exe smss.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe smss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe Kazekage.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe system32.exe File created C:\Windows\SysWOW64\drivers\system32.exe Gaara.exe File created C:\Windows\SysWOW64\drivers\system32.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
Processes:
Kazekage.exesmss.exeGaara.execsrss.exesystem32.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "drivers\\Kazekage.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe\Debugger = "cmd.exe /c del" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com\Debugger = "cmd.exe /c del" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "drivers\\Kazekage.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe\Debugger = "cmd.exe /c del" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe\Debugger = "cmd.exe /c del" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe\Debugger = "cmd.exe /c del" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "drivers\\Kazekage.exe" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "drivers\\Kazekage.exe" csrss.exe -
Executes dropped EXE 30 IoCs
Processes:
smss.exesmss.exeGaara.exesmss.exeGaara.execsrss.exesmss.exeGaara.execsrss.exeKazekage.exesmss.exeGaara.execsrss.exeKazekage.exesystem32.exesmss.exeGaara.execsrss.exeKazekage.exesystem32.exesystem32.exeKazekage.exesystem32.execsrss.exeKazekage.exesystem32.exeGaara.execsrss.exeKazekage.exesystem32.exepid process 1212 smss.exe 2464 smss.exe 2480 Gaara.exe 2736 smss.exe 2532 Gaara.exe 1092 csrss.exe 2836 smss.exe 768 Gaara.exe 2284 csrss.exe 1740 Kazekage.exe 1100 smss.exe 624 Gaara.exe 648 csrss.exe 572 Kazekage.exe 1984 system32.exe 2888 smss.exe 2880 Gaara.exe 792 csrss.exe 1672 Kazekage.exe 1440 system32.exe 1308 system32.exe 1824 Kazekage.exe 1636 system32.exe 2268 csrss.exe 984 Kazekage.exe 896 system32.exe 2988 Gaara.exe 2968 csrss.exe 872 Kazekage.exe 3000 system32.exe -
Loads dropped DLL 64 IoCs
Processes:
320867c337db174c60200b23d21a16a0_NeikiAnalytics.exesmss.exesmss.exeGaara.exesmss.exeGaara.execsrss.exesmss.exeGaara.execsrss.exeKazekage.exesmss.exeGaara.execsrss.exesystem32.exesmss.exeGaara.execsrss.execsrss.exeGaara.execsrss.exepid process 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1212 smss.exe 1212 smss.exe 2464 smss.exe 1212 smss.exe 1212 smss.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 2736 smss.exe 2480 Gaara.exe 2532 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 1092 csrss.exe 1092 csrss.exe 1092 csrss.exe 2836 smss.exe 1092 csrss.exe 768 Gaara.exe 2284 csrss.exe 1092 csrss.exe 1092 csrss.exe 1740 Kazekage.exe 1100 smss.exe 1740 Kazekage.exe 624 Gaara.exe 1740 Kazekage.exe 648 csrss.exe 1740 Kazekage.exe 1740 Kazekage.exe 1740 Kazekage.exe 1740 Kazekage.exe 1984 system32.exe 2888 smss.exe 1984 system32.exe 2880 Gaara.exe 1984 system32.exe 792 csrss.exe 1984 system32.exe 1984 system32.exe 1984 system32.exe 1984 system32.exe 1092 csrss.exe 1092 csrss.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 1212 smss.exe 2268 csrss.exe 1212 smss.exe 1212 smss.exe 1212 smss.exe 1212 smss.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 2988 Gaara.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 2968 csrss.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 24 IoCs
Processes:
Gaara.exeKazekage.exesystem32.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.exesmss.execsrss.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 25 - 5 - 2024\\Gaara.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "25-5-2024.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 25 - 5 - 2024\\smss.exe" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "25-5-2024.exe" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 25 - 5 - 2024\\Gaara.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "25-5-2024.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 25 - 5 - 2024\\Gaara.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 25 - 5 - 2024\\smss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 25 - 5 - 2024\\smss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "25-5-2024.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 25 - 5 - 2024\\smss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 25 - 5 - 2024\\smss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 25 - 5 - 2024\\Gaara.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "25-5-2024.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "25-5-2024.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 25 - 5 - 2024\\Gaara.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 25 - 5 - 2024\\Gaara.exe" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 25 - 5 - 2024\\smss.exe" Gaara.exe -
Processes:
system32.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.exesmss.exeGaara.execsrss.exeKazekage.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
csrss.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.exesmss.exeGaara.exeKazekage.exesystem32.exedescription ioc process File opened for modification \??\S:\Desktop.ini csrss.exe File opened for modification \??\G:\Desktop.ini 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\Y:\Desktop.ini smss.exe File opened for modification \??\R:\Desktop.ini Gaara.exe File opened for modification D:\Desktop.ini Kazekage.exe File opened for modification \??\M:\Desktop.ini Kazekage.exe File opened for modification \??\H:\Desktop.ini 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\L:\Desktop.ini Gaara.exe File opened for modification \??\M:\Desktop.ini Gaara.exe File opened for modification \??\T:\Desktop.ini smss.exe File opened for modification D:\Desktop.ini Gaara.exe File opened for modification \??\J:\Desktop.ini Gaara.exe File opened for modification \??\J:\Desktop.ini csrss.exe File opened for modification \??\B:\Desktop.ini 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\N:\Desktop.ini 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\I:\Desktop.ini smss.exe File opened for modification \??\A:\Desktop.ini system32.exe File opened for modification \??\V:\Desktop.ini Kazekage.exe File opened for modification \??\Q:\Desktop.ini system32.exe File opened for modification \??\Y:\Desktop.ini system32.exe File opened for modification \??\M:\Desktop.ini smss.exe File opened for modification \??\B:\Desktop.ini Gaara.exe File opened for modification C:\Desktop.ini Kazekage.exe File opened for modification \??\N:\Desktop.ini smss.exe File opened for modification \??\Q:\Desktop.ini smss.exe File opened for modification \??\X:\Desktop.ini Kazekage.exe File opened for modification \??\S:\Desktop.ini Kazekage.exe File opened for modification \??\U:\Desktop.ini system32.exe File opened for modification \??\A:\Desktop.ini 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification F:\Desktop.ini 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\X:\Desktop.ini csrss.exe File opened for modification \??\A:\Desktop.ini Gaara.exe File opened for modification \??\Z:\Desktop.ini csrss.exe File opened for modification \??\B:\Desktop.ini system32.exe File opened for modification \??\T:\Desktop.ini csrss.exe File opened for modification \??\U:\Desktop.ini csrss.exe File opened for modification \??\M:\Desktop.ini csrss.exe File opened for modification \??\Q:\Desktop.ini csrss.exe File opened for modification \??\E:\Desktop.ini Kazekage.exe File opened for modification \??\N:\Desktop.ini Kazekage.exe File opened for modification \??\T:\Desktop.ini Kazekage.exe File opened for modification \??\Z:\Desktop.ini 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\Q:\Desktop.ini Gaara.exe File opened for modification \??\K:\Desktop.ini csrss.exe File opened for modification \??\H:\Desktop.ini system32.exe File opened for modification \??\N:\Desktop.ini csrss.exe File opened for modification \??\I:\Desktop.ini system32.exe File opened for modification \??\Q:\Desktop.ini 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\S:\Desktop.ini Gaara.exe File opened for modification \??\T:\Desktop.ini Gaara.exe File opened for modification \??\N:\Desktop.ini system32.exe File opened for modification \??\L:\Desktop.ini 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\S:\Desktop.ini 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\S:\Desktop.ini smss.exe File opened for modification F:\Desktop.ini csrss.exe File opened for modification \??\A:\Desktop.ini Kazekage.exe File opened for modification \??\U:\Desktop.ini Kazekage.exe File opened for modification \??\K:\Desktop.ini 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\G:\Desktop.ini smss.exe File opened for modification \??\W:\Desktop.ini Gaara.exe File opened for modification \??\G:\Desktop.ini Gaara.exe File opened for modification \??\I:\Desktop.ini Gaara.exe File opened for modification \??\U:\Desktop.ini Gaara.exe File opened for modification D:\Desktop.ini system32.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
smss.exeKazekage.exesystem32.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.execsrss.exeGaara.exedescription ioc process File opened (read-only) \??\J: smss.exe File opened (read-only) \??\M: Kazekage.exe File opened (read-only) \??\B: system32.exe File opened (read-only) \??\Q: Kazekage.exe File opened (read-only) \??\U: 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened (read-only) \??\Z: csrss.exe File opened (read-only) \??\P: Kazekage.exe File opened (read-only) \??\K: 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened (read-only) \??\P: Gaara.exe File opened (read-only) \??\P: csrss.exe File opened (read-only) \??\V: csrss.exe File opened (read-only) \??\N: Kazekage.exe File opened (read-only) \??\H: system32.exe File opened (read-only) \??\Y: system32.exe File opened (read-only) \??\I: smss.exe File opened (read-only) \??\L: smss.exe File opened (read-only) \??\Y: smss.exe File opened (read-only) \??\T: csrss.exe File opened (read-only) \??\G: smss.exe File opened (read-only) \??\X: 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened (read-only) \??\M: Gaara.exe File opened (read-only) \??\N: 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened (read-only) \??\A: Kazekage.exe File opened (read-only) \??\V: system32.exe File opened (read-only) \??\H: Kazekage.exe File opened (read-only) \??\B: smss.exe File opened (read-only) \??\E: Gaara.exe File opened (read-only) \??\G: csrss.exe File opened (read-only) \??\G: Kazekage.exe File opened (read-only) \??\A: csrss.exe File opened (read-only) \??\U: csrss.exe File opened (read-only) \??\M: system32.exe File opened (read-only) \??\U: system32.exe File opened (read-only) \??\T: 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened (read-only) \??\M: smss.exe File opened (read-only) \??\N: Gaara.exe File opened (read-only) \??\Q: Gaara.exe File opened (read-only) \??\S: Gaara.exe File opened (read-only) \??\B: 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened (read-only) \??\X: smss.exe File opened (read-only) \??\H: csrss.exe File opened (read-only) \??\Z: Kazekage.exe File opened (read-only) \??\P: 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened (read-only) \??\I: Kazekage.exe File opened (read-only) \??\J: Kazekage.exe File opened (read-only) \??\P: system32.exe File opened (read-only) \??\B: Gaara.exe File opened (read-only) \??\Z: Gaara.exe File opened (read-only) \??\L: csrss.exe File opened (read-only) \??\J: system32.exe File opened (read-only) \??\O: 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened (read-only) \??\X: system32.exe File opened (read-only) \??\G: Gaara.exe File opened (read-only) \??\J: Gaara.exe File opened (read-only) \??\T: Gaara.exe File opened (read-only) \??\R: csrss.exe File opened (read-only) \??\R: system32.exe File opened (read-only) \??\M: 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened (read-only) \??\U: Gaara.exe File opened (read-only) \??\X: Kazekage.exe File opened (read-only) \??\I: system32.exe File opened (read-only) \??\G: 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened (read-only) \??\T: smss.exe File opened (read-only) \??\L: Gaara.exe -
Drops autorun.inf file 1 TTPs 64 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
Gaara.execsrss.exesmss.exesystem32.exeKazekage.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.exedescription ioc process File opened for modification \??\P:\Autorun.inf Gaara.exe File opened for modification \??\O:\Autorun.inf csrss.exe File opened for modification \??\V:\Autorun.inf csrss.exe File opened for modification \??\L:\Autorun.inf smss.exe File created \??\L:\Autorun.inf csrss.exe File created \??\U:\Autorun.inf csrss.exe File created \??\G:\Autorun.inf system32.exe File created \??\N:\Autorun.inf system32.exe File created \??\O:\Autorun.inf Kazekage.exe File created C:\Autorun.inf 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\A:\Autorun.inf Gaara.exe File opened for modification \??\Y:\Autorun.inf system32.exe File created \??\Y:\Autorun.inf smss.exe File created \??\W:\Autorun.inf 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\X:\Autorun.inf 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File created \??\L:\Autorun.inf system32.exe File created F:\Autorun.inf 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File created D:\Autorun.inf smss.exe File opened for modification \??\R:\Autorun.inf csrss.exe File created \??\N:\Autorun.inf Kazekage.exe File opened for modification \??\R:\Autorun.inf 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\K:\Autorun.inf system32.exe File created \??\Z:\Autorun.inf system32.exe File created \??\R:\Autorun.inf Kazekage.exe File created \??\G:\Autorun.inf Gaara.exe File created \??\B:\Autorun.inf 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\M:\Autorun.inf Kazekage.exe File created \??\X:\Autorun.inf Kazekage.exe File created D:\Autorun.inf Kazekage.exe File opened for modification \??\V:\Autorun.inf Kazekage.exe File opened for modification D:\Autorun.inf Gaara.exe File created \??\E:\Autorun.inf smss.exe File opened for modification \??\Z:\Autorun.inf smss.exe File created \??\G:\Autorun.inf Kazekage.exe File opened for modification \??\K:\Autorun.inf 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\Y:\Autorun.inf Gaara.exe File opened for modification \??\Z:\Autorun.inf system32.exe File created \??\H:\Autorun.inf Gaara.exe File created \??\U:\Autorun.inf smss.exe File created \??\X:\Autorun.inf smss.exe File opened for modification \??\W:\Autorun.inf Gaara.exe File created \??\W:\Autorun.inf Gaara.exe File created \??\Q:\Autorun.inf csrss.exe File opened for modification \??\R:\Autorun.inf system32.exe File opened for modification D:\Autorun.inf Kazekage.exe File opened for modification \??\W:\Autorun.inf 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\X:\Autorun.inf Kazekage.exe File created \??\S:\Autorun.inf Kazekage.exe File opened for modification \??\Q:\Autorun.inf 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File created \??\U:\Autorun.inf 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\I:\Autorun.inf smss.exe File opened for modification \??\R:\Autorun.inf smss.exe File opened for modification \??\J:\Autorun.inf Gaara.exe File opened for modification \??\G:\Autorun.inf csrss.exe File created \??\T:\Autorun.inf Kazekage.exe File created \??\A:\Autorun.inf 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification F:\Autorun.inf csrss.exe File opened for modification \??\Y:\Autorun.inf Kazekage.exe File opened for modification \??\T:\Autorun.inf Gaara.exe File opened for modification \??\Z:\Autorun.inf 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification \??\O:\Autorun.inf smss.exe File opened for modification \??\T:\Autorun.inf smss.exe File created \??\U:\Autorun.inf Gaara.exe File opened for modification \??\N:\Autorun.inf system32.exe -
Drops file in System32 directory 38 IoCs
Processes:
320867c337db174c60200b23d21a16a0_NeikiAnalytics.exeGaara.execsrss.exeKazekage.exesystem32.exesmss.exedescription ioc process File opened for modification C:\Windows\SysWOW64\mscomctl.ocx 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx csrss.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx Kazekage.exe File created C:\Windows\SysWOW64\25-5-2024.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\25-5-2024.exe system32.exe File opened for modification C:\Windows\SysWOW64\ Gaara.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx system32.exe File opened for modification C:\Windows\SysWOW64\25-5-2024.exe csrss.exe File created C:\Windows\SysWOW64\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\SysWOW64\ smss.exe File opened for modification C:\Windows\SysWOW64\ csrss.exe File created C:\Windows\SysWOW64\msvbvm60.dll 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\msvbvm60.dll csrss.exe File opened for modification C:\Windows\SysWOW64\ system32.exe File opened for modification C:\Windows\SysWOW64\25-5-2024.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\ 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll system32.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini Kazekage.exe File opened for modification C:\Windows\SysWOW64\ Kazekage.exe File opened for modification C:\Windows\SysWOW64\25-5-2024.exe smss.exe File created C:\Windows\SysWOW64\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini smss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx Gaara.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini csrss.exe File opened for modification C:\Windows\SysWOW64\25-5-2024.exe Gaara.exe File created C:\Windows\SysWOW64\msvbvm60.dll system32.exe File created C:\Windows\SysWOW64\Desktop.ini 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx smss.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini system32.exe File created C:\Windows\SysWOW64\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini Gaara.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll csrss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\SysWOW64\25-5-2024.exe Kazekage.exe -
Sets desktop wallpaper using registry 2 TTPs 6 IoCs
Processes:
Kazekage.exesystem32.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.exesmss.exeGaara.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" csrss.exe -
Drops file in Windows directory 64 IoCs
Processes:
system32.exesmss.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.exeGaara.execsrss.exeKazekage.exedescription ioc process File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe system32.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe smss.exe File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\msvbvm60.dll smss.exe File created C:\Windows\WBEM\msvbvm60.dll smss.exe File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe Gaara.exe File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe csrss.exe File opened for modification C:\Windows\system\msvbvm60.dll Kazekage.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe Gaara.exe File opened for modification C:\Windows\mscomctl.ocx Gaara.exe File opened for modification C:\Windows\system\msvbvm60.dll smss.exe File opened for modification C:\Windows\msvbvm60.dll Kazekage.exe File created C:\Windows\WBEM\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\system\msvbvm60.dll system32.exe File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe system32.exe File created C:\Windows\Fonts\The Kazekage.jpg 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\msvbvm60.dll 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\system\mscoree.dll smss.exe File opened for modification C:\Windows\msvbvm60.dll smss.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe Gaara.exe File opened for modification C:\Windows\ Gaara.exe File opened for modification C:\Windows\ system32.exe File opened for modification C:\Windows\ Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe smss.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\msvbvm60.dll csrss.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe Kazekage.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe system32.exe File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe smss.exe File opened for modification C:\Windows\system\msvbvm60.dll csrss.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\msvbvm60.dll Kazekage.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\msvbvm60.dll 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\system\msvbvm60.dll 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\mscomctl.ocx 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\mscomctl.ocx Kazekage.exe File created C:\Windows\system\msvbvm60.dll 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe Gaara.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\msvbvm60.dll csrss.exe File created C:\Windows\WBEM\msvbvm60.dll csrss.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg Kazekage.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg system32.exe File opened for modification C:\Windows\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\system\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe Kazekage.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe Kazekage.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe Kazekage.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\system\mscoree.dll 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe csrss.exe File opened for modification C:\Windows\system\mscoree.dll Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe system32.exe File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe csrss.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\msvbvm60.dll system32.exe File opened for modification C:\Windows\mscomctl.ocx system32.exe File opened for modification C:\Windows\ 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File created C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe smss.exe File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File opened for modification C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe File created C:\Windows\WBEM\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg csrss.exe File opened for modification C:\Windows\system\mscoree.dll system32.exe -
Modifies Control Panel 64 IoCs
Processes:
Kazekage.exesystem32.exeGaara.execsrss.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.exesmss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Size = "72" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\WallpaperStyle = "2" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" system32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\WallpaperStyle = "2" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\WallpaperStyle = "2" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Speed = "4" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\WallpaperStyle = "2" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" Kazekage.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Size = "72" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\WallpaperStyle = "2" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Speed = "4" system32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Size = "72" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\WallpaperStyle = "2" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Speed = "4" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" csrss.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Size = "72" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" Kazekage.exe -
Processes:
smss.execsrss.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.exeGaara.exeKazekage.exesystem32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" smss.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" Kazekage.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" system32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main Gaara.exe -
Modifies registry class 48 IoCs
Processes:
320867c337db174c60200b23d21a16a0_NeikiAnalytics.exeKazekage.exesystem32.exesmss.exeGaara.execsrss.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command Kazekage.exe -
Runs ping.exe 1 TTPs 34 IoCs
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exepid process 2412 ping.exe 1952 ping.exe 2664 ping.exe 2800 ping.exe 2856 ping.exe 320 ping.exe 2500 ping.exe 108 ping.exe 1628 ping.exe 2956 ping.exe 2808 ping.exe 3024 ping.exe 2504 ping.exe 2136 ping.exe 2448 ping.exe 2740 ping.exe 2588 ping.exe 1636 ping.exe 2104 ping.exe 2284 ping.exe 2560 ping.exe 2692 ping.exe 2140 ping.exe 2952 ping.exe 1544 ping.exe 2888 ping.exe 2676 ping.exe 2900 ping.exe 2928 ping.exe 1820 ping.exe 2876 ping.exe 2584 ping.exe 2440 ping.exe 1728 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
320867c337db174c60200b23d21a16a0_NeikiAnalytics.exesmss.exeGaara.execsrss.exeKazekage.exesystem32.exepid process 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1212 smss.exe 1212 smss.exe 1212 smss.exe 1212 smss.exe 1212 smss.exe 1212 smss.exe 1212 smss.exe 1212 smss.exe 1212 smss.exe 1212 smss.exe 1212 smss.exe 1212 smss.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 1092 csrss.exe 1092 csrss.exe 1092 csrss.exe 1092 csrss.exe 1092 csrss.exe 1092 csrss.exe 1092 csrss.exe 1092 csrss.exe 1092 csrss.exe 1092 csrss.exe 1092 csrss.exe 1092 csrss.exe 1740 Kazekage.exe 1740 Kazekage.exe 1740 Kazekage.exe 1740 Kazekage.exe 1740 Kazekage.exe 1740 Kazekage.exe 1740 Kazekage.exe 1740 Kazekage.exe 1740 Kazekage.exe 1740 Kazekage.exe 1740 Kazekage.exe 1740 Kazekage.exe 1984 system32.exe 1984 system32.exe 1984 system32.exe 1984 system32.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
Processes:
320867c337db174c60200b23d21a16a0_NeikiAnalytics.exesmss.exesmss.exeGaara.exesmss.exeGaara.execsrss.exesmss.exeGaara.execsrss.exeKazekage.exesmss.exeGaara.execsrss.exeKazekage.exesystem32.exesmss.exeGaara.execsrss.exeKazekage.exesystem32.exesystem32.exeKazekage.exesystem32.execsrss.exeKazekage.exesystem32.exeGaara.execsrss.exeKazekage.exesystem32.exepid process 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe 1212 smss.exe 2464 smss.exe 2480 Gaara.exe 2736 smss.exe 2532 Gaara.exe 1092 csrss.exe 2836 smss.exe 768 Gaara.exe 2284 csrss.exe 1740 Kazekage.exe 1100 smss.exe 624 Gaara.exe 648 csrss.exe 572 Kazekage.exe 1984 system32.exe 2888 smss.exe 2880 Gaara.exe 792 csrss.exe 1672 Kazekage.exe 1440 system32.exe 1308 system32.exe 1824 Kazekage.exe 1636 system32.exe 2268 csrss.exe 984 Kazekage.exe 896 system32.exe 2988 Gaara.exe 2968 csrss.exe 872 Kazekage.exe 3000 system32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
320867c337db174c60200b23d21a16a0_NeikiAnalytics.exesmss.exeGaara.execsrss.exeKazekage.exesystem32.exedescription pid process target process PID 1660 wrote to memory of 1212 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe smss.exe PID 1660 wrote to memory of 1212 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe smss.exe PID 1660 wrote to memory of 1212 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe smss.exe PID 1660 wrote to memory of 1212 1660 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe smss.exe PID 1212 wrote to memory of 2464 1212 smss.exe smss.exe PID 1212 wrote to memory of 2464 1212 smss.exe smss.exe PID 1212 wrote to memory of 2464 1212 smss.exe smss.exe PID 1212 wrote to memory of 2464 1212 smss.exe smss.exe PID 1212 wrote to memory of 2480 1212 smss.exe Gaara.exe PID 1212 wrote to memory of 2480 1212 smss.exe Gaara.exe PID 1212 wrote to memory of 2480 1212 smss.exe Gaara.exe PID 1212 wrote to memory of 2480 1212 smss.exe Gaara.exe PID 2480 wrote to memory of 2736 2480 Gaara.exe smss.exe PID 2480 wrote to memory of 2736 2480 Gaara.exe smss.exe PID 2480 wrote to memory of 2736 2480 Gaara.exe smss.exe PID 2480 wrote to memory of 2736 2480 Gaara.exe smss.exe PID 2480 wrote to memory of 2532 2480 Gaara.exe Gaara.exe PID 2480 wrote to memory of 2532 2480 Gaara.exe Gaara.exe PID 2480 wrote to memory of 2532 2480 Gaara.exe Gaara.exe PID 2480 wrote to memory of 2532 2480 Gaara.exe Gaara.exe PID 2480 wrote to memory of 1092 2480 Gaara.exe csrss.exe PID 2480 wrote to memory of 1092 2480 Gaara.exe csrss.exe PID 2480 wrote to memory of 1092 2480 Gaara.exe csrss.exe PID 2480 wrote to memory of 1092 2480 Gaara.exe csrss.exe PID 1092 wrote to memory of 2836 1092 csrss.exe smss.exe PID 1092 wrote to memory of 2836 1092 csrss.exe smss.exe PID 1092 wrote to memory of 2836 1092 csrss.exe smss.exe PID 1092 wrote to memory of 2836 1092 csrss.exe smss.exe PID 1092 wrote to memory of 768 1092 csrss.exe Gaara.exe PID 1092 wrote to memory of 768 1092 csrss.exe Gaara.exe PID 1092 wrote to memory of 768 1092 csrss.exe Gaara.exe PID 1092 wrote to memory of 768 1092 csrss.exe Gaara.exe PID 1092 wrote to memory of 2284 1092 csrss.exe csrss.exe PID 1092 wrote to memory of 2284 1092 csrss.exe csrss.exe PID 1092 wrote to memory of 2284 1092 csrss.exe csrss.exe PID 1092 wrote to memory of 2284 1092 csrss.exe csrss.exe PID 1092 wrote to memory of 1740 1092 csrss.exe Kazekage.exe PID 1092 wrote to memory of 1740 1092 csrss.exe Kazekage.exe PID 1092 wrote to memory of 1740 1092 csrss.exe Kazekage.exe PID 1092 wrote to memory of 1740 1092 csrss.exe Kazekage.exe PID 1740 wrote to memory of 1100 1740 Kazekage.exe smss.exe PID 1740 wrote to memory of 1100 1740 Kazekage.exe smss.exe PID 1740 wrote to memory of 1100 1740 Kazekage.exe smss.exe PID 1740 wrote to memory of 1100 1740 Kazekage.exe smss.exe PID 1740 wrote to memory of 624 1740 Kazekage.exe Gaara.exe PID 1740 wrote to memory of 624 1740 Kazekage.exe Gaara.exe PID 1740 wrote to memory of 624 1740 Kazekage.exe Gaara.exe PID 1740 wrote to memory of 624 1740 Kazekage.exe Gaara.exe PID 1740 wrote to memory of 648 1740 Kazekage.exe csrss.exe PID 1740 wrote to memory of 648 1740 Kazekage.exe csrss.exe PID 1740 wrote to memory of 648 1740 Kazekage.exe csrss.exe PID 1740 wrote to memory of 648 1740 Kazekage.exe csrss.exe PID 1740 wrote to memory of 572 1740 Kazekage.exe Kazekage.exe PID 1740 wrote to memory of 572 1740 Kazekage.exe Kazekage.exe PID 1740 wrote to memory of 572 1740 Kazekage.exe Kazekage.exe PID 1740 wrote to memory of 572 1740 Kazekage.exe Kazekage.exe PID 1740 wrote to memory of 1984 1740 Kazekage.exe system32.exe PID 1740 wrote to memory of 1984 1740 Kazekage.exe system32.exe PID 1740 wrote to memory of 1984 1740 Kazekage.exe system32.exe PID 1740 wrote to memory of 1984 1740 Kazekage.exe system32.exe PID 1984 wrote to memory of 2888 1984 system32.exe smss.exe PID 1984 wrote to memory of 2888 1984 system32.exe smss.exe PID 1984 wrote to memory of 2888 1984 system32.exe smss.exe PID 1984 wrote to memory of 2888 1984 system32.exe smss.exe -
System policy modification 1 TTPs 12 IoCs
Processes:
Gaara.execsrss.exeKazekage.exesmss.exesystem32.exe320867c337db174c60200b23d21a16a0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\320867c337db174c60200b23d21a16a0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe5⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe6⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\smss.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655007⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655007⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655007⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655007⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655007⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655007⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe"C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
9Hide Artifacts
2Hidden Files and Directories
2Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Admin Games\Readme.txtFilesize
736B
MD5bb5d6abdf8d0948ac6895ce7fdfbc151
SHA19266b7a247a4685892197194d2b9b86c8f6dddbd
SHA2565db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8
SHA512878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c
-
C:\Autorun.infFilesize
196B
MD51564dfe69ffed40950e5cb644e0894d1
SHA1201b6f7a01cc49bb698bea6d4945a082ed454ce4
SHA256be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184
SHA51272df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\Gaara.exeFilesize
146KB
MD51b74d4e1f99038da1048c25c62b35e01
SHA10d693263c71691b0c1a9d67ce959893c692eda9d
SHA2565219034d0f788f667fd7175e7e72f814a161d3f0b73e1928f48809a8e1f3d852
SHA512b86c489bb4e52a452b8ec89ad47e053f3ac5a574bf4435f95029fcc221ce1540d034c07fc47e0a9f9621c0bac755a1f8d67fcdbfe9c908ed8d755462983fc652
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exeFilesize
146KB
MD536185ca18ad1ffba96ebbcda31665d96
SHA1b2a9fe3f8afcf5166e8c22a9a0f2b2854b0c1db3
SHA256c4fdd65ea05bdcd0a2b7db0eef96a949a2575e4cf7713f31c38239a5877c0774
SHA512f04e2abb70b080dc0680253aef851ece80a07fd6518a842ae2d9c44426a91c6a9179433e583f55d9dd7731d37c5c747fb1f60359e2ed06092af39525bdde8224
-
C:\Windows\Fonts\Admin 25 - 5 - 2024\csrss.exeFilesize
146KB
MD552c2b99769c7d46c8dca177012f178aa
SHA1e83e9255eae0f19c296481edbb24bb325a9ae4da
SHA256054e7cfa013f4ad609fb8fefe18fc96de86a71434ab1c692d090722c111547f1
SHA51220e1f85ffe03c39b09176604cd18df8e53ead36affcb27cc3cbabb68522390931029cdd1147a123893ba2fc99503bba0d9bf91b1eebebbf13ff83475325dd246
-
C:\Windows\Fonts\The Kazekage.jpgMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Windows\Fonts\The Kazekage.jpgFilesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
C:\Windows\SysWOW64\25-5-2024.exeFilesize
146KB
MD59ab0b577603933310cf1b45098fb05de
SHA16666a9b4570ec3e1c9f2107ed309466a96afb89b
SHA2567ff285c38f8d4bfd5db39673b1e97379b6aa48ab0b505fc3e35c1ba88d61c8b2
SHA51251045abe93ce8bb4f0c81d630515afaae399686cde4a5a81ac1f841c2ef69fe923ac5d28d5e2040d45820d3ab15831579e05241a02338b174d2b575930f5c067
-
C:\Windows\SysWOW64\25-5-2024.exeFilesize
146KB
MD569b4221e3f78141b1a2ea07135575849
SHA1a28d71e5fda1f2517c4f59baa7efd42cac07fbd3
SHA256a46295144a5f7c13b716bb75ced5d0607b57b18c35f883c4ae05b62c38706966
SHA512f89f4578f9f5f148c65ee20dbf02ff0163af2162169162904610f39adb6dab8693d11df6e6750d8b8dcad1e45cf4988a004740d9f0a12abe4f9e9e5737913b1c
-
C:\Windows\SysWOW64\Desktop.iniFilesize
65B
MD564acfa7e03b01f48294cf30d201a0026
SHA110facd995b38a095f30b4a800fa454c0bcbf8438
SHA256ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62
SHA51265a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a
-
C:\Windows\SysWOW64\drivers\Kazekage.exeFilesize
146KB
MD59ef0af01deb95e48fedb0fbb865c9d90
SHA15a9a532e96bc4fbb3fcf940aeb122ced744c3ea5
SHA256b37646f76720d16868913d1b4bade3de2756882757ccf5ec469581712afe0dfd
SHA5125f58c5784857c2fa255ba250b1fcc84854e4c09a4ebe334a48cb60e529b43ec54b1b1f438173fcaa36831bf245b06163701ea6319ab777468191226a2e99a33d
-
C:\Windows\SysWOW64\drivers\Kazekage.exeFilesize
146KB
MD5629396c312c277e9c8eeb79b169fbdfb
SHA17b44f29a1befbd5fd1146afe0010d353d9b806f0
SHA2568f47a3fc18f3daaeab6c68529558a0d2b452062f40f7c2859cf0b6acda649e9f
SHA5125cc178fa680a11af964cdd2061cce6ecc3248268e8f778565f730aa4d6970b7358b01bdf81347c98f316ec60ee1a1cf0c9de701e214ba2707e97c88a2e84ebd0
-
C:\Windows\SysWOW64\drivers\system32.exeFilesize
146KB
MD54460fac61ce3f5e1e80f594af92eaad0
SHA19d0fafbb1b4e80fc71d628348d3bf909d4c6708c
SHA2560489159557ffd529db272fc21048bf5d478709e980247a1188542dbbe493059b
SHA512f8dfb4293b7aa7c2daca2a23bab8bc8883c56c7e5a919d98c7753b58d82d70f8f366b6aa8f1e5d8b7ea58eb653d5a247c73f0687aa0531f2e8cee1350962deb0
-
C:\Windows\SysWOW64\drivers\system32.exeFilesize
127KB
MD5c43e07ffb861f31fcea32d8c2c5b074e
SHA1e7cbc3e585819397caa47ff57608632f2533d706
SHA256bd3c74ad0d7ef1c9c1a22dc79cb64f024a65c3289d27d45bb0bceb67e5f728ca
SHA5125d290df7333ef829bcfcb0336527082650fb811250e00c161dc8c022d56a1006325810ded953755c4a9285f94c2d5a3fe7b5ed429c22bb5eea282bc14b48260e
-
C:\Windows\SysWOW64\drivers\system32.exeFilesize
146KB
MD5320867c337db174c60200b23d21a16a0
SHA149032d1539d5cb93d4bd0dbf28f40cf983c5e004
SHA2561cf92536c3efe3af302b54ecd48cea8a301ce1a0b68a6c6231c7783aa4866a95
SHA5128d171fc12e6c0d11babab2b0b3badfa677c269b41ba5087fb96c234ded97a4ee33a398b87745233fbd994d8d49d14e0a34faa16f8ad82c0574c6b91e72b9b7ba
-
C:\Windows\SysWOW64\drivers\system32.exeFilesize
146KB
MD5c263d0ee445baf1e92dc32e17bef70a0
SHA142bf1cc86305f18f4253a1bb0a4460ca1ebc7fb2
SHA25694e6d299675d8025600d2f5a998b625d886758a2b19d70ebc334e2c8206ed3a3
SHA5127b8f3105551736d782186cdbaf7b0f22d2c06aa3010f65539d5d00b7e10504e9fef79cc6437d9166a51a42f07ababbca03a9a8fc10a320c2dc6a0aa87578885b
-
C:\Windows\SysWOW64\drivers\system32.exeFilesize
146KB
MD5a9690225f6d2ec77a948c5a8356ebab7
SHA11408bb029b0b8629cf893c511f345e2d27a2261a
SHA256fd0322287cebfef67f55971147befcb8b315186e106bc02334f860397468f2a7
SHA512ac157a739c23c8e6f99127ae7eaca3339e3833e78c44fe2dcd4bad4c04b4e4a6a5a25c936ee6621f67ad5f30872dfc97c2b5ea94e0196c8621c4c79c3c2c7bde
-
C:\Windows\mscomctl.ocxFilesize
146KB
MD5b9811442f970a2f4d7d0d30778f81692
SHA1b8da05aa29b0bb6696b329b3d37866d546becf7b
SHA2562868d9b349a1bc1175ebc33b1af13d3ef6512dd23674d0c3bc5f8e15b94c2d37
SHA512b670cc56a664e876d02911497c873b8da9252d4410a3a02c88109c875e9017e89060975fac1cd2bb792e4be36a14322230a2c65036a0517c8b4a8077e718d43c
-
C:\Windows\system\msvbvm60.dllFilesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
\Windows\Fonts\Admin 25 - 5 - 2024\smss.exeFilesize
146KB
MD5ea77830aacb8dc7b1c1b6a853c7f5034
SHA1501f6f4299782a448e2d83e26fc2611ff33e60eb
SHA256f193bb79b2d76d0c9959a85f91ba106de4ef6b032f0a0709055d8f19bc5e1f3e
SHA512d9b44d4c7f5bfd86c476c1a5365d5ddf841f8a1a9ff5a2d421da488863b90e4c0f5a5eac66b12dbbea5a1646e2db4205fb560971cd6350911d89ec68dbf91eb2
-
\Windows\SysWOW64\drivers\Kazekage.exeFilesize
146KB
MD542aa21d0eef2f537fb9578cf41ad164a
SHA1252475fc21fe627b0e49394a60eb2e8c72f28951
SHA256a22a3cbfe6f4a0e8ca80830f1d957646e89946ce8db3c9bf100a2057d5036835
SHA512897adadf38e8b7e4c96e1b315d01525a7ec79e6e126e00629acdd97640ecfc87c6144bc48f495a304c32e77b82c8b4468bbc81463bdac127f9b1980ac92878ca
-
memory/572-230-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/624-222-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/648-226-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/648-223-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/768-179-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/768-184-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/792-257-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/872-292-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/896-283-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/984-280-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1092-1005-0x0000000000390000-0x00000000003B5000-memory.dmpFilesize
148KB
-
memory/1092-758-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1092-145-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1100-219-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1212-77-0x00000000002D0000-0x00000000002F5000-memory.dmpFilesize
148KB
-
memory/1212-754-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1212-755-0x00000000002D0000-0x00000000002F5000-memory.dmpFilesize
148KB
-
memory/1212-88-0x00000000002D0000-0x00000000002F5000-memory.dmpFilesize
148KB
-
memory/1308-268-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1440-265-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1440-262-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1636-274-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1660-39-0x00000000004B0000-0x00000000004D5000-memory.dmpFilesize
148KB
-
memory/1660-0-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1660-32-0x00000000004B0000-0x00000000004D5000-memory.dmpFilesize
148KB
-
memory/1660-753-0x00000000004B0000-0x00000000004D5000-memory.dmpFilesize
148KB
-
memory/1660-752-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1672-260-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1672-261-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1740-234-0x00000000003D0000-0x00000000003F5000-memory.dmpFilesize
148KB
-
memory/1740-1007-0x00000000003D0000-0x00000000003F5000-memory.dmpFilesize
148KB
-
memory/1740-196-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1740-1006-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1740-1008-0x00000000003D0000-0x00000000003F5000-memory.dmpFilesize
148KB
-
memory/1824-271-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1984-235-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1984-1009-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2268-279-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2284-190-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2284-185-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2464-80-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2480-89-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2480-757-0x00000000005C0000-0x00000000005E5000-memory.dmpFilesize
148KB
-
memory/2480-123-0x00000000005C0000-0x00000000005E5000-memory.dmpFilesize
148KB
-
memory/2480-125-0x00000000005C0000-0x00000000005E5000-memory.dmpFilesize
148KB
-
memory/2480-756-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2532-134-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2736-130-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2836-177-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2880-253-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2880-254-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2888-250-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2968-289-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2988-286-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/3000-295-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB