Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 22:23
Static task
static1
Behavioral task
behavioral1
Sample
0790af2d17e7a0ab3cd907154b995300_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0790af2d17e7a0ab3cd907154b995300_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
0790af2d17e7a0ab3cd907154b995300_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
0790af2d17e7a0ab3cd907154b995300
-
SHA1
0852e1736b22c30a419a264ddc0e2a42e2096be1
-
SHA256
4519dcbdcb111511405abaf7d0b6bb7c12cbb865c02ddb2946304222f57717fe
-
SHA512
b59d3104a3f31f79e67f2c99b0f4c7e16a8063ce744934a8614d9678ae565ca5148db69fdc2e124678122dedc53e1bbf0b0ff21f7d52986e4d410c237c6477dc
-
SSDEEP
24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4ea:ObCjPKNqQEfsw43qtmVfq4L
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.me.com - Port:
587 - Username:
[email protected] - Password:
RICHARD205lord
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2924 jhdfkldfhndfkjdfnbfklfnf.exe 1836 winmgr119.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 0790af2d17e7a0ab3cd907154b995300_NeikiAnalytics.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2508-22-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2508-23-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2508-24-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2508-31-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2796-34-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2796-36-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2796-37-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2796-75-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts cvtres.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" 0790af2d17e7a0ab3cd907154b995300_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" jhdfkldfhndfkjdfnbfklfnf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 icanhazip.com 4 ipinfo.io -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000700000001211c-2.dat autoit_exe behavioral1/files/0x0036000000013450-9.dat autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2924 set thread context of 2616 2924 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2616 set thread context of 2508 2616 RegAsm.exe 32 PID 2616 set thread context of 2796 2616 RegAsm.exe 35 PID 2616 set thread context of 2476 2616 RegAsm.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 25 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1668 schtasks.exe 1504 schtasks.exe 3016 schtasks.exe 2728 schtasks.exe 536 schtasks.exe 2460 schtasks.exe 1888 schtasks.exe 1196 schtasks.exe 2604 schtasks.exe 560 schtasks.exe 2804 schtasks.exe 1660 schtasks.exe 1764 schtasks.exe 900 schtasks.exe 3060 schtasks.exe 2724 schtasks.exe 852 schtasks.exe 1160 schtasks.exe 892 schtasks.exe 1472 schtasks.exe 1060 schtasks.exe 1704 schtasks.exe 2780 schtasks.exe 3000 schtasks.exe 2320 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe:Zone.Identifier:$DATA jhdfkldfhndfkjdfnbfklfnf.exe File created C:\ProgramData\winmgr119.exe:Zone.Identifier:$DATA winmgr119.exe File created C:\Users\Admin\AppData\Local\Temp\0790af2d17e7a0ab3cd907154b995300_NeikiAnalytics.exe:Zone.Identifier:$DATA 0790af2d17e7a0ab3cd907154b995300_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 3048 0790af2d17e7a0ab3cd907154b995300_NeikiAnalytics.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2616 RegAsm.exe 2616 RegAsm.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 1836 winmgr119.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2616 RegAsm.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe 2924 jhdfkldfhndfkjdfnbfklfnf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2616 RegAsm.exe Token: SeDebugPrivilege 2508 cvtres.exe Token: SeDebugPrivilege 2796 cvtres.exe Token: SeDebugPrivilege 2476 cvtres.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2616 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2924 3048 0790af2d17e7a0ab3cd907154b995300_NeikiAnalytics.exe 28 PID 3048 wrote to memory of 2924 3048 0790af2d17e7a0ab3cd907154b995300_NeikiAnalytics.exe 28 PID 3048 wrote to memory of 2924 3048 0790af2d17e7a0ab3cd907154b995300_NeikiAnalytics.exe 28 PID 3048 wrote to memory of 2924 3048 0790af2d17e7a0ab3cd907154b995300_NeikiAnalytics.exe 28 PID 2924 wrote to memory of 2616 2924 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2924 wrote to memory of 2616 2924 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2924 wrote to memory of 2616 2924 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2924 wrote to memory of 2616 2924 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2924 wrote to memory of 2616 2924 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2924 wrote to memory of 2616 2924 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2924 wrote to memory of 2616 2924 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2924 wrote to memory of 2616 2924 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2924 wrote to memory of 2616 2924 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2924 wrote to memory of 2604 2924 jhdfkldfhndfkjdfnbfklfnf.exe 30 PID 2924 wrote to memory of 2604 2924 jhdfkldfhndfkjdfnbfklfnf.exe 30 PID 2924 wrote to memory of 2604 2924 jhdfkldfhndfkjdfnbfklfnf.exe 30 PID 2924 wrote to memory of 2604 2924 jhdfkldfhndfkjdfnbfklfnf.exe 30 PID 2616 wrote to memory of 2508 2616 RegAsm.exe 32 PID 2616 wrote to memory of 2508 2616 RegAsm.exe 32 PID 2616 wrote to memory of 2508 2616 RegAsm.exe 32 PID 2616 wrote to memory of 2508 2616 RegAsm.exe 32 PID 2616 wrote to memory of 2508 2616 RegAsm.exe 32 PID 2616 wrote to memory of 2508 2616 RegAsm.exe 32 PID 2616 wrote to memory of 2508 2616 RegAsm.exe 32 PID 2616 wrote to memory of 2508 2616 RegAsm.exe 32 PID 2616 wrote to memory of 2796 2616 RegAsm.exe 35 PID 2616 wrote to memory of 2796 2616 RegAsm.exe 35 PID 2616 wrote to memory of 2796 2616 RegAsm.exe 35 PID 2616 wrote to memory of 2796 2616 RegAsm.exe 35 PID 2616 wrote to memory of 2796 2616 RegAsm.exe 35 PID 2616 wrote to memory of 2796 2616 RegAsm.exe 35 PID 2616 wrote to memory of 2796 2616 RegAsm.exe 35 PID 2616 wrote to memory of 2796 2616 RegAsm.exe 35 PID 2924 wrote to memory of 1660 2924 jhdfkldfhndfkjdfnbfklfnf.exe 37 PID 2924 wrote to memory of 1660 2924 jhdfkldfhndfkjdfnbfklfnf.exe 37 PID 2924 wrote to memory of 1660 2924 jhdfkldfhndfkjdfnbfklfnf.exe 37 PID 2924 wrote to memory of 1660 2924 jhdfkldfhndfkjdfnbfklfnf.exe 37 PID 2616 wrote to memory of 2476 2616 RegAsm.exe 39 PID 2616 wrote to memory of 2476 2616 RegAsm.exe 39 PID 2616 wrote to memory of 2476 2616 RegAsm.exe 39 PID 2616 wrote to memory of 2476 2616 RegAsm.exe 39 PID 2616 wrote to memory of 2476 2616 RegAsm.exe 39 PID 2616 wrote to memory of 2476 2616 RegAsm.exe 39 PID 2616 wrote to memory of 2476 2616 RegAsm.exe 39 PID 2924 wrote to memory of 852 2924 jhdfkldfhndfkjdfnbfklfnf.exe 41 PID 2924 wrote to memory of 852 2924 jhdfkldfhndfkjdfnbfklfnf.exe 41 PID 2924 wrote to memory of 852 2924 jhdfkldfhndfkjdfnbfklfnf.exe 41 PID 2924 wrote to memory of 852 2924 jhdfkldfhndfkjdfnbfklfnf.exe 41 PID 2924 wrote to memory of 1764 2924 jhdfkldfhndfkjdfnbfklfnf.exe 43 PID 2924 wrote to memory of 1764 2924 jhdfkldfhndfkjdfnbfklfnf.exe 43 PID 2924 wrote to memory of 1764 2924 jhdfkldfhndfkjdfnbfklfnf.exe 43 PID 2924 wrote to memory of 1764 2924 jhdfkldfhndfkjdfnbfklfnf.exe 43 PID 2924 wrote to memory of 536 2924 jhdfkldfhndfkjdfnbfklfnf.exe 47 PID 2924 wrote to memory of 536 2924 jhdfkldfhndfkjdfnbfklfnf.exe 47 PID 2924 wrote to memory of 536 2924 jhdfkldfhndfkjdfnbfklfnf.exe 47 PID 2924 wrote to memory of 536 2924 jhdfkldfhndfkjdfnbfklfnf.exe 47 PID 2924 wrote to memory of 560 2924 jhdfkldfhndfkjdfnbfklfnf.exe 49 PID 2924 wrote to memory of 560 2924 jhdfkldfhndfkjdfnbfklfnf.exe 49 PID 2924 wrote to memory of 560 2924 jhdfkldfhndfkjdfnbfklfnf.exe 49 PID 2924 wrote to memory of 560 2924 jhdfkldfhndfkjdfnbfklfnf.exe 49 PID 2924 wrote to memory of 1472 2924 jhdfkldfhndfkjdfnbfklfnf.exe 51 PID 2924 wrote to memory of 1472 2924 jhdfkldfhndfkjdfnbfklfnf.exe 51 PID 2924 wrote to memory of 1472 2924 jhdfkldfhndfkjdfnbfklfnf.exe 51 PID 2924 wrote to memory of 1472 2924 jhdfkldfhndfkjdfnbfklfnf.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\0790af2d17e7a0ab3cd907154b995300_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0790af2d17e7a0ab3cd907154b995300_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exeC:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe03⤵
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp81DD.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp82A8.tmp"4⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp96BE.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2604
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1660
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:852
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1764
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:536
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:560
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1472
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1060
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2460
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1160
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1668
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1888
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:900
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3060
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1504
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1704
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:892
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3016
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2728
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2724
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2780
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3000
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2320
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2804
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1196
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {31001248-2B67-4638-BBAB-1E0F1F56AF2E} S-1-5-21-3691908287-3775019229-3534252667-1000:UOTHCPHQ\Admin:Interactive:[1]1⤵PID:1252
-
C:\ProgramData\winmgr119.exeC:\ProgramData\winmgr119.exe2⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD55cccc0123e39e9890b0bdb285b3663d4
SHA1c4a4a5ad7c27c5656934ab347ed2c42bbc0f66c9
SHA256333ece4405a27797865e34232f080ff8eb1a31ab2202f4f734d7073d80cf11dd
SHA5122b445bbcb07ea3b23a366d341b8a8507db48718f7abdfda4536b18ec8c905f1cb2978f5bf0d732adcdc26c06aa8eddaabf8d9a8923768188681b04100c78c4a0
-
Filesize
2.6MB
MD56529a869c3ff21b9f03acb92f5b12433
SHA103e49e110640e6087bf8505801d48495385cb9b8
SHA256b4e82c2d0d0b122e7a6fc9f38b946927dfd796de7503f36672bec7f6230e364a
SHA512279353098225eb5e2915edc3895997b6153181f2ee8938dc28aee3a50907a3b4162013f7ca6c09e6524d436d7994f543c7b9ada656957d8c84893016ff5f63a9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
399B
MD5e4bf4f7accc657622fe419c0d62419ab
SHA1c2856936dd3de05bad0da5ca94d6b521e40ab5a2
SHA256b32fa68b79c5a7ceaa89e8e537efe33a963c499666202611329944bd2c09318e
SHA51285dc223e39a16ddeba53a4b3d6c9eff14d30ec67dfda1e650da2c9057f640edd033a31868915a31caac0d325d240a7f634f62cd52fbd2adc68bd1d9cb6281431
-
Filesize
400B
MD5de4e5ff058882957cf8a3b5f839a031f
SHA10b3d8279120fb5fa27efbd9eee89695aa040fc24
SHA256ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49
SHA512a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72
-
Filesize
391B
MD53525ea58bba48993ea0d01b65ea71381
SHA11b917678fdd969e5ee5916e5899e7c75a979cf4d
SHA256681bcee53cf679ac674e700136f9229b9184fe60ed6410dbd7a33d462ed13ae2
SHA5125aad8dca43ec85882daf50c469bd04dcf0b62affc8bc605b3e289496a2679d4d548fea8bb0aea7080bbfbcdcab9d275fc6797b9c95b64f9f97ecf79583a83986
-
Filesize
2.6MB
MD5aade4885b917e3fe98dd16e06e4673d8
SHA13ad2509f3ab06f22260974697ea09401c74ef6cc
SHA256bd8dc4784c4e9acc6d831e3993882882744151d76e9e8c75da1f7a7fb102ff86
SHA512601769bbc06fd8d407dd15036ecb0ae3bf0a359c6a0ff1736eefc5ea5cf0b4df3c05eddaa3ae228240fbf98d49455cbe64a52bee691d1933a51f91c7a4b0f2fc