Analysis
-
max time kernel
38s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
4a11f152922f2e209f5ca06ef741ef60
-
SHA1
216a2ffbd516a5604718497a185343981f3c4a01
-
SHA256
d64afa2c4338bfd2c4215193bde86d13e8736d1a77f2193e565e8f1876dfa9fe
-
SHA512
7dc13d3e601ac75ef9d58e01c910c1a5c0e30892e3fbb4049a9d6b34ce62e19afbfa45d0ac628a277d56c8c8690a3198630703ad1037c4b5568f75aa1affe175
-
SSDEEP
24576:k5xolYQY6EOb7YU0uestsWNthL8qUym53WJN5y3Mk1XXRw6+sBkZGsiH6W:nYW0ueBWjBy53WJN5y3Mi+6l9F
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies firewall policy service 2 TTPs 9 IoCs
Processes:
spoolsv.exe4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" spoolsv.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Processes:
spoolsv.exe4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe -
Processes:
4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exespoolsv.exe4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" spoolsv.exe -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Deletes itself 1 IoCs
Processes:
spoolsv.exepid process 4464 spoolsv.exe -
Executes dropped EXE 6 IoCs
Processes:
4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 3240 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe 4508 icsys.icn.exe 4128 explorer.exe 4464 spoolsv.exe 4728 svchost.exe 640 spoolsv.exe -
Processes:
resource yara_rule behavioral2/memory/1492-1-0x0000000002A00000-0x0000000003A8E000-memory.dmp upx behavioral2/memory/1492-3-0x0000000002A00000-0x0000000003A8E000-memory.dmp upx behavioral2/memory/1492-6-0x0000000002A00000-0x0000000003A8E000-memory.dmp upx behavioral2/memory/1492-15-0x0000000002A00000-0x0000000003A8E000-memory.dmp upx behavioral2/memory/1492-14-0x0000000002A00000-0x0000000003A8E000-memory.dmp upx behavioral2/memory/1492-9-0x0000000002A00000-0x0000000003A8E000-memory.dmp upx behavioral2/memory/1492-4-0x0000000002A00000-0x0000000003A8E000-memory.dmp upx \??\c:\users\admin\appdata\local\temp\4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe upx behavioral2/memory/3240-25-0x0000000000400000-0x0000000000684000-memory.dmp upx behavioral2/memory/3240-24-0x0000000000400000-0x0000000000684000-memory.dmp upx behavioral2/memory/1492-23-0x0000000002A00000-0x0000000003A8E000-memory.dmp upx behavioral2/memory/1492-5-0x0000000002A00000-0x0000000003A8E000-memory.dmp upx behavioral2/memory/3240-27-0x0000000000400000-0x0000000000684000-memory.dmp upx behavioral2/memory/1492-17-0x0000000002A00000-0x0000000003A8E000-memory.dmp upx behavioral2/memory/1492-32-0x0000000002A00000-0x0000000003A8E000-memory.dmp upx behavioral2/memory/1492-39-0x0000000002A00000-0x0000000003A8E000-memory.dmp upx behavioral2/memory/1492-34-0x0000000002A00000-0x0000000003A8E000-memory.dmp upx behavioral2/memory/4464-67-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/4464-65-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/4464-68-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/4464-80-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/4464-92-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/4464-91-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/4464-87-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/4464-86-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/4464-88-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/4464-98-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/4464-100-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/4464-102-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/4464-116-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3240-151-0x0000000000400000-0x0000000000684000-memory.dmp upx -
Processes:
4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exespoolsv.exe4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" spoolsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" spoolsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Processes:
4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exespoolsv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" spoolsv.exe -
Enumerates connected drives 3 TTPs 6 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exedescription ioc process File opened (read-only) \??\E: 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe File opened (read-only) \??\G: 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe File opened (read-only) \??\H: 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe File opened (read-only) \??\I: 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe File opened (read-only) \??\J: 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe File opened (read-only) \??\K: 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe -
Drops file in Windows directory 6 IoCs
Processes:
svchost.exe4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exeicsys.icn.exeexplorer.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\SYSTEM.INI 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exeicsys.icn.exespoolsv.exeexplorer.exesvchost.exepid process 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe 4508 icsys.icn.exe 4508 icsys.icn.exe 4464 spoolsv.exe 4464 spoolsv.exe 4464 spoolsv.exe 4464 spoolsv.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4728 svchost.exe 4728 svchost.exe 4728 svchost.exe 4728 svchost.exe 4728 svchost.exe 4128 explorer.exe 4728 svchost.exe 4128 explorer.exe 4128 explorer.exe 4728 svchost.exe 4728 svchost.exe 4128 explorer.exe 4128 explorer.exe 4128 explorer.exe 4728 svchost.exe 4728 svchost.exe 4728 svchost.exe 4728 svchost.exe 4128 explorer.exe 4128 explorer.exe 4728 svchost.exe 4728 svchost.exe 4128 explorer.exe 4128 explorer.exe 4728 svchost.exe 4728 svchost.exe 4128 explorer.exe 4128 explorer.exe 4728 svchost.exe 4128 explorer.exe 4728 svchost.exe 4128 explorer.exe 4728 svchost.exe 4728 svchost.exe 4128 explorer.exe 4128 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 4128 explorer.exe 4728 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Token: SeDebugPrivilege 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe 4508 icsys.icn.exe 4508 icsys.icn.exe 4128 explorer.exe 4128 explorer.exe 4464 spoolsv.exe 4464 spoolsv.exe 4728 svchost.exe 4728 svchost.exe 4128 explorer.exe 4128 explorer.exe 640 spoolsv.exe 640 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 1492 wrote to memory of 792 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe fontdrvhost.exe PID 1492 wrote to memory of 800 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe fontdrvhost.exe PID 1492 wrote to memory of 64 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe dwm.exe PID 1492 wrote to memory of 2624 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe sihost.exe PID 1492 wrote to memory of 2656 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe svchost.exe PID 1492 wrote to memory of 2872 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe taskhostw.exe PID 1492 wrote to memory of 3512 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Explorer.EXE PID 1492 wrote to memory of 3632 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe svchost.exe PID 1492 wrote to memory of 3824 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe DllHost.exe PID 1492 wrote to memory of 3912 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1492 wrote to memory of 3976 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe RuntimeBroker.exe PID 1492 wrote to memory of 4084 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe SearchApp.exe PID 1492 wrote to memory of 4136 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe RuntimeBroker.exe PID 1492 wrote to memory of 1920 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe RuntimeBroker.exe PID 1492 wrote to memory of 4496 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe TextInputHost.exe PID 1492 wrote to memory of 344 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe backgroundTaskHost.exe PID 1492 wrote to memory of 916 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe backgroundTaskHost.exe PID 1492 wrote to memory of 3240 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe PID 1492 wrote to memory of 3240 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe PID 1492 wrote to memory of 3240 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe PID 1492 wrote to memory of 4508 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe icsys.icn.exe PID 1492 wrote to memory of 4508 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe icsys.icn.exe PID 1492 wrote to memory of 4508 1492 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe icsys.icn.exe PID 4508 wrote to memory of 4128 4508 icsys.icn.exe explorer.exe PID 4508 wrote to memory of 4128 4508 icsys.icn.exe explorer.exe PID 4508 wrote to memory of 4128 4508 icsys.icn.exe explorer.exe PID 4128 wrote to memory of 4464 4128 explorer.exe spoolsv.exe PID 4128 wrote to memory of 4464 4128 explorer.exe spoolsv.exe PID 4128 wrote to memory of 4464 4128 explorer.exe spoolsv.exe PID 4464 wrote to memory of 792 4464 spoolsv.exe fontdrvhost.exe PID 4464 wrote to memory of 800 4464 spoolsv.exe fontdrvhost.exe PID 4464 wrote to memory of 64 4464 spoolsv.exe dwm.exe PID 4464 wrote to memory of 2624 4464 spoolsv.exe sihost.exe PID 4464 wrote to memory of 2656 4464 spoolsv.exe svchost.exe PID 4464 wrote to memory of 2872 4464 spoolsv.exe taskhostw.exe PID 4464 wrote to memory of 3512 4464 spoolsv.exe Explorer.EXE PID 4464 wrote to memory of 3632 4464 spoolsv.exe svchost.exe PID 4464 wrote to memory of 3824 4464 spoolsv.exe DllHost.exe PID 4464 wrote to memory of 3912 4464 spoolsv.exe StartMenuExperienceHost.exe PID 4464 wrote to memory of 3976 4464 spoolsv.exe RuntimeBroker.exe PID 4464 wrote to memory of 4084 4464 spoolsv.exe SearchApp.exe PID 4464 wrote to memory of 4136 4464 spoolsv.exe RuntimeBroker.exe PID 4464 wrote to memory of 1920 4464 spoolsv.exe RuntimeBroker.exe PID 4464 wrote to memory of 4496 4464 spoolsv.exe TextInputHost.exe PID 4464 wrote to memory of 344 4464 spoolsv.exe backgroundTaskHost.exe PID 4464 wrote to memory of 916 4464 spoolsv.exe backgroundTaskHost.exe PID 4464 wrote to memory of 3240 4464 spoolsv.exe 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe PID 4464 wrote to memory of 3240 4464 spoolsv.exe 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe PID 4464 wrote to memory of 4508 4464 spoolsv.exe icsys.icn.exe PID 4464 wrote to memory of 4508 4464 spoolsv.exe icsys.icn.exe PID 4464 wrote to memory of 4128 4464 spoolsv.exe explorer.exe PID 4464 wrote to memory of 4128 4464 spoolsv.exe explorer.exe PID 4464 wrote to memory of 1476 4464 spoolsv.exe BackgroundTaskHost.exe PID 4464 wrote to memory of 4728 4464 spoolsv.exe svchost.exe PID 4464 wrote to memory of 4728 4464 spoolsv.exe svchost.exe PID 4464 wrote to memory of 4728 4464 spoolsv.exe svchost.exe PID 4728 wrote to memory of 640 4728 svchost.exe spoolsv.exe PID 4728 wrote to memory of 640 4728 svchost.exe spoolsv.exe PID 4728 wrote to memory of 640 4728 svchost.exe spoolsv.exe PID 4464 wrote to memory of 792 4464 spoolsv.exe fontdrvhost.exe PID 4464 wrote to memory of 800 4464 spoolsv.exe fontdrvhost.exe PID 4464 wrote to memory of 64 4464 spoolsv.exe dwm.exe PID 4464 wrote to memory of 2624 4464 spoolsv.exe sihost.exe PID 4464 wrote to memory of 2656 4464 spoolsv.exe svchost.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exespoolsv.exe4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" spoolsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:800
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:64
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2656
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2872
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4a11f152922f2e209f5ca06ef741ef60_NeikiAnalytics.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1492 -
\??\c:\users\admin\appdata\local\temp\4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exec:\users\admin\appdata\local\temp\4a11f152922f2e209f5ca06ef741ef60_neikianalytics.exe3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- System policy modification
PID:3240
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4508 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4128 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4464 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4728 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:640
-
-
C:\Windows\SysWOW64\at.exeat 01:36 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe7⤵PID:2320
-
-
C:\Windows\SysWOW64\at.exeat 01:37 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe7⤵PID:3932
-
-
C:\Windows\SysWOW64\at.exeat 01:38 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe7⤵PID:3216
-
-
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3632
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3824
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3912
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3976
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4084
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4136
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1920
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4496
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:344
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:916
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider1⤵PID:1476
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4700
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2160
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD54da835ed86a177928d6b289460782971
SHA1e15216b8987c45bb79cfaaa320e2beba6b00fa5f
SHA2560f8b3c197b1526d4cf5dd77ac63749b4543e07b03d0b2decc66c9fb7128ccbaf
SHA512c53ea9711409ae617fcb9dbf7a7543621128c4944771cdedb6d1b5604244f05adfd56ed29ba9f75ef6ad732cc8e33909242b726c184c70f5fd2ffab0f8f75543
-
Filesize
288KB
MD56b5c20af1557d271751f2654f200d74b
SHA1fa5ed5bd483a9d52aef56cc07b14b18339971d69
SHA256cc2d9e98e7781669e297d9e1b7cf55ecc6211c18c3158bfbdf497f758b18340f
SHA512936e7a359506a30c7f717ba45d31cae2496ff4c3e5205a6acb864dd4c3c7b4184bdb135130e71dd949399bb6cb1a8587a544ff6119be4a507e583ad78f045836
-
Filesize
256B
MD55290394fa06b034842ec6376a90adfd4
SHA11d7e3d666aa48a13b236ec38fe67cca77d2c814e
SHA256cab5e5838b4a90a67520cbecb6cf1c57a77561fb03362013ceb0ccb6be815d8c
SHA512e43d7842e6fdbe2211d7c42dd20d355429e355b62ddc60583e3ad59e59a036e225f556388e7c591c31c9c2235618c5646392ac21a315c31054c7a5ef8e3aefd1
-
Filesize
288KB
MD5bb61cdd096f040900b6e4ccc5d93d2e6
SHA14eeeb4d608283a92a9405395dc72af26ea59ee41
SHA256757cd35d15759e62c511b3c372860f036c6106fc41fee471bb118316ed883efc
SHA512d29b2e1c4f700a3ba4323b52051e9811b446dcf40b31e26db87e65f5cada70be6ace997e94712f0c170de1ced64bc7288ad35ff615b05ffa2f7f73f2bc613f06
-
Filesize
100KB
MD5822c0fca78ba5a7a794f559c8017d84e
SHA1c110c51445965fa00994d5a7dc0d250235117941
SHA256f3caa9474af474db0d057723e184f2ceeeb78b1bcb10af6ae5faa0aae56c39c0
SHA512849e1f530b2705a60eba9e7f453bb4594db499dfe08c14d318626bcd10ba7f903be164cabb4d4ac835f9c6c2cf836f5c568b64be08b2c85f6d6af03d2d1506d9
-
Filesize
1.1MB
MD5503004f1cf5c6785346e975a4e583cb7
SHA1074adca5b5260d05f31d948ed9c001bca0b64218
SHA25652d50091fb9fdd697130aa261009e7cba56e3f0bae4771d791f3cf9e97cb3e22
SHA51263bf68577e4c4cd6c5e688e66ec14a08a1e95c25e5a2c2ace35a6792b171b43025d59ca933c4ff12266b254995eca16c79a58043ceefdd747dc5004767104644
-
Filesize
287KB
MD51d026797b77ff9dd7128889978451de6
SHA1540fdb46c28e0b67bdfa2a65eb07dd9432ca8350
SHA2560bf7350d88cb28fd8feb93d78a337e53fc6eab3a7a9a7af8b3d82a7cb5705d6f
SHA512614d81cffc1a07c10d1813e45cacd44ccd7711ffcfab1ec37ec9cbff2a79bf8c2b9446cdd7368ca24fac3e62f05166ccaf352ec906e5cd97d535b63e5972dde0
-
Filesize
287KB
MD515bb68ea1051b57e1f29c0ddecb47283
SHA1ed933171f8af166a4bd0dcff11091507c7b3dc18
SHA256f68c9f3a315e8f12e35dbfaf8233063ab5a355428bafab16902e9c9039390ac5
SHA5120fca886b74f5f83b7e04ba2cb65b4a5587a2e541c9f16514ed387dc3045433018ba279614b3015039fe507702548f0d45ed35d6e8c357148947083c7c51d74aa