Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
a6970b64971f586da662b2d717b224f0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a6970b64971f586da662b2d717b224f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a6970b64971f586da662b2d717b224f0_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
a6970b64971f586da662b2d717b224f0
-
SHA1
6fefff4da022fd7ac97ea679902864c27f90135b
-
SHA256
13620e677a5ba2f71fc043428273eb10ccfa708a342d591e430f267f2bdaa785
-
SHA512
0d1d95e17acc04ca6f30c25e9dfbc0b1ad48a80bdb6471134777821cd8eb7e3cae1150b5750e511b1f1a6e56fb90c1ae0d76dbcd432d162655064c7edb129357
-
SSDEEP
24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4et:ObCjPKNqQEfsw43qtmVfq4y
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.me.com - Port:
587 - Username:
[email protected] - Password:
RICHARD205lord
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 876 jhdfkldfhndfkjdfnbfklfnf.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1968-15-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1968-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1968-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/1968-22-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral2/memory/856-26-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/856-28-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/856-27-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/856-30-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts cvtres.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" a6970b64971f586da662b2d717b224f0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" jhdfkldfhndfkjdfnbfklfnf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 icanhazip.com 36 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023360-3.dat autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 876 set thread context of 1900 876 jhdfkldfhndfkjdfnbfklfnf.exe 96 PID 1900 set thread context of 1968 1900 RegAsm.exe 99 PID 1900 set thread context of 856 1900 RegAsm.exe 101 PID 1900 set thread context of 3632 1900 RegAsm.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 26 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3684 schtasks.exe 4444 schtasks.exe 3300 schtasks.exe 2716 schtasks.exe 2560 schtasks.exe 3472 schtasks.exe 748 schtasks.exe 1712 schtasks.exe 1836 schtasks.exe 620 schtasks.exe 636 schtasks.exe 2456 schtasks.exe 2476 schtasks.exe 2312 schtasks.exe 5080 schtasks.exe 3156 schtasks.exe 4680 schtasks.exe 4844 schtasks.exe 216 schtasks.exe 4432 schtasks.exe 4380 schtasks.exe 3968 schtasks.exe 3960 schtasks.exe 228 schtasks.exe 916 schtasks.exe 2316 schtasks.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\a6970b64971f586da662b2d717b224f0_NeikiAnalytics.exe:Zone.Identifier:$DATA a6970b64971f586da662b2d717b224f0_NeikiAnalytics.exe File created C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe:Zone.Identifier:$DATA jhdfkldfhndfkjdfnbfklfnf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 532 a6970b64971f586da662b2d717b224f0_NeikiAnalytics.exe 532 a6970b64971f586da662b2d717b224f0_NeikiAnalytics.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 1900 RegAsm.exe 1900 RegAsm.exe 1900 RegAsm.exe 1900 RegAsm.exe 1900 RegAsm.exe 1900 RegAsm.exe 1900 RegAsm.exe 1900 RegAsm.exe 1900 RegAsm.exe 1900 RegAsm.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe 876 jhdfkldfhndfkjdfnbfklfnf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1900 RegAsm.exe Token: SeDebugPrivilege 1968 cvtres.exe Token: SeDebugPrivilege 856 cvtres.exe Token: SeDebugPrivilege 3632 cvtres.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1900 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 532 wrote to memory of 876 532 a6970b64971f586da662b2d717b224f0_NeikiAnalytics.exe 95 PID 532 wrote to memory of 876 532 a6970b64971f586da662b2d717b224f0_NeikiAnalytics.exe 95 PID 532 wrote to memory of 876 532 a6970b64971f586da662b2d717b224f0_NeikiAnalytics.exe 95 PID 876 wrote to memory of 1900 876 jhdfkldfhndfkjdfnbfklfnf.exe 96 PID 876 wrote to memory of 1900 876 jhdfkldfhndfkjdfnbfklfnf.exe 96 PID 876 wrote to memory of 1900 876 jhdfkldfhndfkjdfnbfklfnf.exe 96 PID 876 wrote to memory of 1900 876 jhdfkldfhndfkjdfnbfklfnf.exe 96 PID 876 wrote to memory of 1900 876 jhdfkldfhndfkjdfnbfklfnf.exe 96 PID 876 wrote to memory of 228 876 jhdfkldfhndfkjdfnbfklfnf.exe 97 PID 876 wrote to memory of 228 876 jhdfkldfhndfkjdfnbfklfnf.exe 97 PID 876 wrote to memory of 228 876 jhdfkldfhndfkjdfnbfklfnf.exe 97 PID 1900 wrote to memory of 1968 1900 RegAsm.exe 99 PID 1900 wrote to memory of 1968 1900 RegAsm.exe 99 PID 1900 wrote to memory of 1968 1900 RegAsm.exe 99 PID 1900 wrote to memory of 1968 1900 RegAsm.exe 99 PID 1900 wrote to memory of 1968 1900 RegAsm.exe 99 PID 1900 wrote to memory of 1968 1900 RegAsm.exe 99 PID 1900 wrote to memory of 1968 1900 RegAsm.exe 99 PID 1900 wrote to memory of 856 1900 RegAsm.exe 101 PID 1900 wrote to memory of 856 1900 RegAsm.exe 101 PID 1900 wrote to memory of 856 1900 RegAsm.exe 101 PID 1900 wrote to memory of 856 1900 RegAsm.exe 101 PID 1900 wrote to memory of 856 1900 RegAsm.exe 101 PID 1900 wrote to memory of 856 1900 RegAsm.exe 101 PID 1900 wrote to memory of 856 1900 RegAsm.exe 101 PID 1900 wrote to memory of 3632 1900 RegAsm.exe 103 PID 1900 wrote to memory of 3632 1900 RegAsm.exe 103 PID 1900 wrote to memory of 3632 1900 RegAsm.exe 103 PID 1900 wrote to memory of 3632 1900 RegAsm.exe 103 PID 1900 wrote to memory of 3632 1900 RegAsm.exe 103 PID 1900 wrote to memory of 3632 1900 RegAsm.exe 103 PID 876 wrote to memory of 3684 876 jhdfkldfhndfkjdfnbfklfnf.exe 105 PID 876 wrote to memory of 3684 876 jhdfkldfhndfkjdfnbfklfnf.exe 105 PID 876 wrote to memory of 3684 876 jhdfkldfhndfkjdfnbfklfnf.exe 105 PID 876 wrote to memory of 1836 876 jhdfkldfhndfkjdfnbfklfnf.exe 108 PID 876 wrote to memory of 1836 876 jhdfkldfhndfkjdfnbfklfnf.exe 108 PID 876 wrote to memory of 1836 876 jhdfkldfhndfkjdfnbfklfnf.exe 108 PID 876 wrote to memory of 216 876 jhdfkldfhndfkjdfnbfklfnf.exe 111 PID 876 wrote to memory of 216 876 jhdfkldfhndfkjdfnbfklfnf.exe 111 PID 876 wrote to memory of 216 876 jhdfkldfhndfkjdfnbfklfnf.exe 111 PID 876 wrote to memory of 4444 876 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 876 wrote to memory of 4444 876 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 876 wrote to memory of 4444 876 jhdfkldfhndfkjdfnbfklfnf.exe 113 PID 876 wrote to memory of 3472 876 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 876 wrote to memory of 3472 876 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 876 wrote to memory of 3472 876 jhdfkldfhndfkjdfnbfklfnf.exe 115 PID 876 wrote to memory of 620 876 jhdfkldfhndfkjdfnbfklfnf.exe 117 PID 876 wrote to memory of 620 876 jhdfkldfhndfkjdfnbfklfnf.exe 117 PID 876 wrote to memory of 620 876 jhdfkldfhndfkjdfnbfklfnf.exe 117 PID 876 wrote to memory of 3300 876 jhdfkldfhndfkjdfnbfklfnf.exe 119 PID 876 wrote to memory of 3300 876 jhdfkldfhndfkjdfnbfklfnf.exe 119 PID 876 wrote to memory of 3300 876 jhdfkldfhndfkjdfnbfklfnf.exe 119 PID 876 wrote to memory of 748 876 jhdfkldfhndfkjdfnbfklfnf.exe 121 PID 876 wrote to memory of 748 876 jhdfkldfhndfkjdfnbfklfnf.exe 121 PID 876 wrote to memory of 748 876 jhdfkldfhndfkjdfnbfklfnf.exe 121 PID 876 wrote to memory of 4432 876 jhdfkldfhndfkjdfnbfklfnf.exe 123 PID 876 wrote to memory of 4432 876 jhdfkldfhndfkjdfnbfklfnf.exe 123 PID 876 wrote to memory of 4432 876 jhdfkldfhndfkjdfnbfklfnf.exe 123 PID 876 wrote to memory of 2312 876 jhdfkldfhndfkjdfnbfklfnf.exe 126 PID 876 wrote to memory of 2312 876 jhdfkldfhndfkjdfnbfklfnf.exe 126 PID 876 wrote to memory of 2312 876 jhdfkldfhndfkjdfnbfklfnf.exe 126 PID 876 wrote to memory of 3156 876 jhdfkldfhndfkjdfnbfklfnf.exe 128 PID 876 wrote to memory of 3156 876 jhdfkldfhndfkjdfnbfklfnf.exe 128 PID 876 wrote to memory of 3156 876 jhdfkldfhndfkjdfnbfklfnf.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6970b64971f586da662b2d717b224f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a6970b64971f586da662b2d717b224f0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:532 -
C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exeC:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe03⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpA856.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpAAE7.tmp"4⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpAB36.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:228
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3684
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1836
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:216
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:4444
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3472
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:620
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3300
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:748
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:4432
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2312
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3156
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1712
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:636
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:916
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2456
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2476
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:4380
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2716
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3968
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3960
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:4680
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2316
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2560
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:4844
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:5080
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5b5ba6f715612d553d427460592ea086a
SHA171603fc4737d8f27fd6efb31145b4b6b2c1bd3bb
SHA25603d522e5ef0b43f984bf5b5316319bfdbdb3bba46e4ba1d097f60af1aaab46ce
SHA512e246cb75b69e36b278bc5fe938601bad41569ad24424635dc81bd76b3db915d6c5b0c61ed53b42ce1df81ea708dea1bb5905401a5331865a0e5ff8e3fd7374be
-
Filesize
1KB
MD5b0cc2e6f2d8036c9b5fef218736fa9c9
SHA164fd3017625979c95ba09d7cbea201010a82f73f
SHA256997aceeb78143e057d4ea0ed699db3cc1c723f699b4532663b7b85c83baa5c50
SHA512a1fe80b2971c4d1141a594f27eaea61500bf701cd1b8fbdb5ac2204a63c8ef862344f8c30f65ce769f0acf2b0718ed33a02744dd1a152c4a62a5318333d29b9b
-
Filesize
400B
MD5de4e5ff058882957cf8a3b5f839a031f
SHA10b3d8279120fb5fa27efbd9eee89695aa040fc24
SHA256ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49
SHA512a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72
-
Filesize
391B
MD53525ea58bba48993ea0d01b65ea71381
SHA11b917678fdd969e5ee5916e5899e7c75a979cf4d
SHA256681bcee53cf679ac674e700136f9229b9184fe60ed6410dbd7a33d462ed13ae2
SHA5125aad8dca43ec85882daf50c469bd04dcf0b62affc8bc605b3e289496a2679d4d548fea8bb0aea7080bbfbcdcab9d275fc6797b9c95b64f9f97ecf79583a83986