Analysis
-
max time kernel
136s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 04:07
Behavioral task
behavioral1
Sample
31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe
-
Size
5.9MB
-
MD5
31a87d131824685f777c39e90b336a30
-
SHA1
2e9340b4b275815c4e5a146a18fc126a4caa2df9
-
SHA256
91e286870059f96d287582b3edf38f41bfc6d1f2df1fcd165ecbf487b3381269
-
SHA512
04e191f2e217b818cfe1cd8f6d4adc23e687bb9f1d2192449fb0c27cd14a9cd45de517ce4fdca0b4567d55c0400ee870936f63adf30bbf1ebc8557783477f564
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lU/:Q+856utgpPF8u/7/
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x000d000000012345-3.dat cobalt_reflective_dll behavioral1/files/0x0032000000015c4c-12.dat cobalt_reflective_dll behavioral1/files/0x0008000000015c93-13.dat cobalt_reflective_dll behavioral1/files/0x0007000000015c9c-22.dat cobalt_reflective_dll behavioral1/files/0x0007000000015cbd-37.dat cobalt_reflective_dll behavioral1/files/0x0007000000015cb0-30.dat cobalt_reflective_dll behavioral1/files/0x0007000000015cce-47.dat cobalt_reflective_dll behavioral1/files/0x000600000001654a-60.dat cobalt_reflective_dll behavioral1/files/0x0006000000016813-75.dat cobalt_reflective_dll behavioral1/files/0x0006000000016a6f-82.dat cobalt_reflective_dll behavioral1/files/0x0034000000015c5a-93.dat cobalt_reflective_dll behavioral1/files/0x0006000000016c1d-97.dat cobalt_reflective_dll behavioral1/files/0x0006000000016c42-112.dat cobalt_reflective_dll behavioral1/files/0x0006000000016cf5-132.dat cobalt_reflective_dll behavioral1/files/0x0006000000016cfd-135.dat cobalt_reflective_dll behavioral1/files/0x0006000000016ce4-127.dat cobalt_reflective_dll behavioral1/files/0x0006000000016cb2-122.dat cobalt_reflective_dll behavioral1/files/0x0006000000016c8c-117.dat cobalt_reflective_dll behavioral1/files/0x0006000000016c3a-105.dat cobalt_reflective_dll behavioral1/files/0x00060000000165f0-67.dat cobalt_reflective_dll behavioral1/files/0x0008000000016476-53.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 64 IoCs
resource yara_rule behavioral1/memory/2108-0-0x000000013FE10000-0x0000000140164000-memory.dmp xmrig behavioral1/files/0x000d000000012345-3.dat xmrig behavioral1/memory/2632-9-0x000000013F1E0000-0x000000013F534000-memory.dmp xmrig behavioral1/files/0x0032000000015c4c-12.dat xmrig behavioral1/memory/2992-15-0x000000013FAE0000-0x000000013FE34000-memory.dmp xmrig behavioral1/files/0x0008000000015c93-13.dat xmrig behavioral1/memory/2472-21-0x000000013F730000-0x000000013FA84000-memory.dmp xmrig behavioral1/files/0x0007000000015c9c-22.dat xmrig behavioral1/memory/2600-28-0x000000013F210000-0x000000013F564000-memory.dmp xmrig behavioral1/files/0x0007000000015cbd-37.dat xmrig behavioral1/files/0x0007000000015cb0-30.dat xmrig behavioral1/memory/2172-43-0x000000013F1B0000-0x000000013F504000-memory.dmp xmrig behavioral1/memory/2480-41-0x000000013FB30000-0x000000013FE84000-memory.dmp xmrig behavioral1/files/0x0007000000015cce-47.dat xmrig behavioral1/memory/2712-50-0x000000013F5C0000-0x000000013F914000-memory.dmp xmrig behavioral1/memory/2412-56-0x000000013F500000-0x000000013F854000-memory.dmp xmrig behavioral1/files/0x000600000001654a-60.dat xmrig behavioral1/memory/2360-64-0x000000013F360000-0x000000013F6B4000-memory.dmp xmrig behavioral1/files/0x0006000000016813-75.dat xmrig behavioral1/memory/2484-70-0x000000013F560000-0x000000013F8B4000-memory.dmp xmrig behavioral1/memory/2068-78-0x000000013F1E0000-0x000000013F534000-memory.dmp xmrig behavioral1/files/0x0006000000016a6f-82.dat xmrig behavioral1/memory/2464-86-0x000000013F3A0000-0x000000013F6F4000-memory.dmp xmrig behavioral1/files/0x0034000000015c5a-93.dat xmrig behavioral1/files/0x0006000000016c1d-97.dat xmrig behavioral1/files/0x0006000000016c42-112.dat xmrig behavioral1/files/0x0006000000016cf5-132.dat xmrig behavioral1/files/0x0006000000016cfd-135.dat xmrig behavioral1/files/0x0006000000016ce4-127.dat xmrig behavioral1/files/0x0006000000016cb2-122.dat xmrig behavioral1/files/0x0006000000016c8c-117.dat xmrig behavioral1/memory/2108-108-0x0000000002270000-0x00000000025C4000-memory.dmp xmrig behavioral1/memory/2172-107-0x000000013F1B0000-0x000000013F504000-memory.dmp xmrig behavioral1/files/0x0006000000016c3a-105.dat xmrig behavioral1/memory/2600-91-0x000000013F210000-0x000000013F564000-memory.dmp xmrig behavioral1/memory/2756-100-0x000000013F6B0000-0x000000013FA04000-memory.dmp xmrig behavioral1/memory/1556-99-0x000000013FD70000-0x00000001400C4000-memory.dmp xmrig behavioral1/memory/2472-84-0x000000013F730000-0x000000013FA84000-memory.dmp xmrig behavioral1/memory/2992-68-0x000000013FAE0000-0x000000013FE34000-memory.dmp xmrig behavioral1/files/0x00060000000165f0-67.dat xmrig behavioral1/memory/2108-55-0x000000013FE10000-0x0000000140164000-memory.dmp xmrig behavioral1/files/0x0008000000016476-53.dat xmrig behavioral1/memory/2108-19-0x000000013F730000-0x000000013FA84000-memory.dmp xmrig behavioral1/memory/2412-139-0x000000013F500000-0x000000013F854000-memory.dmp xmrig behavioral1/memory/2484-141-0x000000013F560000-0x000000013F8B4000-memory.dmp xmrig behavioral1/memory/2068-143-0x000000013F1E0000-0x000000013F534000-memory.dmp xmrig behavioral1/memory/2464-145-0x000000013F3A0000-0x000000013F6F4000-memory.dmp xmrig behavioral1/memory/2108-146-0x000000013F6B0000-0x000000013FA04000-memory.dmp xmrig behavioral1/memory/1556-148-0x000000013FD70000-0x00000001400C4000-memory.dmp xmrig behavioral1/memory/2756-149-0x000000013F6B0000-0x000000013FA04000-memory.dmp xmrig behavioral1/memory/2632-150-0x000000013F1E0000-0x000000013F534000-memory.dmp xmrig behavioral1/memory/2992-151-0x000000013FAE0000-0x000000013FE34000-memory.dmp xmrig behavioral1/memory/2472-152-0x000000013F730000-0x000000013FA84000-memory.dmp xmrig behavioral1/memory/2480-154-0x000000013FB30000-0x000000013FE84000-memory.dmp xmrig behavioral1/memory/2600-153-0x000000013F210000-0x000000013F564000-memory.dmp xmrig behavioral1/memory/2172-155-0x000000013F1B0000-0x000000013F504000-memory.dmp xmrig behavioral1/memory/2712-156-0x000000013F5C0000-0x000000013F914000-memory.dmp xmrig behavioral1/memory/2412-157-0x000000013F500000-0x000000013F854000-memory.dmp xmrig behavioral1/memory/2360-158-0x000000013F360000-0x000000013F6B4000-memory.dmp xmrig behavioral1/memory/2484-159-0x000000013F560000-0x000000013F8B4000-memory.dmp xmrig behavioral1/memory/2068-160-0x000000013F1E0000-0x000000013F534000-memory.dmp xmrig behavioral1/memory/2464-161-0x000000013F3A0000-0x000000013F6F4000-memory.dmp xmrig behavioral1/memory/1556-162-0x000000013FD70000-0x00000001400C4000-memory.dmp xmrig behavioral1/memory/2756-163-0x000000013F6B0000-0x000000013FA04000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2632 QnkgmPu.exe 2992 gJIxvVn.exe 2472 ZOEplzu.exe 2600 cIjWuYo.exe 2480 WhonbQi.exe 2172 hApLTsa.exe 2712 lmWqawl.exe 2412 MSVIyhN.exe 2360 GyxIhbq.exe 2484 dBoeipd.exe 2068 TpRURhB.exe 2464 AbMzeIj.exe 1556 LthuHHG.exe 2756 atvmnXT.exe 1848 PcrDRov.exe 1500 jKvNOqK.exe 496 bYKCTcE.exe 2868 RLbLHoa.exe 2352 iFaQiMR.exe 1356 aocnHOY.exe 1320 EHhLXec.exe -
Loads dropped DLL 21 IoCs
pid Process 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/2108-0-0x000000013FE10000-0x0000000140164000-memory.dmp upx behavioral1/files/0x000d000000012345-3.dat upx behavioral1/memory/2632-9-0x000000013F1E0000-0x000000013F534000-memory.dmp upx behavioral1/files/0x0032000000015c4c-12.dat upx behavioral1/memory/2992-15-0x000000013FAE0000-0x000000013FE34000-memory.dmp upx behavioral1/files/0x0008000000015c93-13.dat upx behavioral1/memory/2472-21-0x000000013F730000-0x000000013FA84000-memory.dmp upx behavioral1/files/0x0007000000015c9c-22.dat upx behavioral1/memory/2600-28-0x000000013F210000-0x000000013F564000-memory.dmp upx behavioral1/files/0x0007000000015cbd-37.dat upx behavioral1/files/0x0007000000015cb0-30.dat upx behavioral1/memory/2172-43-0x000000013F1B0000-0x000000013F504000-memory.dmp upx behavioral1/memory/2480-41-0x000000013FB30000-0x000000013FE84000-memory.dmp upx behavioral1/files/0x0007000000015cce-47.dat upx behavioral1/memory/2712-50-0x000000013F5C0000-0x000000013F914000-memory.dmp upx behavioral1/memory/2412-56-0x000000013F500000-0x000000013F854000-memory.dmp upx behavioral1/files/0x000600000001654a-60.dat upx behavioral1/memory/2360-64-0x000000013F360000-0x000000013F6B4000-memory.dmp upx behavioral1/files/0x0006000000016813-75.dat upx behavioral1/memory/2484-70-0x000000013F560000-0x000000013F8B4000-memory.dmp upx behavioral1/memory/2068-78-0x000000013F1E0000-0x000000013F534000-memory.dmp upx behavioral1/files/0x0006000000016a6f-82.dat upx behavioral1/memory/2464-86-0x000000013F3A0000-0x000000013F6F4000-memory.dmp upx behavioral1/files/0x0034000000015c5a-93.dat upx behavioral1/files/0x0006000000016c1d-97.dat upx behavioral1/files/0x0006000000016c42-112.dat upx behavioral1/files/0x0006000000016cf5-132.dat upx behavioral1/files/0x0006000000016cfd-135.dat upx behavioral1/files/0x0006000000016ce4-127.dat upx behavioral1/files/0x0006000000016cb2-122.dat upx behavioral1/files/0x0006000000016c8c-117.dat upx behavioral1/memory/2172-107-0x000000013F1B0000-0x000000013F504000-memory.dmp upx behavioral1/files/0x0006000000016c3a-105.dat upx behavioral1/memory/2600-91-0x000000013F210000-0x000000013F564000-memory.dmp upx behavioral1/memory/2756-100-0x000000013F6B0000-0x000000013FA04000-memory.dmp upx behavioral1/memory/1556-99-0x000000013FD70000-0x00000001400C4000-memory.dmp upx behavioral1/memory/2472-84-0x000000013F730000-0x000000013FA84000-memory.dmp upx behavioral1/memory/2992-68-0x000000013FAE0000-0x000000013FE34000-memory.dmp upx behavioral1/files/0x00060000000165f0-67.dat upx behavioral1/memory/2108-55-0x000000013FE10000-0x0000000140164000-memory.dmp upx behavioral1/files/0x0008000000016476-53.dat upx behavioral1/memory/2412-139-0x000000013F500000-0x000000013F854000-memory.dmp upx behavioral1/memory/2484-141-0x000000013F560000-0x000000013F8B4000-memory.dmp upx behavioral1/memory/2068-143-0x000000013F1E0000-0x000000013F534000-memory.dmp upx behavioral1/memory/2464-145-0x000000013F3A0000-0x000000013F6F4000-memory.dmp upx behavioral1/memory/1556-148-0x000000013FD70000-0x00000001400C4000-memory.dmp upx behavioral1/memory/2756-149-0x000000013F6B0000-0x000000013FA04000-memory.dmp upx behavioral1/memory/2632-150-0x000000013F1E0000-0x000000013F534000-memory.dmp upx behavioral1/memory/2992-151-0x000000013FAE0000-0x000000013FE34000-memory.dmp upx behavioral1/memory/2472-152-0x000000013F730000-0x000000013FA84000-memory.dmp upx behavioral1/memory/2480-154-0x000000013FB30000-0x000000013FE84000-memory.dmp upx behavioral1/memory/2600-153-0x000000013F210000-0x000000013F564000-memory.dmp upx behavioral1/memory/2172-155-0x000000013F1B0000-0x000000013F504000-memory.dmp upx behavioral1/memory/2712-156-0x000000013F5C0000-0x000000013F914000-memory.dmp upx behavioral1/memory/2412-157-0x000000013F500000-0x000000013F854000-memory.dmp upx behavioral1/memory/2360-158-0x000000013F360000-0x000000013F6B4000-memory.dmp upx behavioral1/memory/2484-159-0x000000013F560000-0x000000013F8B4000-memory.dmp upx behavioral1/memory/2068-160-0x000000013F1E0000-0x000000013F534000-memory.dmp upx behavioral1/memory/2464-161-0x000000013F3A0000-0x000000013F6F4000-memory.dmp upx behavioral1/memory/1556-162-0x000000013FD70000-0x00000001400C4000-memory.dmp upx behavioral1/memory/2756-163-0x000000013F6B0000-0x000000013FA04000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\cIjWuYo.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\lmWqawl.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\AbMzeIj.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\PcrDRov.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\bYKCTcE.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\RLbLHoa.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\QnkgmPu.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\gJIxvVn.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\aocnHOY.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\ZOEplzu.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\TpRURhB.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\jKvNOqK.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\iFaQiMR.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\EHhLXec.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\MSVIyhN.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\dBoeipd.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\GyxIhbq.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\atvmnXT.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\LthuHHG.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\hApLTsa.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe File created C:\Windows\System\WhonbQi.exe 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe Token: SeLockMemoryPrivilege 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2632 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 29 PID 2108 wrote to memory of 2632 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 29 PID 2108 wrote to memory of 2632 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 29 PID 2108 wrote to memory of 2992 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 30 PID 2108 wrote to memory of 2992 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 30 PID 2108 wrote to memory of 2992 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 30 PID 2108 wrote to memory of 2472 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 31 PID 2108 wrote to memory of 2472 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 31 PID 2108 wrote to memory of 2472 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 31 PID 2108 wrote to memory of 2600 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 32 PID 2108 wrote to memory of 2600 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 32 PID 2108 wrote to memory of 2600 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 32 PID 2108 wrote to memory of 2172 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 33 PID 2108 wrote to memory of 2172 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 33 PID 2108 wrote to memory of 2172 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 33 PID 2108 wrote to memory of 2480 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 34 PID 2108 wrote to memory of 2480 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 34 PID 2108 wrote to memory of 2480 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 34 PID 2108 wrote to memory of 2712 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 35 PID 2108 wrote to memory of 2712 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 35 PID 2108 wrote to memory of 2712 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 35 PID 2108 wrote to memory of 2412 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 36 PID 2108 wrote to memory of 2412 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 36 PID 2108 wrote to memory of 2412 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 36 PID 2108 wrote to memory of 2360 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 37 PID 2108 wrote to memory of 2360 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 37 PID 2108 wrote to memory of 2360 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 37 PID 2108 wrote to memory of 2484 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 38 PID 2108 wrote to memory of 2484 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 38 PID 2108 wrote to memory of 2484 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 38 PID 2108 wrote to memory of 2068 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 39 PID 2108 wrote to memory of 2068 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 39 PID 2108 wrote to memory of 2068 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 39 PID 2108 wrote to memory of 2464 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 40 PID 2108 wrote to memory of 2464 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 40 PID 2108 wrote to memory of 2464 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 40 PID 2108 wrote to memory of 2756 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 41 PID 2108 wrote to memory of 2756 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 41 PID 2108 wrote to memory of 2756 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 41 PID 2108 wrote to memory of 1556 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 42 PID 2108 wrote to memory of 1556 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 42 PID 2108 wrote to memory of 1556 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 42 PID 2108 wrote to memory of 1848 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 43 PID 2108 wrote to memory of 1848 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 43 PID 2108 wrote to memory of 1848 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 43 PID 2108 wrote to memory of 1500 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 44 PID 2108 wrote to memory of 1500 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 44 PID 2108 wrote to memory of 1500 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 44 PID 2108 wrote to memory of 496 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 45 PID 2108 wrote to memory of 496 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 45 PID 2108 wrote to memory of 496 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 45 PID 2108 wrote to memory of 2868 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 46 PID 2108 wrote to memory of 2868 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 46 PID 2108 wrote to memory of 2868 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 46 PID 2108 wrote to memory of 2352 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 47 PID 2108 wrote to memory of 2352 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 47 PID 2108 wrote to memory of 2352 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 47 PID 2108 wrote to memory of 1356 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 48 PID 2108 wrote to memory of 1356 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 48 PID 2108 wrote to memory of 1356 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 48 PID 2108 wrote to memory of 1320 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 49 PID 2108 wrote to memory of 1320 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 49 PID 2108 wrote to memory of 1320 2108 31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\31a87d131824685f777c39e90b336a30_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\System\QnkgmPu.exeC:\Windows\System\QnkgmPu.exe2⤵
- Executes dropped EXE
PID:2632
-
-
C:\Windows\System\gJIxvVn.exeC:\Windows\System\gJIxvVn.exe2⤵
- Executes dropped EXE
PID:2992
-
-
C:\Windows\System\ZOEplzu.exeC:\Windows\System\ZOEplzu.exe2⤵
- Executes dropped EXE
PID:2472
-
-
C:\Windows\System\cIjWuYo.exeC:\Windows\System\cIjWuYo.exe2⤵
- Executes dropped EXE
PID:2600
-
-
C:\Windows\System\hApLTsa.exeC:\Windows\System\hApLTsa.exe2⤵
- Executes dropped EXE
PID:2172
-
-
C:\Windows\System\WhonbQi.exeC:\Windows\System\WhonbQi.exe2⤵
- Executes dropped EXE
PID:2480
-
-
C:\Windows\System\lmWqawl.exeC:\Windows\System\lmWqawl.exe2⤵
- Executes dropped EXE
PID:2712
-
-
C:\Windows\System\MSVIyhN.exeC:\Windows\System\MSVIyhN.exe2⤵
- Executes dropped EXE
PID:2412
-
-
C:\Windows\System\GyxIhbq.exeC:\Windows\System\GyxIhbq.exe2⤵
- Executes dropped EXE
PID:2360
-
-
C:\Windows\System\dBoeipd.exeC:\Windows\System\dBoeipd.exe2⤵
- Executes dropped EXE
PID:2484
-
-
C:\Windows\System\TpRURhB.exeC:\Windows\System\TpRURhB.exe2⤵
- Executes dropped EXE
PID:2068
-
-
C:\Windows\System\AbMzeIj.exeC:\Windows\System\AbMzeIj.exe2⤵
- Executes dropped EXE
PID:2464
-
-
C:\Windows\System\atvmnXT.exeC:\Windows\System\atvmnXT.exe2⤵
- Executes dropped EXE
PID:2756
-
-
C:\Windows\System\LthuHHG.exeC:\Windows\System\LthuHHG.exe2⤵
- Executes dropped EXE
PID:1556
-
-
C:\Windows\System\PcrDRov.exeC:\Windows\System\PcrDRov.exe2⤵
- Executes dropped EXE
PID:1848
-
-
C:\Windows\System\jKvNOqK.exeC:\Windows\System\jKvNOqK.exe2⤵
- Executes dropped EXE
PID:1500
-
-
C:\Windows\System\bYKCTcE.exeC:\Windows\System\bYKCTcE.exe2⤵
- Executes dropped EXE
PID:496
-
-
C:\Windows\System\RLbLHoa.exeC:\Windows\System\RLbLHoa.exe2⤵
- Executes dropped EXE
PID:2868
-
-
C:\Windows\System\iFaQiMR.exeC:\Windows\System\iFaQiMR.exe2⤵
- Executes dropped EXE
PID:2352
-
-
C:\Windows\System\aocnHOY.exeC:\Windows\System\aocnHOY.exe2⤵
- Executes dropped EXE
PID:1356
-
-
C:\Windows\System\EHhLXec.exeC:\Windows\System\EHhLXec.exe2⤵
- Executes dropped EXE
PID:1320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD5b6eb0c2a49c2dcd7008ded1581e1560b
SHA14ca0f8b841b4aeea1ae7bfb0cd2feec231875a86
SHA256fcff6d35e55e5c521741febc295c2a94ff2b4cfa474579a4dbbb33928aaa2592
SHA512fe9067dc33b73921deccfc21ac915d567cadea3597c384b81b92ac08731f8e9236329435e253c31ae3210e6a36aaa9a9cc5147aebbb6efdbd0b8c09a073b5a83
-
Filesize
5.9MB
MD5ddcc38ce266e8d69e6ffd82ed0bbd5b6
SHA1ebbf52cffe9e0f16264adbd5ee28bcaf57ad02f0
SHA256d9505bd44aaf4cc38f5e324fbc9fbf82e42fd97899607d15f266a6d078babbb5
SHA512d09338bcd7c1d7345be22fe2ff23e023ec63d206979adcd430d9b42bd85c30e8432bd23840e3268a661d0ba4c885192c38e9463b23c8619d562caa2ae5e88459
-
Filesize
5.9MB
MD5ad00b1990c05d79053e6d7d3ae8a0bd8
SHA18a6490327a1cdec869fa7e8ff082d1564ea9b079
SHA256d8443b2c2c7377c0962fc1203d50a5b178613364edac82a26cd3bc5f4409833d
SHA51214262dad8792e0df256b92a4e1999b485ca8b96a6da95270b51cc8914d9ba24c3e68667e34dc612b9a003cc70c2c4a1e66ffbe6e5dd33604ea60a7644bcad5ba
-
Filesize
5.9MB
MD54dd0e45eb2caae6f809894bd7c451ec6
SHA10de1597ab1b66e99c190c2bb0747d90ce901c41f
SHA256911fb00c3c0cccb52a55884a1b10fc43759e8e9c2f6836aa2331145bcfc9e4de
SHA512b83ee39cd76327f8ec770ed73b9bcfd2de9acea24a43c3607222c7a055cee7241ce5f36207f6f40cca8151b13c0e031418074bb3899b9b94c961e0a0aa3a70e0
-
Filesize
5.9MB
MD5441729e764ad5ae471ef076a97cbfcc6
SHA10dff9df543746fe10c77f2a8a243d35428511491
SHA25659a9ecfc6733bb9e4d33f196f53753a70878ca9c021c60049ad99a99c737d762
SHA51262cb63717e07507be474adbd12b3037171728bf28ccec7a2151746872b776c6e56640d4106524964e9ecffdfa024edc746174145ad4fbbd547545e73a94e8c85
-
Filesize
5.9MB
MD5a3017461df0c3dafaef421f36cc84756
SHA151a16420cf57b0352fd438f232e71027a6f87bcf
SHA256517e4babd8509158154915f338e054445f4a6a3acdcc775a33e0662b246a049d
SHA51220bc044586288699ce76fc673bfa2ebf62106b271ced93df7b669791ff972d53e6347463ee8553e1df76cf039e3c2cda3dc463c9580fd90386b3b6d4fb84d09a
-
Filesize
5.9MB
MD5a271a41e357e56ff12fd0f8abbdbcb78
SHA1369a2902c7fdd7d64a58acd64b7af0124ae4d0e8
SHA2566502e82049b15006192c36cd14a9392e16a8bba660ae3df9202e80caa5ba68cd
SHA5125bdff8414ee046b9017554410165a4c5285132bf418b7c34e8dee0f9820287034d38b71555c0222be89b6bb894856656c95ea45b39d453a9ac703a61e5a2496f
-
Filesize
5.9MB
MD5c4fc8484dec3943ce1d46bfbd5d8aef6
SHA1bc30aa89898186ae0aab9d38021a374bf2c4a1fa
SHA256562567f9a89f1e9613a933fb3a6851cd9ef6d9fc05b7459300d19a11dc7b260c
SHA512872864e13f8af7af481810e583d0ffebc5b6c468c009598499d1abb061cfc2a4b70de2d3b46f586af95deaabb1f5791138da2ce6ddd7f5a8b88409d7fbf428c1
-
Filesize
5.9MB
MD586c84b4c877817ca2ec1f8b0cc814562
SHA1cdb60928c023c6f9881e1e582a02e0f06f48b798
SHA256c6c2d5ac6d049a7115db67a32f2e01eff671351d7def5130d17cb8d282b1d009
SHA5128272178ddacbddc9006a3d72b3754ab2fdfdb0fa85dffbef2ed82a3bcbadcc7fa00c5b34a82a19ee67db434e354f495c6e13fa200b7967bbafcab805868ccf37
-
Filesize
5.9MB
MD5376a2a8ca77158dc4c361bc2bcbfafe3
SHA1f560dce7c8392e75da5589f08ed059595c1501dd
SHA2567850da22ddfa94a3f05083f230711deced09ab29afc943bf255f84fed424fe69
SHA5123b42a9e58d0ded15c6669e200a65c4318780593dd7b7c2c71c2957b635e3b33582f6e8f5e973c22cf4862b9b6038cd7429c9a026aa2929285e1b565f81ef4843
-
Filesize
5.9MB
MD53c0b5fe5125903c9fd7e19d25979d192
SHA15385c8bd57bde25fc2953af23941d89427e11f86
SHA256053298679534801a15cce064a4426b0a55dabf0c15c6e1a5d0db9b91e8a8cff5
SHA5120eaab94553a7f2b311294f1ee4bade7e33daf3aee42605beb34e72a52a72ced202db1ae052f5ae3aeb42dab17719352b619283f04f062a260d36fba920fc7700
-
Filesize
5.9MB
MD5b7b5ef965f7ccdecd241a9c830db726d
SHA1300710f0d6f05d6ea2bc85727d5c5ef6897f3f12
SHA256a43522aadaff8498abc2fdc99d907309aa9654699ba6860abc2f4faad20c2c9a
SHA512e73dc32333c9bd20ac6bae6b7c3269a0ec2e6984b770349966f68655d856294da8f029ac36f7ed8b460bff90d2a120e1e7b62872c10fc1a4a7df73b92fa6d228
-
Filesize
5.9MB
MD5c2a5e25326a363d8684f9a611c27cd21
SHA1b42378632c3c23e8fe39db9bc384d4a521fe5919
SHA256ba8b15fdf7797ea54d866ad2b371da046a0ead4cba490cc76f21ac324a69283d
SHA5126c87b5384a40043607848c9d4e077d5e7153daa16ce5e4aaa85bb6bead04c40b599f4827ce5174353022801ccb987d4d1e48c6cac89d1f7fcc144a43170bd56e
-
Filesize
5.9MB
MD5887275565c060e75a963c998152108b1
SHA133b51e8aaf08ad47020ae9974b47d8e4d56e8a7b
SHA256b95ffebe1d4181439db1b8a87337e68df8c6a7494deac17aef25e552ce6f9451
SHA51271886ab5a8b8d493de342f5512dc6ecd5cf9c9028686feeb6d316da953566f357b6377e7992b77b81b5a53a431ed5c21ee7b43f458f4ec56b6d0e9451e4641f0
-
Filesize
5.9MB
MD51e7c22720a24ea56aa03f11c4c343081
SHA15d331e295ea28100f0c110ab2342e52457239b1a
SHA256206c464cab669985ba32055190bc19ccbfa83ecae7edb7f8ebcde7689c86fbad
SHA5124d5b168cd2272ce91add890e1ffacb25c3948c74cc0946c913075556e40dd6024233132c839e81786eaec601100ff321c00bad6bb1a7cc9d24c2ad08db0b903e
-
Filesize
5.9MB
MD52d084826b600303bf4098c66deff2acc
SHA12a75bdc0cd3cf9c8095f139ea191a35d890338f3
SHA2568e8ce7577c563fc005b7b03a95c4d5a386003eee7f49fe96c2c261c3014fecea
SHA5121fc70de976b4927cd71f363ece138140d2abb77c376fdd1fe4121743530fed3f754e7ba02aa69dcefff9338f232d87232e831c5d1d41225c1a1c49e96e281cb2
-
Filesize
5.9MB
MD5e34e5bac340e0ab7d4e159a1a2ad067e
SHA1c9e402a131d452383929c8a3496c87ecb3d49b88
SHA2569d98c1904f1baf596f71209b806f38854d2ef95a522bfac4f382ff1acf1d307a
SHA512c9aaba6f489eb4efe7dc5ec4326acb5cc7d5ef0558c3c5b0c5cdca08ac01be12f8321c07339fb79e833405b1f6cfb47cc251384173bcf6c45493b651fac1c48b
-
Filesize
5.9MB
MD5e3ee4d5a8bb6c19073ff834a6d958f0a
SHA16028babeabf1e0837e23e126d4bbe3ebcbf83704
SHA2560a10e392a38509043fb50664043bbf82f85aa17fe2ffd00b2afe2d3fa31cbdab
SHA5129c40241dea43d13dcdf15731f1afd45c7b14cdd27422380c086dee8bd7b0872e4def961ac4a32c94aa0e544c054d537ae657d471a66d730669967da877e4c0cb
-
Filesize
5.9MB
MD51dd0603791678bb6c263489ee71bfcdf
SHA104c57752edd5ddc13d982e73de2ecc7abb47a0bc
SHA256246d531f58f40a4c590c1d8d44ad017cdaf694d5b08f8fd736bfa08d0be18482
SHA512acedeeee59830baa07ad436492daf2b15e681e87a83e3daa2faa40cfd66d1291f5a10dd5c8f0cfbd7d1924a26ba159196b0c6eac8b81c7fbf6eb25772d73ecb5
-
Filesize
5.9MB
MD5697083a22faa9e91df608ebf3ff2f67e
SHA14a97e80321921ef308d49b4ff7c4bba650b4df2f
SHA256f927a16718e5bc7d5a8e7faf5d55f5c4ced196365ed6ec0a0c8d895efc03c000
SHA5121284a8655cd32fc4b281f57f9e11f271c4a86df7d28a43510707f74f5db856d64ac4e5803013fa46bdca3803f7b0dd3356865ea4a387e2759d97d2a580fb217c
-
Filesize
5.9MB
MD584299a80a6dda0e09cdce3bd2018cf9f
SHA14b51e70d971a2020ca07e9b61603293a63363817
SHA2563b0ca9a302a7b711cf451b5250396bb3ed231d5257c6464838f7f27c555aa170
SHA512ea69fe8ee98e720b6a38cea414df892d7a70beec7f76f8f1c78be508b81292e4ea0e3287ddb8f7bebbae832ad4cb7f11d82be0b61eb5a6b83a46c2aa65e4aee1