Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 06:40
Behavioral task
behavioral1
Sample
48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
48fac557f8d1f09daf97b2e433fb27c0
-
SHA1
b311cbdf022aee4f23e939667004f437a1d58cbe
-
SHA256
517fd556114cb8281cea66eea54753fb04e219bfe86aa07e06917501aa3071be
-
SHA512
b6eb7022904ccfd6c5efa37fd81897a2a1311f5e5e57f110ff49180f9d2835a508b9e7975eb6ce84284f91bf8ea6fd198ede0593271f81f2ea128ac911c30c1a
-
SSDEEP
12288:El+4Tcyct/JWT7yckBlepmbMsBXYHOWyAh5+djVyKDGpiRe7FaS+ug82qGeJ3btU:Zyc5JWackYm7dZ1Oq2nn2qPJ3btV3+f
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 33 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2504 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2524 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2732 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2884 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2428 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2712 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2564 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2388 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2456 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2840 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2516 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 680 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1548 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1540 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 744 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1232 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1996 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2008 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1944 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2332 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 916 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1752 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2636 2804 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2452 2804 schtasks.exe 28 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/1612-1-0x0000000001350000-0x0000000001470000-memory.dmp dcrat behavioral1/files/0x0006000000016b96-17.dat dcrat behavioral1/files/0x0006000000019333-67.dat dcrat behavioral1/files/0x000c000000016b96-137.dat dcrat behavioral1/files/0x000a000000016cf0-160.dat dcrat behavioral1/memory/2052-180-0x0000000000FC0000-0x00000000010E0000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1624 powershell.exe 2260 powershell.exe 2232 powershell.exe 1696 powershell.exe 1508 powershell.exe 2240 powershell.exe 2252 powershell.exe 2860 powershell.exe 2764 powershell.exe 1580 powershell.exe 1584 powershell.exe 2476 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 2052 explorer.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\winlogon.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\RCX9630.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\RCXA3C3.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\RCX8EEA.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Internet Explorer\RCX9854.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\RCX9AD5.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Program Files (x86)\Internet Explorer\5940a34987c991 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Program Files\Windows Media Player\Network Sharing\c5b4cb5e9653cc 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\services.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\smss.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\RCXA3C4.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\7a0fd90576e088 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\winlogon.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\RCX8EE9.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\RCX9620.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\RCX9AE6.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\winlogon.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Program Files\Windows Media Player\Network Sharing\services.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Internet Explorer\RCX9844.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\cc11b995f2a76d 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\explorer.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\cc11b995f2a76d 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\explorer.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Program Files (x86)\Internet Explorer\dllhost.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Internet Explorer\dllhost.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\winlogon.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe -
Drops file in Windows directory 20 IoCs
description ioc Process File created C:\Windows\DigitalLocker\ja-JP\dllhost.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Windows\security\logs\c5b4cb5e9653cc 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Windows\PolicyDefinitions\en-US\audiodg.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Windows\security\logs\RCX93FD.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Windows\PolicyDefinitions\en-US\RCXA5D7.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Windows\DigitalLocker\ja-JP\5940a34987c991 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Windows\security\logs\services.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Windows\Registration\CRMLog\7a0fd90576e088 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Windows\DigitalLocker\ja-JP\RCX916B.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Windows\Registration\CRMLog\explorer.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Windows\DigitalLocker\ja-JP\dllhost.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Windows\Registration\CRMLog\RCXA131.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Windows\Registration\CRMLog\RCXA1AF.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Windows\PolicyDefinitions\en-US\RCXA655.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Windows\Registration\CRMLog\explorer.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File created C:\Windows\PolicyDefinitions\en-US\42af1c969fbb7b 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Windows\DigitalLocker\ja-JP\RCX917B.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Windows\security\logs\RCX937F.tmp 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Windows\security\logs\services.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe File opened for modification C:\Windows\PolicyDefinitions\en-US\audiodg.exe 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 33 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 916 schtasks.exe 2452 schtasks.exe 2732 schtasks.exe 2712 schtasks.exe 2828 schtasks.exe 680 schtasks.exe 2372 schtasks.exe 1628 schtasks.exe 2612 schtasks.exe 2564 schtasks.exe 2456 schtasks.exe 1548 schtasks.exe 1632 schtasks.exe 2504 schtasks.exe 2524 schtasks.exe 2884 schtasks.exe 2428 schtasks.exe 1540 schtasks.exe 2332 schtasks.exe 2008 schtasks.exe 1752 schtasks.exe 2636 schtasks.exe 1600 schtasks.exe 1944 schtasks.exe 2388 schtasks.exe 2344 schtasks.exe 2324 schtasks.exe 1232 schtasks.exe 1996 schtasks.exe 1740 schtasks.exe 2840 schtasks.exe 2516 schtasks.exe 744 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 2252 powershell.exe 2860 powershell.exe 2476 powershell.exe 1696 powershell.exe 2232 powershell.exe 2260 powershell.exe 1584 powershell.exe 1580 powershell.exe 1508 powershell.exe 1624 powershell.exe 2240 powershell.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe Token: SeDebugPrivilege 2052 explorer.exe Token: SeDebugPrivilege 2252 powershell.exe Token: SeDebugPrivilege 1508 powershell.exe Token: SeDebugPrivilege 2860 powershell.exe Token: SeDebugPrivilege 2476 powershell.exe Token: SeDebugPrivilege 1696 powershell.exe Token: SeDebugPrivilege 2232 powershell.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 1584 powershell.exe Token: SeDebugPrivilege 1580 powershell.exe Token: SeDebugPrivilege 1624 powershell.exe Token: SeDebugPrivilege 2240 powershell.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2860 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 62 PID 1612 wrote to memory of 2860 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 62 PID 1612 wrote to memory of 2860 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 62 PID 1612 wrote to memory of 1624 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 63 PID 1612 wrote to memory of 1624 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 63 PID 1612 wrote to memory of 1624 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 63 PID 1612 wrote to memory of 2260 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 65 PID 1612 wrote to memory of 2260 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 65 PID 1612 wrote to memory of 2260 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 65 PID 1612 wrote to memory of 2764 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 66 PID 1612 wrote to memory of 2764 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 66 PID 1612 wrote to memory of 2764 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 66 PID 1612 wrote to memory of 1580 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 67 PID 1612 wrote to memory of 1580 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 67 PID 1612 wrote to memory of 1580 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 67 PID 1612 wrote to memory of 1584 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 68 PID 1612 wrote to memory of 1584 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 68 PID 1612 wrote to memory of 1584 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 68 PID 1612 wrote to memory of 1696 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 69 PID 1612 wrote to memory of 1696 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 69 PID 1612 wrote to memory of 1696 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 69 PID 1612 wrote to memory of 1508 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 70 PID 1612 wrote to memory of 1508 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 70 PID 1612 wrote to memory of 1508 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 70 PID 1612 wrote to memory of 2240 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 71 PID 1612 wrote to memory of 2240 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 71 PID 1612 wrote to memory of 2240 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 71 PID 1612 wrote to memory of 2232 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 72 PID 1612 wrote to memory of 2232 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 72 PID 1612 wrote to memory of 2232 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 72 PID 1612 wrote to memory of 2252 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 73 PID 1612 wrote to memory of 2252 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 73 PID 1612 wrote to memory of 2252 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 73 PID 1612 wrote to memory of 2476 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 74 PID 1612 wrote to memory of 2476 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 74 PID 1612 wrote to memory of 2476 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 74 PID 1612 wrote to memory of 2052 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 86 PID 1612 wrote to memory of 2052 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 86 PID 1612 wrote to memory of 2052 1612 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe 86 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\48fac557f8d1f09daf97b2e433fb27c0NeikiAnalytics.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1612 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'2⤵
- Command and Scripting Interpreter: PowerShell
PID:2764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\logs\explorer.exe"C:\Program Files (x86)\Mozilla Maintenance Service\logs\explorer.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\DigitalLocker\ja-JP\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\DigitalLocker\ja-JP\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Windows\DigitalLocker\ja-JP\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Windows\security\logs\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\security\logs\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Windows\security\logs\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2456
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2840
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Internet Explorer\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Internet Explorer\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Media Player\Network Sharing\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\Network Sharing\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Media Player\Network Sharing\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Windows\Registration\CRMLog\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\Registration\CRMLog\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Windows\Registration\CRMLog\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Windows\PolicyDefinitions\en-US\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\en-US\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2636
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Windows\PolicyDefinitions\en-US\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2452
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD548fac557f8d1f09daf97b2e433fb27c0
SHA1b311cbdf022aee4f23e939667004f437a1d58cbe
SHA256517fd556114cb8281cea66eea54753fb04e219bfe86aa07e06917501aa3071be
SHA512b6eb7022904ccfd6c5efa37fd81897a2a1311f5e5e57f110ff49180f9d2835a508b9e7975eb6ce84284f91bf8ea6fd198ede0593271f81f2ea128ac911c30c1a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD54245cbfebfe8b6678b1ab0689e4a8ede
SHA1441381b187c56997818e9919f31d4736be5f75bc
SHA256bd22c7ec5960f36e17baa713242ace74272c5af625bc68557d93426b993fbc43
SHA512ee38407335fb8a00fea4f32013c87440d7b706f51be46a20fe08632090958f9105e93efd6bf3d6b48be96517a89902590fade046b6a18858e6e2435bee66b97b
-
Filesize
1.1MB
MD5834fa577560f01a67ff9774ab0abdfbd
SHA1ad931010ce83f37fe509a65643aed2fd6de92061
SHA2561aee4e3ba258352ee51d3a914001861cfa2ebb0d0e48f389cdefa86511f9325d
SHA5127a6c146b0d569f94ec4f33bd7dcb1f0abda903cbb55bccfd7cacdecbfac8b59ce781a8ff64830006105350058f3089eb55aebb1e3148a0c7a9ac917e8a732648
-
Filesize
1.1MB
MD56a1359042cb63241121a132b2f55d458
SHA199258fc5b7a8c49c959e5afb7d75686e5231bf0a
SHA256ea333d31a9444c5a8ff09498a841ac1bbd99d24ed33f637fe40a7e37cef002ef
SHA512442f501e17d6cad0d5d5106953dfb87248e7ef5616f083df04d522f92f688f00c4691c91d47df66a252c4d4861343898be38fb6094afedfb246e3a3a949ade97
-
Filesize
1.1MB
MD535ac5caa43846b0bb2c33ad13ee62cdf
SHA1033da01135e71dae199649a030304abd89a45881
SHA25687f334caee5785207bd9722c84722ddee0914f5ac55fd53eff8428f796363685
SHA51219f0e82135e86774cd0036ac51f21a2b0be8ad3bc40202438a72fb4c0a32d2293cf4b94f70df982e67c3193a5ac6aea9ede68194784e6bbf991359e6ab8546f4