Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 19:00
Static task
static1
Behavioral task
behavioral1
Sample
15dea671d174ad4388c357470163e820_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
15dea671d174ad4388c357470163e820_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
15dea671d174ad4388c357470163e820_NeikiAnalytics.exe
-
Size
69KB
-
MD5
15dea671d174ad4388c357470163e820
-
SHA1
2f65120f3f3179ce8bd78c5b14b972d5334dd4c1
-
SHA256
1265096a4e621d68a699dcb346236c797fd9478e3005d7c5656f862ada52a591
-
SHA512
ba9a509f22efc5e496f71a5ff251670591925efd9bb8a60605fac0cb799d8a08f7572abe154cbea8c3e0881faf019bbb7953915faac2906f5705f2a4d7f412f9
-
SSDEEP
768:dCNP88+hq2G/IS6nItuJDpbyVQH+8axkqolPDKjBPbgl/7mfzd0T+u1:k18PZ7JItMl8QxaM12jO1A0TF
Malware Config
Extracted
C:\Program Files (x86)\readme.txt
conti
http://contirec7nchr45rx6ympez5rjldibnqzh7lsa56lvjvaeywhvoj3wad.onion/jehZ00C9PrzdBeD0vmBk8EYUAmCctYHBJazVJraQGUMWmkWoaDUcndRgCHzKGsz5
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Renames multiple (7932) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 46 IoCs
Processes:
15dea671d174ad4388c357470163e820_NeikiAnalytics.exedescription ioc process File opened for modification C:\Users\Admin\Saved Games\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\Links\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\Music\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Public\Documents\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Public\Music\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\BP3UABCB\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Public\Videos\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\27PKR52P\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Public\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\0U93YK0N\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\FW0P2MZH\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
Processes:
15dea671d174ad4388c357470163e820_NeikiAnalytics.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ms.pak 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\readme.txt 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\DVD Maker\bod_r.TTF 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01044_.WMF 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01069_.WMF 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0216724.WMF 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\readme.txt 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationLeft_ButtonGraphic.png 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\readme.txt 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.components.ui.zh_CN_5.5.0.165303.jar 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\WhiteboxMask.bmp 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SPRNG_01.MID 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derby.jar 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\sunmscapi.jar 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\EST5EDT 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\ICE.INF 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Nome 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-host.xml 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\HEADINGBB.POC 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\readme.txt 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\readme.txt 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-loaders_zh_CN.jar 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\RestartEdit.odp 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDIRM.XML 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\ACCSBAR.POC 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BZCRD98.POC 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Palau 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay.css 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSN.ICO 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341559.JPG 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\win32_MoveNoDrop32x32.gif 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Moscow 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Austin.xml 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Dot.png 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\readme.txt 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR9B.GIF 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\lv.pak 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Maldives 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0145168.JPG 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0227558.JPG 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\cli.luac 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21433_.GIF 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382966.JPG 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\StopIconMask.bmp 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-javahelp_ja.jar 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\javax.el_2.2.0.v201303151357.jar 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Belgrade 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\feature.xml 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler_zh_CN.jar 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Elemental.thmx 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_ButtonGraphic.png 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD15072_.GIF 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_SlateBlue.gif 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Tongatapu 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\org-openide-util.jar 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsScenesBackground.wmv 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\TravelIntroToMain.wmv 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME10.CSS 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.nl_zh_4.4.0.v20140623020002.jar 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\readme.txt 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File created C:\Program Files\Common Files\System\en-US\readme.txt 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\readme.txt 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WZCNFLCT.CHM 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\kn.pak 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
15dea671d174ad4388c357470163e820_NeikiAnalytics.exepid process 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
vssvc.exeWMIC.exeWMIC.exedescription pid process Token: SeBackupPrivilege 2008 vssvc.exe Token: SeRestorePrivilege 2008 vssvc.exe Token: SeAuditPrivilege 2008 vssvc.exe Token: SeIncreaseQuotaPrivilege 2584 WMIC.exe Token: SeSecurityPrivilege 2584 WMIC.exe Token: SeTakeOwnershipPrivilege 2584 WMIC.exe Token: SeLoadDriverPrivilege 2584 WMIC.exe Token: SeSystemProfilePrivilege 2584 WMIC.exe Token: SeSystemtimePrivilege 2584 WMIC.exe Token: SeProfSingleProcessPrivilege 2584 WMIC.exe Token: SeIncBasePriorityPrivilege 2584 WMIC.exe Token: SeCreatePagefilePrivilege 2584 WMIC.exe Token: SeBackupPrivilege 2584 WMIC.exe Token: SeRestorePrivilege 2584 WMIC.exe Token: SeShutdownPrivilege 2584 WMIC.exe Token: SeDebugPrivilege 2584 WMIC.exe Token: SeSystemEnvironmentPrivilege 2584 WMIC.exe Token: SeRemoteShutdownPrivilege 2584 WMIC.exe Token: SeUndockPrivilege 2584 WMIC.exe Token: SeManageVolumePrivilege 2584 WMIC.exe Token: 33 2584 WMIC.exe Token: 34 2584 WMIC.exe Token: 35 2584 WMIC.exe Token: SeIncreaseQuotaPrivilege 2584 WMIC.exe Token: SeSecurityPrivilege 2584 WMIC.exe Token: SeTakeOwnershipPrivilege 2584 WMIC.exe Token: SeLoadDriverPrivilege 2584 WMIC.exe Token: SeSystemProfilePrivilege 2584 WMIC.exe Token: SeSystemtimePrivilege 2584 WMIC.exe Token: SeProfSingleProcessPrivilege 2584 WMIC.exe Token: SeIncBasePriorityPrivilege 2584 WMIC.exe Token: SeCreatePagefilePrivilege 2584 WMIC.exe Token: SeBackupPrivilege 2584 WMIC.exe Token: SeRestorePrivilege 2584 WMIC.exe Token: SeShutdownPrivilege 2584 WMIC.exe Token: SeDebugPrivilege 2584 WMIC.exe Token: SeSystemEnvironmentPrivilege 2584 WMIC.exe Token: SeRemoteShutdownPrivilege 2584 WMIC.exe Token: SeUndockPrivilege 2584 WMIC.exe Token: SeManageVolumePrivilege 2584 WMIC.exe Token: 33 2584 WMIC.exe Token: 34 2584 WMIC.exe Token: 35 2584 WMIC.exe Token: SeIncreaseQuotaPrivilege 2800 WMIC.exe Token: SeSecurityPrivilege 2800 WMIC.exe Token: SeTakeOwnershipPrivilege 2800 WMIC.exe Token: SeLoadDriverPrivilege 2800 WMIC.exe Token: SeSystemProfilePrivilege 2800 WMIC.exe Token: SeSystemtimePrivilege 2800 WMIC.exe Token: SeProfSingleProcessPrivilege 2800 WMIC.exe Token: SeIncBasePriorityPrivilege 2800 WMIC.exe Token: SeCreatePagefilePrivilege 2800 WMIC.exe Token: SeBackupPrivilege 2800 WMIC.exe Token: SeRestorePrivilege 2800 WMIC.exe Token: SeShutdownPrivilege 2800 WMIC.exe Token: SeDebugPrivilege 2800 WMIC.exe Token: SeSystemEnvironmentPrivilege 2800 WMIC.exe Token: SeRemoteShutdownPrivilege 2800 WMIC.exe Token: SeUndockPrivilege 2800 WMIC.exe Token: SeManageVolumePrivilege 2800 WMIC.exe Token: 33 2800 WMIC.exe Token: 34 2800 WMIC.exe Token: 35 2800 WMIC.exe Token: SeIncreaseQuotaPrivilege 2800 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
15dea671d174ad4388c357470163e820_NeikiAnalytics.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1972 wrote to memory of 2648 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2648 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2648 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2648 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 2648 wrote to memory of 2584 2648 cmd.exe WMIC.exe PID 2648 wrote to memory of 2584 2648 cmd.exe WMIC.exe PID 2648 wrote to memory of 2584 2648 cmd.exe WMIC.exe PID 1972 wrote to memory of 2440 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2440 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2440 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2440 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 2440 wrote to memory of 2800 2440 cmd.exe WMIC.exe PID 2440 wrote to memory of 2800 2440 cmd.exe WMIC.exe PID 2440 wrote to memory of 2800 2440 cmd.exe WMIC.exe PID 1972 wrote to memory of 2456 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2456 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2456 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2456 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 2456 wrote to memory of 1048 2456 cmd.exe WMIC.exe PID 2456 wrote to memory of 1048 2456 cmd.exe WMIC.exe PID 2456 wrote to memory of 1048 2456 cmd.exe WMIC.exe PID 1972 wrote to memory of 2544 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2544 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2544 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2544 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 2544 wrote to memory of 2444 2544 cmd.exe WMIC.exe PID 2544 wrote to memory of 2444 2544 cmd.exe WMIC.exe PID 2544 wrote to memory of 2444 2544 cmd.exe WMIC.exe PID 1972 wrote to memory of 2752 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2752 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2752 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2752 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 2752 wrote to memory of 2880 2752 cmd.exe WMIC.exe PID 2752 wrote to memory of 2880 2752 cmd.exe WMIC.exe PID 2752 wrote to memory of 2880 2752 cmd.exe WMIC.exe PID 1972 wrote to memory of 2896 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2896 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2896 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2896 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 2896 wrote to memory of 1804 2896 cmd.exe WMIC.exe PID 2896 wrote to memory of 1804 2896 cmd.exe WMIC.exe PID 2896 wrote to memory of 1804 2896 cmd.exe WMIC.exe PID 1972 wrote to memory of 2680 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2680 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2680 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2680 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 2680 wrote to memory of 1108 2680 cmd.exe WMIC.exe PID 2680 wrote to memory of 1108 2680 cmd.exe WMIC.exe PID 2680 wrote to memory of 1108 2680 cmd.exe WMIC.exe PID 1972 wrote to memory of 2420 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2420 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2420 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 2420 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 2420 wrote to memory of 1996 2420 cmd.exe WMIC.exe PID 2420 wrote to memory of 1996 2420 cmd.exe WMIC.exe PID 2420 wrote to memory of 1996 2420 cmd.exe WMIC.exe PID 1972 wrote to memory of 1916 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 1916 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 1916 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1972 wrote to memory of 1916 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe PID 1916 wrote to memory of 1612 1916 cmd.exe WMIC.exe PID 1916 wrote to memory of 1612 1916 cmd.exe WMIC.exe PID 1916 wrote to memory of 1612 1916 cmd.exe WMIC.exe PID 1972 wrote to memory of 2784 1972 15dea671d174ad4388c357470163e820_NeikiAnalytics.exe cmd.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\15dea671d174ad4388c357470163e820_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\15dea671d174ad4388c357470163e820_NeikiAnalytics.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2DF73169-0006-4B2B-804B-E7F9259F305A}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2DF73169-0006-4B2B-804B-E7F9259F305A}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8D118557-05F4-49D2-92FD-D77C41B32532}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8D118557-05F4-49D2-92FD-D77C41B32532}'" delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{3467631B-5862-4A7E-8AAC-24ABEF4F5D6D}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{3467631B-5862-4A7E-8AAC-24ABEF4F5D6D}'" delete3⤵PID:1048
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8608DE0E-5675-4B3F-94F0-C764B306DAE5}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8608DE0E-5675-4B3F-94F0-C764B306DAE5}'" delete3⤵PID:2444
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F2CB1E0D-169E-498E-9157-512BECF0FF2F}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F2CB1E0D-169E-498E-9157-512BECF0FF2F}'" delete3⤵PID:2880
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7768B8FC-6054-41AA-840C-9ADB88BF3499}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7768B8FC-6054-41AA-840C-9ADB88BF3499}'" delete3⤵PID:1804
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{286949DC-EE30-4DC2-B6A7-FAADE546F8DC}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{286949DC-EE30-4DC2-B6A7-FAADE546F8DC}'" delete3⤵PID:1108
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C66759AF-7139-4DDE-82CF-D8D11D725CCE}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C66759AF-7139-4DDE-82CF-D8D11D725CCE}'" delete3⤵PID:1996
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0A76AABD-ED40-4C9F-BBB9-88C6F6146F31}'" delete2⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0A76AABD-ED40-4C9F-BBB9-88C6F6146F31}'" delete3⤵PID:1612
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{ACDEAC0C-97C8-4D5F-AA2E-0E231060C58B}'" delete2⤵PID:2784
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{ACDEAC0C-97C8-4D5F-AA2E-0E231060C58B}'" delete3⤵PID:2768
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4E55A2AC-5B7E-4895-A99B-F6D62019BC9D}'" delete2⤵PID:1656
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4E55A2AC-5B7E-4895-A99B-F6D62019BC9D}'" delete3⤵PID:1212
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{07BBA1F1-147D-428F-A19A-73C7A4A54BD0}'" delete2⤵PID:2056
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{07BBA1F1-147D-428F-A19A-73C7A4A54BD0}'" delete3⤵PID:2528
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8F5643F0-3CFF-4025-B03A-AEEF5E772C2F}'" delete2⤵PID:2076
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8F5643F0-3CFF-4025-B03A-AEEF5E772C2F}'" delete3⤵PID:1688
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{07583FE6-8F70-40F5-ABF4-AF27DF159CB2}'" delete2⤵PID:1076
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{07583FE6-8F70-40F5-ABF4-AF27DF159CB2}'" delete3⤵PID:324
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{EF669869-899E-4911-9280-F4C0A343936C}'" delete2⤵PID:616
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{EF669869-899E-4911-9280-F4C0A343936C}'" delete3⤵PID:112
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{89DAC8CF-A341-44D8-A4F8-6376837FCD85}'" delete2⤵PID:1428
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{89DAC8CF-A341-44D8-A4F8-6376837FCD85}'" delete3⤵PID:2236
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{AB9FF3A2-DD33-46E9-ABCA-D8D1DFF8A144}'" delete2⤵PID:1124
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{AB9FF3A2-DD33-46E9-ABCA-D8D1DFF8A144}'" delete3⤵PID:1512
-
-
-
C:\Windows\system32\cmd.execmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{FD53B4B8-F3C1-4179-860C-B8672CFF650D}'" delete2⤵PID:2412
-
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{FD53B4B8-F3C1-4179-860C-B8672CFF650D}'" delete3⤵PID:1712
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d37ef45fe5c6586a80321288d58a5781
SHA19dfec63a05fff0bbd0b4098359ba955fe60cb760
SHA256b88d37ddce9f4fcf798faaa27741331bec4cea80cdf0f287504e4238dae55259
SHA512a709f8dd5d570e922901b9f7206e57f7631f85bebb4ad4861c7efb16cfe6ed911ee516b89d2f3a8a07524d63c364220171fe54910df2887537f3b3de73d5fe76