Malware Analysis Report

2024-10-10 12:54

Sample ID 240531-f19eyshc84
Target 78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe
SHA256 2714e9470dd1490f31065e4c38cfd1211786d0a299b7896c192fc369a6e1f6f9
Tags
rat dcrat evasion execution infostealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2714e9470dd1490f31065e4c38cfd1211786d0a299b7896c192fc369a6e1f6f9

Threat Level: Known bad

The file 78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

rat dcrat evasion execution infostealer trojan

Process spawned unexpected child process

UAC bypass

DCRat payload

Dcrat family

DcRat

DCRat payload

Command and Scripting Interpreter: PowerShell

Executes dropped EXE

Checks computer location settings

Checks whether UAC is enabled

Drops file in Program Files directory

Drops file in Windows directory

Enumerates physical storage devices

Unsigned PE

Modifies registry class

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

Suspicious behavior: EnumeratesProcesses

Creates scheduled task(s)

System policy modification

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-31 05:21

Signatures

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Dcrat family

dcrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-31 05:21

Reported

2024-05-31 05:24

Platform

win7-20240221-en

Max time kernel

121s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe"

Signatures

DcRat

rat infostealer dcrat

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Default\Cookies\taskhost.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Default\Cookies\taskhost.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Default\Cookies\taskhost.exe N/A

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Default\Cookies\taskhost.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Default\Cookies\taskhost.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Default\Cookies\taskhost.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Windows Photo Viewer\es-ES\taskhost.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files\Windows Photo Viewer\es-ES\b75386f1303e64 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Windows Defender\ja-JP\winlogon.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Windows Defender\ja-JP\cc11b995f2a76d C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\RCXB38B.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\taskhost.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\RCXC0BA.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\winlogon.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\TAPI\27d1bcfc3c54e0 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Windows\ServiceProfiles\NetworkService\Saved Games\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\TAPI\RCXBC45.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\Setup\State\audiodg.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\ServiceProfiles\NetworkService\Saved Games\RCXC2CE.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\security\logs\sppsvc.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\TAPI\System.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Windows\BitLockerDiscoveryVolumeContents\explorer.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Windows\BitLockerDiscoveryVolumeContents\7a0fd90576e088 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Windows\TAPI\System.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Windows\Setup\State\audiodg.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Windows\ServiceProfiles\NetworkService\Saved Games\ae74dec7c7d912 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Windows\security\logs\sppsvc.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\explorer.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Windows\Setup\State\42af1c969fbb7b C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Windows\security\logs\0a1fd5f707cd16 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\Setup\State\RCXBE49.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\ServiceProfiles\NetworkService\Saved Games\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents\RCXB7A2.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\security\logs\RCXC9D3.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Default\Cookies\taskhost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1908 wrote to memory of 2436 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2436 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2436 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2816 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2816 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2816 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 548 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 548 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 548 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 956 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2316 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2316 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2316 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 836 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 836 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 836 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1020 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1020 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1020 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1788 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1788 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1788 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 584 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1868 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1868 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 1868 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1908 wrote to memory of 576 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\cmd.exe
PID 1908 wrote to memory of 576 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\cmd.exe
PID 1908 wrote to memory of 576 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\cmd.exe
PID 576 wrote to memory of 1084 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 576 wrote to memory of 1084 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 576 wrote to memory of 1084 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 576 wrote to memory of 1704 N/A C:\Windows\System32\cmd.exe C:\Users\Default\Cookies\taskhost.exe
PID 576 wrote to memory of 1704 N/A C:\Windows\System32\cmd.exe C:\Users\Default\Cookies\taskhost.exe
PID 576 wrote to memory of 1704 N/A C:\Windows\System32\cmd.exe C:\Users\Default\Cookies\taskhost.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Default\Cookies\taskhost.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Default\Cookies\taskhost.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Default\Cookies\taskhost.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\lsm.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\lsm.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\lsm.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Cookies\taskhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Users\Default\Cookies\taskhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Cookies\taskhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\lsass.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\lsass.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\lsass.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\taskhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\es-ES\taskhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Photo Viewer\es-ES\taskhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\csrss.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\csrss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\explorer.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\explorer.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\explorer.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\smss.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Windows\TAPI\System.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\TAPI\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Windows\TAPI\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 6 /tr "'C:\Windows\Setup\State\audiodg.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\Setup\State\audiodg.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Windows\Setup\State\audiodg.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Defender\ja-JP\winlogon.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\ja-JP\winlogon.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Defender\ja-JP\winlogon.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics7" /sc MINUTE /mo 11 /tr "'C:\Windows\ServiceProfiles\NetworkService\Saved Games\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics" /sc ONLOGON /tr "'C:\Windows\ServiceProfiles\NetworkService\Saved Games\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics7" /sc MINUTE /mo 6 /tr "'C:\Windows\ServiceProfiles\NetworkService\Saved Games\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\explorer.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\explorer.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\explorer.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Local Settings\lsass.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Admin\Local Settings\lsass.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Local Settings\lsass.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Windows\security\logs\sppsvc.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\security\logs\sppsvc.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Windows\security\logs\sppsvc.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\smss.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Admin\smss.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\smss.exe'" /rl HIGHEST /f

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\lsm.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Cookies\taskhost.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\lsass.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Photo Viewer\es-ES\taskhost.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\csrss.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\BitLockerDiscoveryVolumeContents\explorer.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\smss.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\TAPI\System.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Setup\State\audiodg.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Defender\ja-JP\winlogon.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ServiceProfiles\NetworkService\Saved Games\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\explorer.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Local Settings\lsass.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\security\logs\sppsvc.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\smss.exe'

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nMdX7E06KS.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Users\Default\Cookies\taskhost.exe

"C:\Users\Default\Cookies\taskhost.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 a0981341.xsph.ru udp
RU 141.8.192.6:80 a0981341.xsph.ru tcp

Files

memory/1908-0-0x000007FEF5693000-0x000007FEF5694000-memory.dmp

memory/1908-1-0x0000000001170000-0x0000000001282000-memory.dmp

memory/1908-2-0x000007FEF5690000-0x000007FEF607C000-memory.dmp

memory/1908-3-0x0000000000140000-0x0000000000148000-memory.dmp

memory/1908-4-0x0000000000150000-0x0000000000160000-memory.dmp

memory/1908-5-0x0000000000160000-0x000000000016A000-memory.dmp

memory/1908-6-0x0000000000170000-0x000000000017C000-memory.dmp

memory/1908-7-0x00000000003C0000-0x00000000003CC000-memory.dmp

memory/1908-10-0x000007FEF5690000-0x000007FEF607C000-memory.dmp

C:\Recovery\8f9e55a2-d10b-11ee-8d36-fdfbfcab7b96\csrss.exe

MD5 78de114aa12b3464cc3bbd2e6f6be910
SHA1 aaf0559466a075d400a6e35a31400bd85bd06391
SHA256 2714e9470dd1490f31065e4c38cfd1211786d0a299b7896c192fc369a6e1f6f9
SHA512 a60eccf0d61bf14657fccec0b053ac32437d18cad4bea8c7bfbec72e8ff2401a28c6fed8380e95fbc7faa18dfcec7751552ad25f4218695c1525b29cde8bab88

C:\Windows\Setup\State\audiodg.exe

MD5 7405dc697b92b9e475c8d7454043f0d7
SHA1 6c78b79a0878c0eabf10dd4e18f7d34e3dbe9394
SHA256 e32154d1674f3e137fc5a9b806574a66dfbd7c602fdc59fefae7fc62b0d2b7df
SHA512 ab8f9f24a49ea25521499378bc555f491664cc9d3c2ccd908d1d2d596f227aca0ad7b18c6a8d881cba539c9ce82ef88bdeb803e9a6f892af1f498eba43b0ce12

C:\Windows\ServiceProfiles\NetworkService\Saved Games\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe

MD5 89ed902f48de72e255cf5c70ddfc0a08
SHA1 e1a452a284b44c1d5b8144003b86d52de0b59c2d
SHA256 b608468fedd47375034ade239e6fc1ba34ecfbefddfc4c7d524d5580990dbe32
SHA512 13b1806c52b203d431f6f56f17ca452e726e664a1f58053a7d82ced29fae656a2971187a05375287e108354234a4f24aaa45844364458ef08d37f6c4feba408a

memory/1908-149-0x000007FEF5690000-0x000007FEF607C000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 c1db75e615dc83e94142609a9b719397
SHA1 3c7df550e52ee6f512c5e9591f33dfbf87de0b1d
SHA256 92097b80761f905737d43e0e3c914eff7d8a8a14917542bad762ddf8c313c64b
SHA512 ec629b0e666cfa7084d7886f6ef51d19723f86f2d0c743ddf7f15c3f0502541eec100c6b668eb7b75cba6153b1ad152d8563e0854d5f5a0892a5d378b517f6fb

C:\Users\Admin\AppData\Local\Temp\nMdX7E06KS.bat

MD5 13c9692631e89659f9f4decb4132bf54
SHA1 f9dfce8563ae2e66bf2893acf8f6a29b6acf6c0d
SHA256 591f8d5c21f86804008170bb57043249057b99602d827b9863657a47f68343aa
SHA512 056b43529096cbc740e2315d13005b543832426d96d1ac946b113b7da9f8c590571fddae967eb0a95b3ddea0aa05d37c1b32321ddea34e35ba004aadbe666c96

memory/1724-167-0x000000001B3C0000-0x000000001B6A2000-memory.dmp

memory/2848-198-0x0000000002370000-0x0000000002378000-memory.dmp

memory/1704-230-0x0000000000150000-0x0000000000262000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-31 05:21

Reported

2024-05-31 05:24

Platform

win10v2004-20240426-en

Max time kernel

149s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe"

Signatures

DcRat

rat infostealer dcrat

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\schtasks.exe

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Program Files (x86)\Reference Assemblies\dllhost.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Program Files (x86)\Reference Assemblies\dllhost.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Program Files (x86)\Reference Assemblies\dllhost.exe N/A

DCRat payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Reference Assemblies\dllhost.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Program Files (x86)\Reference Assemblies\dllhost.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Program Files (x86)\Reference Assemblies\dllhost.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\dllhost.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\29c1c3cc0f7685 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files\Internet Explorer\it-IT\e1ef82546f0b02 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RCX5C36.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\unsecapp.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Reference Assemblies\dllhost.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Windows Mail\sysmon.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files\Internet Explorer\it-IT\SppExtComObj.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\dllhost.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\RCX632E.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Reference Assemblies\5940a34987c991 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Reference Assemblies\RCX44DA.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\RCX48E3.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\RuntimeBroker.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Windows Defender\e1ef82546f0b02 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files\WindowsApps\csrss.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\unsecapp.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Windows Mail\sysmon.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Windows Defender\RCX5723.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Windows Defender\SppExtComObj.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Windows Mail\121e5b5079f7c0 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\5940a34987c991 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\RuntimeBroker.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\RCX5115.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\RCX5EA8.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files\Internet Explorer\it-IT\SppExtComObj.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files\Internet Explorer\it-IT\RCX4AF7.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Windows NT\Accessories\en-US\5940a34987c991 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Windows Mail\RCX46DE.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Windows Multimedia Platform\ee2ad38f3d4382 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Windows Defender\SppExtComObj.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\9e8d7a4ca61bd9 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\dllhost.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\Reference Assemblies\dllhost.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\Windows NT\Accessories\en-US\dllhost.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\ImmersiveControlPanel\fr-FR\explorer.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\Tasks\RCX5319.tmp C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\Tasks\System.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Windows\Tasks\System.exe C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
File created C:\Windows\Tasks\27d1bcfc3c54e0 C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files (x86)\Reference Assemblies\dllhost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2688 wrote to memory of 4292 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4292 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 796 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 796 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 2056 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 2056 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 3960 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 3960 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 3068 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 3068 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 1420 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 1420 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4872 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4872 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 3572 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 3572 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4688 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4688 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4108 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4108 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 3712 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 3712 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4136 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4136 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4052 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4052 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4628 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4628 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 5068 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 5068 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2688 wrote to memory of 3016 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\cmd.exe
PID 2688 wrote to memory of 3016 N/A C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe C:\Windows\System32\cmd.exe
PID 3016 wrote to memory of 5740 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 3016 wrote to memory of 5740 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 3016 wrote to memory of 5148 N/A C:\Windows\System32\cmd.exe C:\Program Files (x86)\Reference Assemblies\dllhost.exe
PID 3016 wrote to memory of 5148 N/A C:\Windows\System32\cmd.exe C:\Program Files (x86)\Reference Assemblies\dllhost.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Program Files (x86)\Reference Assemblies\dllhost.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" C:\Program Files (x86)\Reference Assemblies\dllhost.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" C:\Program Files (x86)\Reference Assemblies\dllhost.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe"

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Reference Assemblies\dllhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Reference Assemblies\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Mail\sysmon.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\sysmon.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Mail\sysmon.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\dllhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows NT\Accessories\en-US\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 6 /tr "'C:\Program Files\Internet Explorer\it-IT\SppExtComObj.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\it-IT\SppExtComObj.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Internet Explorer\it-IT\SppExtComObj.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\My Documents\fontdrvhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Admin\My Documents\fontdrvhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\My Documents\fontdrvhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Pictures\RuntimeBroker.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default\Pictures\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Pictures\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Windows\Tasks\System.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\Tasks\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Windows\Tasks\System.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Defender\SppExtComObj.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\SppExtComObj.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Defender\SppExtComObj.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Libraries\OfficeClickToRun.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Public\Libraries\OfficeClickToRun.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Libraries\OfficeClickToRun.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\dllhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Sidebar\Gadgets\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\unsecapp.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\unsecapp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\unsecapp.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\RuntimeBroker.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\RuntimeBroker.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\Start Menu\dllhost.exe'" /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\All Users\Start Menu\dllhost.exe'" /rl HIGHEST /f

C:\Windows\system32\schtasks.exe

schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Start Menu\dllhost.exe'" /rl HIGHEST /f

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\78de114aa12b3464cc3bbd2e6f6be910_NeikiAnalytics.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Reference Assemblies\dllhost.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\sysmon.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows NT\Accessories\en-US\dllhost.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Internet Explorer\it-IT\SppExtComObj.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\My Documents\fontdrvhost.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Pictures\RuntimeBroker.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Tasks\System.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\SppExtComObj.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Defender\SppExtComObj.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Libraries\OfficeClickToRun.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\Gadgets\dllhost.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Mozilla Maintenance Service\logs\unsecapp.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\dllhost.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\RuntimeBroker.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Start Menu\dllhost.exe'

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HPolXykTJd.bat"

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

C:\Program Files (x86)\Reference Assemblies\dllhost.exe

"C:\Program Files (x86)\Reference Assemblies\dllhost.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 a0981341.xsph.ru udp
RU 141.8.192.6:80 a0981341.xsph.ru tcp
US 8.8.8.8:53 6.192.8.141.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 9.173.189.20.in-addr.arpa udp

Files

memory/2688-0-0x00007FF82E9E3000-0x00007FF82E9E5000-memory.dmp

memory/2688-1-0x0000000000700000-0x0000000000812000-memory.dmp

memory/2688-2-0x00007FF82E9E0000-0x00007FF82F4A1000-memory.dmp

memory/2688-3-0x0000000000EE0000-0x0000000000EE8000-memory.dmp

memory/2688-4-0x0000000001420000-0x0000000001430000-memory.dmp

memory/2688-5-0x0000000001430000-0x000000000143A000-memory.dmp

memory/2688-6-0x0000000001450000-0x000000000145C000-memory.dmp

memory/2688-7-0x0000000001460000-0x000000000146C000-memory.dmp

memory/2688-10-0x00007FF82E9E0000-0x00007FF82F4A1000-memory.dmp

memory/2688-11-0x00007FF82E9E0000-0x00007FF82F4A1000-memory.dmp

memory/2688-16-0x00007FF82E9E0000-0x00007FF82F4A1000-memory.dmp

C:\Users\Admin\Documents\fontdrvhost.exe

MD5 78de114aa12b3464cc3bbd2e6f6be910
SHA1 aaf0559466a075d400a6e35a31400bd85bd06391
SHA256 2714e9470dd1490f31065e4c38cfd1211786d0a299b7896c192fc369a6e1f6f9
SHA512 a60eccf0d61bf14657fccec0b053ac32437d18cad4bea8c7bfbec72e8ff2401a28c6fed8380e95fbc7faa18dfcec7751552ad25f4218695c1525b29cde8bab88

C:\Program Files (x86)\Windows Defender\SppExtComObj.exe

MD5 f81a2077ff376c8e8dfc90a9cf8b22ba
SHA1 6f6e68474346c37b457b30086726c062ad70476e
SHA256 02af5a9d132448ddfcef1d093beb1f4e80e790e3d2164a0235bdc5846816f2f6
SHA512 23bbeb8dd04a35edbca12c2fdd146b19f80340e67dc5c62d8c2861b8d188106ce5ac943a677a2946059f44b336f3776a6425b8036f766b0134cce8b23895cf47

memory/2688-159-0x00007FF82E9E0000-0x00007FF82F4A1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gw4pffsk.tkc.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4292-161-0x0000020628980000-0x00000206289A2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\HPolXykTJd.bat

MD5 8d1645e5c394ad66232ac8c0b2e38804
SHA1 644de798173f31070135baf55e776c56af8ba4d2
SHA256 c81ef0cdaa66d61dd485867abc9ea0906cd8b446bb482b27f19b151ca68a842e
SHA512 f0d7c7cbb465946760660e0d52ab66ebcebbaad8c5eae9ab7308940e496b649dd41b99b3d4d8ebaebacb79875d29ef2a0a947f8eba81a26365ebce18d6722484

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 d28a889fd956d5cb3accfbaf1143eb6f
SHA1 157ba54b365341f8ff06707d996b3635da8446f7
SHA256 21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA512 0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 a8e8360d573a4ff072dcc6f09d992c88
SHA1 3446774433ceaf0b400073914facab11b98b6807
SHA256 bf5e284e8f95122bf75ead61c7e2b40f55c96742b05330b5b1cb7915991df13b
SHA512 4ee5167643d82082f57c42616007ef9be57f43f9731921bdf7bca611a914724ad94072d3c8f5b130fa54129e5328ccdebf37ba74339c37deb53e79df5cdf0dbe

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5f0ddc7f3691c81ee14d17b419ba220d
SHA1 f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256 a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA512 2ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 cadef9abd087803c630df65264a6c81c
SHA1 babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256 cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA512 7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 d85ba6ff808d9e5444a4b369f5bc2730
SHA1 31aa9d96590fff6981b315e0b391b575e4c0804a
SHA256 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA512 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 aaaac7c68d2b7997ed502c26fd9f65c2
SHA1 7c5a3731300d672bf53c43e2f9e951c745f7fbdf
SHA256 8724dc2c3c8e8f17aeefae44a23741b1ea3b43c490fbc52fd61575ffe1cd82bb
SHA512 c526febd9430413b48bed976edd9a795793ad1f06c8ff4f6b768b4ad63f4d2f06b9da72d4fcfa7cb9530a64e2dc3554f5ad97fd0ab60129701d175f2724ef1ac

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 3a6bad9528f8e23fb5c77fbd81fa28e8
SHA1 f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256 986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512 846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 28d4235aa2e6d782751f980ceb6e5021
SHA1 f5d82d56acd642b9fc4b963f684fd6b78f25a140
SHA256 8c66720f953e82cfbd8f00543c42c0cf77c3d97787ec09cb3e1e2ba5819bd638
SHA512 dba1bd6600f5affcfdc33a59e7ac853ee5fdfafb8d1407a1768728bd4f66ef6b49437214716b7e33e3de91d7ce95709050a3dab4354dd62acaf1de28107017a2

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 e243a38635ff9a06c87c2a61a2200656
SHA1 ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256 af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA512 4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4