Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe
-
Size
620KB
-
MD5
8ea5fa30f77c6539690eb8ee371c14e0
-
SHA1
54b446e3dd3433381ebdee1aee6dfd27f94033af
-
SHA256
86a83b4dfb7f4fbac3c0745f8d5d59da0d89047df459ab6a0262b9b810e8ec35
-
SHA512
61dea8adf068ad7964562b650ab8f0540dd66a655862a601db0a81a9e931285fcff1a17d565bfa5a17b5acdd30f5d2a9757e742a8d20ea91177aeb42bdc6e3cf
-
SSDEEP
12288:rgkDxdkL+6JNgKVcRa+fpHyWs3OBH4pUW5:nxsKXa+hHyWseBgx5
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ixujeqtrshe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ixujeqtrshe.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cjlryjo.exe -
Adds policy Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ejjns = "C:\\Users\\Admin\\AppData\\Local\\Temp\\izlbsncwnxidgbcud.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rzcjrdju = "rjwnfbrmepbxbxzsch.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ejjns = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjyrljbysftrxvzugnlf.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rzcjrdju = "ezpjedwupdsryxcyltsnd.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ejjns = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjyrljbysftrxvzugnlf.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rzcjrdju = "pjyrljbysftrxvzugnlf.exe" cjlryjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ixujeqtrshe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cjlryjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rzcjrdju = "ezpjedwupdsryxcyltsnd.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rzcjrdju = "rjwnfbrmepbxbxzsch.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ejjns = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvjburiexjwtyvysdjg.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ejjns = "C:\\Users\\Admin\\AppData\\Local\\Temp\\izlbsncwnxidgbcud.exe" ixujeqtrshe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ixujeqtrshe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ejjns = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rjwnfbrmepbxbxzsch.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ejjns = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rjwnfbrmepbxbxzsch.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rzcjrdju = "brcrhbpiyhrlnhhy.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ejjns = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvjburiexjwtyvysdjg.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ejjns = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rjwnfbrmepbxbxzsch.exe" ixujeqtrshe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rzcjrdju = "brcrhbpiyhrlnhhy.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ejjns = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ezpjedwupdsryxcyltsnd.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ejjns = "C:\\Users\\Admin\\AppData\\Local\\Temp\\brcrhbpiyhrlnhhy.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rzcjrdju = "cvjburiexjwtyvysdjg.exe" ixujeqtrshe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ejjns = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ezpjedwupdsryxcyltsnd.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rzcjrdju = "pjyrljbysftrxvzugnlf.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rzcjrdju = "izlbsncwnxidgbcud.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rzcjrdju = "cvjburiexjwtyvysdjg.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rzcjrdju = "rjwnfbrmepbxbxzsch.exe" ixujeqtrshe.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ixujeqtrshe.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cjlryjo.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cjlryjo.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ixujeqtrshe.exe -
Executes dropped EXE 4 IoCs
pid Process 3464 ixujeqtrshe.exe 1248 cjlryjo.exe 3040 cjlryjo.exe 2160 ixujeqtrshe.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "brcrhbpiyhrlnhhy.exe ." cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\whnxixgufjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\brcrhbpiyhrlnhhy.exe ." cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tfmxjzjykpvl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\izlbsncwnxidgbcud.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "izlbsncwnxidgbcud.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\whnxixgufjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvjburiexjwtyvysdjg.exe ." cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\whnxixgufjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\brcrhbpiyhrlnhhy.exe ." ixujeqtrshe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "rjwnfbrmepbxbxzsch.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\irvdmzgsb = "brcrhbpiyhrlnhhy.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tfmxjzjykpvl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\izlbsncwnxidgbcud.exe" cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\irvdmzgsb = "rjwnfbrmepbxbxzsch.exe" cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ezpjedwupdsryxcyltsnd.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\irvdmzgsb = "izlbsncwnxidgbcud.exe" ixujeqtrshe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjyrljbysftrxvzugnlf.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\irvdmzgsb = "izlbsncwnxidgbcud.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tfmxjzjykpvl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ezpjedwupdsryxcyltsnd.exe" cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\izlbsncwnxidgbcud.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\whnxixgufjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\izlbsncwnxidgbcud.exe ." cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\whnxixgufjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ezpjedwupdsryxcyltsnd.exe ." cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\whnxixgufjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rjwnfbrmepbxbxzsch.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\irvdmzgsb = "cvjburiexjwtyvysdjg.exe" cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\blqzjxfscf = "pjyrljbysftrxvzugnlf.exe ." cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "brcrhbpiyhrlnhhy.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\whnxixgufjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\izlbsncwnxidgbcud.exe ." ixujeqtrshe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "cvjburiexjwtyvysdjg.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "rjwnfbrmepbxbxzsch.exe" cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\brcrhbpiyhrlnhhy.exe" ixujeqtrshe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "pjyrljbysftrxvzugnlf.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjyrljbysftrxvzugnlf.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tfmxjzjykpvl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjyrljbysftrxvzugnlf.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "izlbsncwnxidgbcud.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\blqzjxfscf = "brcrhbpiyhrlnhhy.exe ." cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\whnxixgufjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvjburiexjwtyvysdjg.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\izlbsncwnxidgbcud.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\izlbsncwnxidgbcud.exe ." cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tfmxjzjykpvl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvjburiexjwtyvysdjg.exe" cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\brcrhbpiyhrlnhhy.exe ." cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "brcrhbpiyhrlnhhy.exe" cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjyrljbysftrxvzugnlf.exe" cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rjwnfbrmepbxbxzsch.exe" cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvjburiexjwtyvysdjg.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "ezpjedwupdsryxcyltsnd.exe ." ixujeqtrshe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\blqzjxfscf = "rjwnfbrmepbxbxzsch.exe ." ixujeqtrshe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "cvjburiexjwtyvysdjg.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\blqzjxfscf = "rjwnfbrmepbxbxzsch.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\blqzjxfscf = "ezpjedwupdsryxcyltsnd.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ezpjedwupdsryxcyltsnd.exe ." ixujeqtrshe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\whnxixgufjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pjyrljbysftrxvzugnlf.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ezpjedwupdsryxcyltsnd.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "ezpjedwupdsryxcyltsnd.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "ezpjedwupdsryxcyltsnd.exe ." cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\whnxixgufjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rjwnfbrmepbxbxzsch.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cvjburiexjwtyvysdjg.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "cvjburiexjwtyvysdjg.exe" cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\izlbsncwnxidgbcud.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tfmxjzjykpvl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ezpjedwupdsryxcyltsnd.exe" cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pvwbhr = "pjyrljbysftrxvzugnlf.exe" cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\blqzjxfscf = "brcrhbpiyhrlnhhy.exe ." cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\whnxixgufjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ezpjedwupdsryxcyltsnd.exe ." cjlryjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "pjyrljbysftrxvzugnlf.exe ." ixujeqtrshe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\blqzjxfscf = "izlbsncwnxidgbcud.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\cjlryjo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rjwnfbrmepbxbxzsch.exe ." ixujeqtrshe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\blqzjxfscf = "ezpjedwupdsryxcyltsnd.exe ." cjlryjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\blqzjxfscf = "cvjburiexjwtyvysdjg.exe ." ixujeqtrshe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\blqzjxfscf = "cvjburiexjwtyvysdjg.exe ." cjlryjo.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ixujeqtrshe.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ixujeqtrshe.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cjlryjo.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cjlryjo.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cjlryjo.exe -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 54 whatismyip.everdot.org 17 www.whatismyip.ca 23 www.showmyipaddress.com 30 whatismyipaddress.com 35 www.whatismyip.ca 37 whatismyip.everdot.org 42 whatismyip.everdot.org 43 www.whatismyip.ca -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf cjlryjo.exe File opened for modification F:\autorun.inf cjlryjo.exe File created F:\autorun.inf cjlryjo.exe File opened for modification C:\autorun.inf cjlryjo.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\cvjburiexjwtyvysdjg.exe cjlryjo.exe File opened for modification C:\Windows\SysWOW64\pjyrljbysftrxvzugnlf.exe cjlryjo.exe File opened for modification C:\Windows\SysWOW64\vridzztsodttbbhesbbxoj.exe cjlryjo.exe File opened for modification C:\Windows\SysWOW64\pjyrljbysftrxvzugnlf.exe ixujeqtrshe.exe File opened for modification C:\Windows\SysWOW64\gfzxwzwyxpilwziizlonh.ehe cjlryjo.exe File opened for modification C:\Windows\SysWOW64\blqzjxfscfjxthbmolzjoxhvdqadhvrf.kmj cjlryjo.exe File opened for modification C:\Windows\SysWOW64\rjwnfbrmepbxbxzsch.exe ixujeqtrshe.exe File opened for modification C:\Windows\SysWOW64\vridzztsodttbbhesbbxoj.exe ixujeqtrshe.exe File opened for modification C:\Windows\SysWOW64\vridzztsodttbbhesbbxoj.exe ixujeqtrshe.exe File opened for modification C:\Windows\SysWOW64\vridzztsodttbbhesbbxoj.exe cjlryjo.exe File opened for modification C:\Windows\SysWOW64\izlbsncwnxidgbcud.exe cjlryjo.exe File opened for modification C:\Windows\SysWOW64\izlbsncwnxidgbcud.exe ixujeqtrshe.exe File opened for modification C:\Windows\SysWOW64\cvjburiexjwtyvysdjg.exe ixujeqtrshe.exe File created C:\Windows\SysWOW64\blqzjxfscfjxthbmolzjoxhvdqadhvrf.kmj cjlryjo.exe File opened for modification C:\Windows\SysWOW64\pjyrljbysftrxvzugnlf.exe ixujeqtrshe.exe File opened for modification C:\Windows\SysWOW64\ezpjedwupdsryxcyltsnd.exe ixujeqtrshe.exe File opened for modification C:\Windows\SysWOW64\brcrhbpiyhrlnhhy.exe cjlryjo.exe File opened for modification C:\Windows\SysWOW64\pjyrljbysftrxvzugnlf.exe cjlryjo.exe File opened for modification C:\Windows\SysWOW64\ezpjedwupdsryxcyltsnd.exe cjlryjo.exe File created C:\Windows\SysWOW64\gfzxwzwyxpilwziizlonh.ehe cjlryjo.exe File opened for modification C:\Windows\SysWOW64\rjwnfbrmepbxbxzsch.exe cjlryjo.exe File opened for modification C:\Windows\SysWOW64\ezpjedwupdsryxcyltsnd.exe cjlryjo.exe File opened for modification C:\Windows\SysWOW64\cvjburiexjwtyvysdjg.exe cjlryjo.exe File opened for modification C:\Windows\SysWOW64\brcrhbpiyhrlnhhy.exe ixujeqtrshe.exe File opened for modification C:\Windows\SysWOW64\izlbsncwnxidgbcud.exe ixujeqtrshe.exe File opened for modification C:\Windows\SysWOW64\brcrhbpiyhrlnhhy.exe ixujeqtrshe.exe File opened for modification C:\Windows\SysWOW64\ezpjedwupdsryxcyltsnd.exe ixujeqtrshe.exe File opened for modification C:\Windows\SysWOW64\rjwnfbrmepbxbxzsch.exe ixujeqtrshe.exe File opened for modification C:\Windows\SysWOW64\cvjburiexjwtyvysdjg.exe ixujeqtrshe.exe File opened for modification C:\Windows\SysWOW64\izlbsncwnxidgbcud.exe cjlryjo.exe File opened for modification C:\Windows\SysWOW64\brcrhbpiyhrlnhhy.exe cjlryjo.exe File opened for modification C:\Windows\SysWOW64\rjwnfbrmepbxbxzsch.exe cjlryjo.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\gfzxwzwyxpilwziizlonh.ehe cjlryjo.exe File created C:\Program Files (x86)\gfzxwzwyxpilwziizlonh.ehe cjlryjo.exe File opened for modification C:\Program Files (x86)\blqzjxfscfjxthbmolzjoxhvdqadhvrf.kmj cjlryjo.exe File created C:\Program Files (x86)\blqzjxfscfjxthbmolzjoxhvdqadhvrf.kmj cjlryjo.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\izlbsncwnxidgbcud.exe ixujeqtrshe.exe File opened for modification C:\Windows\vridzztsodttbbhesbbxoj.exe ixujeqtrshe.exe File opened for modification C:\Windows\ezpjedwupdsryxcyltsnd.exe cjlryjo.exe File opened for modification C:\Windows\gfzxwzwyxpilwziizlonh.ehe cjlryjo.exe File opened for modification C:\Windows\vridzztsodttbbhesbbxoj.exe cjlryjo.exe File opened for modification C:\Windows\cvjburiexjwtyvysdjg.exe cjlryjo.exe File opened for modification C:\Windows\rjwnfbrmepbxbxzsch.exe cjlryjo.exe File opened for modification C:\Windows\vridzztsodttbbhesbbxoj.exe ixujeqtrshe.exe File opened for modification C:\Windows\ezpjedwupdsryxcyltsnd.exe cjlryjo.exe File opened for modification C:\Windows\ezpjedwupdsryxcyltsnd.exe ixujeqtrshe.exe File opened for modification C:\Windows\cvjburiexjwtyvysdjg.exe cjlryjo.exe File opened for modification C:\Windows\rjwnfbrmepbxbxzsch.exe ixujeqtrshe.exe File opened for modification C:\Windows\rjwnfbrmepbxbxzsch.exe cjlryjo.exe File opened for modification C:\Windows\vridzztsodttbbhesbbxoj.exe cjlryjo.exe File opened for modification C:\Windows\brcrhbpiyhrlnhhy.exe cjlryjo.exe File opened for modification C:\Windows\izlbsncwnxidgbcud.exe cjlryjo.exe File opened for modification C:\Windows\brcrhbpiyhrlnhhy.exe ixujeqtrshe.exe File opened for modification C:\Windows\pjyrljbysftrxvzugnlf.exe cjlryjo.exe File opened for modification C:\Windows\blqzjxfscfjxthbmolzjoxhvdqadhvrf.kmj cjlryjo.exe File opened for modification C:\Windows\izlbsncwnxidgbcud.exe ixujeqtrshe.exe File opened for modification C:\Windows\cvjburiexjwtyvysdjg.exe ixujeqtrshe.exe File opened for modification C:\Windows\pjyrljbysftrxvzugnlf.exe ixujeqtrshe.exe File opened for modification C:\Windows\brcrhbpiyhrlnhhy.exe cjlryjo.exe File opened for modification C:\Windows\izlbsncwnxidgbcud.exe cjlryjo.exe File opened for modification C:\Windows\pjyrljbysftrxvzugnlf.exe cjlryjo.exe File opened for modification C:\Windows\cvjburiexjwtyvysdjg.exe ixujeqtrshe.exe File opened for modification C:\Windows\pjyrljbysftrxvzugnlf.exe ixujeqtrshe.exe File opened for modification C:\Windows\brcrhbpiyhrlnhhy.exe ixujeqtrshe.exe File opened for modification C:\Windows\ezpjedwupdsryxcyltsnd.exe ixujeqtrshe.exe File created C:\Windows\gfzxwzwyxpilwziizlonh.ehe cjlryjo.exe File created C:\Windows\blqzjxfscfjxthbmolzjoxhvdqadhvrf.kmj cjlryjo.exe File opened for modification C:\Windows\rjwnfbrmepbxbxzsch.exe ixujeqtrshe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 1248 cjlryjo.exe 1248 cjlryjo.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 1248 cjlryjo.exe 1248 cjlryjo.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1248 cjlryjo.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4020 wrote to memory of 3464 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 86 PID 4020 wrote to memory of 3464 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 86 PID 4020 wrote to memory of 3464 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 86 PID 3464 wrote to memory of 1248 3464 ixujeqtrshe.exe 91 PID 3464 wrote to memory of 1248 3464 ixujeqtrshe.exe 91 PID 3464 wrote to memory of 1248 3464 ixujeqtrshe.exe 91 PID 3464 wrote to memory of 3040 3464 ixujeqtrshe.exe 92 PID 3464 wrote to memory of 3040 3464 ixujeqtrshe.exe 92 PID 3464 wrote to memory of 3040 3464 ixujeqtrshe.exe 92 PID 4020 wrote to memory of 2160 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 107 PID 4020 wrote to memory of 2160 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 107 PID 4020 wrote to memory of 2160 4020 8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe 107 -
System policy modification 1 TTPs 41 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" ixujeqtrshe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ixujeqtrshe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cjlryjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" ixujeqtrshe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" cjlryjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" cjlryjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" ixujeqtrshe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" cjlryjo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ixujeqtrshe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ixujeqtrshe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8ea5fa30f77c6539690eb8ee371c14e0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\ixujeqtrshe.exe"C:\Users\Admin\AppData\Local\Temp\ixujeqtrshe.exe" "c:\users\admin\appdata\local\temp\8ea5fa30f77c6539690eb8ee371c14e0_neikianalytics.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\cjlryjo.exe"C:\Users\Admin\AppData\Local\Temp\cjlryjo.exe" "-C:\Users\Admin\AppData\Local\Temp\brcrhbpiyhrlnhhy.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\cjlryjo.exe"C:\Users\Admin\AppData\Local\Temp\cjlryjo.exe" "-C:\Users\Admin\AppData\Local\Temp\brcrhbpiyhrlnhhy.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:3040
-
-
-
C:\Users\Admin\AppData\Local\Temp\ixujeqtrshe.exe"C:\Users\Admin\AppData\Local\Temp\ixujeqtrshe.exe" "c:\users\admin\appdata\local\temp\8ea5fa30f77c6539690eb8ee371c14e0_neikianalytics.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272B
MD54788cde2b317856af3b86a0cd4e8da91
SHA12244731fc769472a7321f583b703938664fad3e9
SHA25689edfe3220c90a5f7b510afa7ee19126ee39e0ed5979697e06ceaefc7b156091
SHA512afb7221be0809e843a900f736324db79b3afdbb63cb0c7ccc37f54577777af3a51713b277965bb56e957273cb12bcac83d2cf85cef793f12d9637ff1fc7dd424
-
Filesize
272B
MD522bb17bf5404470ae708061e8f5e7238
SHA1e6cf8822ccb90249fa9fff2f4765ff3d06e21fe8
SHA2563ae23513d674119e651f28b5572a4a1a6d5c375f2f99daa1fe18f0292b8eb214
SHA5125bce7b4967e6fb63db1b20acb88f72aaff11b1b86c50211d618693f94bd9fa99d9e963b7e8ed9989ae7cd74bd18d5021450f5dc16883c3b745e2eac89b9dc379
-
Filesize
272B
MD5b93462584a7a24e1b92ad0460047b795
SHA16e6f0093be97053dabc3a8090186e2264a130667
SHA25649396d47d31c09799aed91074935014e89f9e61ebb4527dc2256764aaa503fb8
SHA512d7868f98d116eed549d022739f3c9127f89796714eca07e36fcb5f5327fe84474369430140cb379177b87eb11bd8c4a6960ee5562bd245b82abc27cbfada9a50
-
Filesize
272B
MD5f261ad175a19a8be4e5abd626ab38e97
SHA1ce05650468cc35c38890b8afd190c71538a4d8dd
SHA2563a6a30379ab9b006f1b9ba2e2d9ed1d96db3d96b359f8256c49cf41210bcbd0b
SHA5126b363963bfd4a62967df6111ec1894e0a216ad81217cb07272891b4cd0b15fe3bb4c54835710d6c3dcd40b673f2b8953b5a68d45ac0d062068f87bd519c74595
-
Filesize
272B
MD57b35f3a8d7fd8f9ddc3dfd2a871cffc2
SHA16d3212aabe1f7cbd928582129f11e4820bc6600c
SHA256d2dda312986511549e5f5d4380b173e07ecdddaaacde5318a8dc67b6ae4af20f
SHA5128e75f4e27d3d1d8bde13d65fa389f48591ccd3441495e6f721ddaa80e5f65de852fba4891ea2e1d329c9c55608eed3a740b47795436f775effc0168a5519c100
-
Filesize
272B
MD515614f52410cec2764b9dcd9bf70903e
SHA18fcaa630f91e1b2aff5acc20319190c81acca530
SHA256ff371511b80d371376af8aea81be3f807d70919ad367921bf4b8570f8f97e5c4
SHA512724548c0964b68020c181ef4e17cfc5592560abebe5cd3b6ebcf736d221ef2ec5ea6b00e3873ee8a37cb1a76009c22c817a908fdf46dbc98cec95082272e76d0
-
Filesize
272B
MD5b6fd3d63e591661a0a6e68f294845a3e
SHA174856b4fe6bc658477ea71f62c4d605779131e8c
SHA2560987a4fa3143b09573ddde81e78c9aed58937d70a8e3023fd1de846c88ce70a7
SHA512ec970132dd9bd59cdedc1ce1824ba67a1fd60ec2fdd5f7f51663a80abc9c6ff19a71954580111865a294689988bbf5b94ba35e5876221a891e80510b58da4c1f
-
Filesize
724KB
MD56b8c1ecf62bb3375f756c40ad43acf12
SHA16c3c17e6fb54cfc84180e7b5f1956c381001cbb5
SHA256a9654bffabdb74f7459b4058a31eae91f66439caa98b83cbf8fbffc0c7ca2089
SHA512d0c65bc377519e8b5e1f3c028a754cab6f463420df28f2a61298c8a964459fd2b074a17f49855fe3eb5a1617dd9a7eedef747b3f0e82d7e6ca0cc2f662b2a0ef
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
3KB
MD565a24105a3371904f9f3710e8e341e1d
SHA1b64fcd37ae0696976d946c33164278ae55245338
SHA256a2f10ca402388f2b852c769a62db56f968c4d02157ec45079065baaf165373ff
SHA512468bc48ac9a09fdadff08f4ba9322bda3199b1510324badf20373cd3fa47f101c2670456189c8d957a02f77c1a16b918da75e09a9f7234f628754426fabc1529
-
Filesize
272B
MD5b7324471fd9e34a4a8bdf402ef5b2a46
SHA152b1862873fa78f6c36b64b46ec6bccfc84218b5
SHA25610b7d1389287754f80913882e5be906c3a11add7fdecc646878bae4fb15caaac
SHA512f19d57919a94bbc57ea53f2a5b84aff5c17cfcc459a640bad83a75b1a0f8d86cf5333e917301881cc95b36a5ac158ba80a70ce76120750d82959e2e1cba13667
-
Filesize
620KB
MD58ea5fa30f77c6539690eb8ee371c14e0
SHA154b446e3dd3433381ebdee1aee6dfd27f94033af
SHA25686a83b4dfb7f4fbac3c0745f8d5d59da0d89047df459ab6a0262b9b810e8ec35
SHA51261dea8adf068ad7964562b650ab8f0540dd66a655862a601db0a81a9e931285fcff1a17d565bfa5a17b5acdd30f5d2a9757e742a8d20ea91177aeb42bdc6e3cf
-
Filesize
656KB
MD5a9a96205cc78f0ecb7cdbe22a51f7d54
SHA1e6620b8066a28771447a2cc71de59ebcf1da2a39
SHA256795ed49a1f46f18237931bf8cf77cb2c89ef237bb6139f32295538adc3e9b780
SHA5127db47330990976cd39a5ca681b4fa26302cfe86774b543948548b2dcb16b2d5449070bc8d92a297537dd798292fbe98d575be91443d2fa9638a8f68e325c1114