Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe
-
Size
64KB
-
MD5
1dac16f56ee63b1b03619138ae17a3a0
-
SHA1
da64ac5abb26c717672ca27e455aaac690ff99ac
-
SHA256
a3ee938fd50270ae98fce245d0f01293371481a4524aa1ab8c110689b26bdb3a
-
SHA512
82e2cb5d4cba9d93b857870cabf2d94a423026b90129909d2e10f9b346084b19cbcedef4ad2055575a3f98c29a0cc7d871f82923c9da66dd738060fb6c798540
-
SSDEEP
768:Ovw9816ihKQLroCb4/wQxWMZQcpFM1FgDagXP2TyS1tl7lfqvocqcdT3WVdu:6EGU0oCblwWMZQcpmgDagIyS1loL7Wru
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8DC3B475-2881-4142-9147-6607EA9FF666}\stubpath = "C:\\Windows\\{8DC3B475-2881-4142-9147-6607EA9FF666}.exe" {DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{88D8881F-2797-4265-8B78-2A95E5E79CB6}\stubpath = "C:\\Windows\\{88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe" {8DC3B475-2881-4142-9147-6607EA9FF666}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5E7F2B5-EA33-426d-A5E6-75E862BB4467} {88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0FC9183B-BD88-4103-9A79-68504DAC337F} {B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DEF37D0D-7E14-46e1-AA03-C668E96A07BA}\stubpath = "C:\\Windows\\{DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe" {FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8DC3B475-2881-4142-9147-6607EA9FF666} {DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{17B620FC-6799-4397-A1DB-2C1833911AA7}\stubpath = "C:\\Windows\\{17B620FC-6799-4397-A1DB-2C1833911AA7}.exe" {923AFF73-DAFD-4101-9102-1544FFDACED2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6EC975BA-0253-4608-A4F8-3AB6EB1CA13F}\stubpath = "C:\\Windows\\{6EC975BA-0253-4608-A4F8-3AB6EB1CA13F}.exe" {91C077E5-2B5A-45f1-80EB-5EE49D2189CB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF} 1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FE75D9D2-AD8E-4536-92C9-0ECC68B9E395} {E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{91C077E5-2B5A-45f1-80EB-5EE49D2189CB} {17B620FC-6799-4397-A1DB-2C1833911AA7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{91C077E5-2B5A-45f1-80EB-5EE49D2189CB}\stubpath = "C:\\Windows\\{91C077E5-2B5A-45f1-80EB-5EE49D2189CB}.exe" {17B620FC-6799-4397-A1DB-2C1833911AA7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6EC975BA-0253-4608-A4F8-3AB6EB1CA13F} {91C077E5-2B5A-45f1-80EB-5EE49D2189CB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}\stubpath = "C:\\Windows\\{FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe" {E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{88D8881F-2797-4265-8B78-2A95E5E79CB6} {8DC3B475-2881-4142-9147-6607EA9FF666}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5E7F2B5-EA33-426d-A5E6-75E862BB4467}\stubpath = "C:\\Windows\\{B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe" {88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0FC9183B-BD88-4103-9A79-68504DAC337F}\stubpath = "C:\\Windows\\{0FC9183B-BD88-4103-9A79-68504DAC337F}.exe" {B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{923AFF73-DAFD-4101-9102-1544FFDACED2} {0FC9183B-BD88-4103-9A79-68504DAC337F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{923AFF73-DAFD-4101-9102-1544FFDACED2}\stubpath = "C:\\Windows\\{923AFF73-DAFD-4101-9102-1544FFDACED2}.exe" {0FC9183B-BD88-4103-9A79-68504DAC337F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{17B620FC-6799-4397-A1DB-2C1833911AA7} {923AFF73-DAFD-4101-9102-1544FFDACED2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}\stubpath = "C:\\Windows\\{E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe" 1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DEF37D0D-7E14-46e1-AA03-C668E96A07BA} {FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe -
Deletes itself 1 IoCs
pid Process 3052 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2080 {E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe 2764 {FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe 2692 {DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe 2560 {8DC3B475-2881-4142-9147-6607EA9FF666}.exe 2576 {88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe 1752 {B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe 1048 {0FC9183B-BD88-4103-9A79-68504DAC337F}.exe 1432 {923AFF73-DAFD-4101-9102-1544FFDACED2}.exe 2744 {17B620FC-6799-4397-A1DB-2C1833911AA7}.exe 1244 {91C077E5-2B5A-45f1-80EB-5EE49D2189CB}.exe 1812 {6EC975BA-0253-4608-A4F8-3AB6EB1CA13F}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{8DC3B475-2881-4142-9147-6607EA9FF666}.exe {DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe File created C:\Windows\{B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe {88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe File created C:\Windows\{0FC9183B-BD88-4103-9A79-68504DAC337F}.exe {B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe File created C:\Windows\{E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe 1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe File created C:\Windows\{FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe {E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe File created C:\Windows\{DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe {FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe File created C:\Windows\{88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe {8DC3B475-2881-4142-9147-6607EA9FF666}.exe File created C:\Windows\{923AFF73-DAFD-4101-9102-1544FFDACED2}.exe {0FC9183B-BD88-4103-9A79-68504DAC337F}.exe File created C:\Windows\{17B620FC-6799-4397-A1DB-2C1833911AA7}.exe {923AFF73-DAFD-4101-9102-1544FFDACED2}.exe File created C:\Windows\{91C077E5-2B5A-45f1-80EB-5EE49D2189CB}.exe {17B620FC-6799-4397-A1DB-2C1833911AA7}.exe File created C:\Windows\{6EC975BA-0253-4608-A4F8-3AB6EB1CA13F}.exe {91C077E5-2B5A-45f1-80EB-5EE49D2189CB}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2244 1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe Token: SeIncBasePriorityPrivilege 2080 {E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe Token: SeIncBasePriorityPrivilege 2764 {FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe Token: SeIncBasePriorityPrivilege 2692 {DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe Token: SeIncBasePriorityPrivilege 2560 {8DC3B475-2881-4142-9147-6607EA9FF666}.exe Token: SeIncBasePriorityPrivilege 2576 {88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe Token: SeIncBasePriorityPrivilege 1752 {B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe Token: SeIncBasePriorityPrivilege 1048 {0FC9183B-BD88-4103-9A79-68504DAC337F}.exe Token: SeIncBasePriorityPrivilege 1432 {923AFF73-DAFD-4101-9102-1544FFDACED2}.exe Token: SeIncBasePriorityPrivilege 2744 {17B620FC-6799-4397-A1DB-2C1833911AA7}.exe Token: SeIncBasePriorityPrivilege 1244 {91C077E5-2B5A-45f1-80EB-5EE49D2189CB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2080 2244 1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe 28 PID 2244 wrote to memory of 2080 2244 1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe 28 PID 2244 wrote to memory of 2080 2244 1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe 28 PID 2244 wrote to memory of 2080 2244 1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe 28 PID 2244 wrote to memory of 3052 2244 1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe 29 PID 2244 wrote to memory of 3052 2244 1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe 29 PID 2244 wrote to memory of 3052 2244 1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe 29 PID 2244 wrote to memory of 3052 2244 1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe 29 PID 2080 wrote to memory of 2764 2080 {E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe 30 PID 2080 wrote to memory of 2764 2080 {E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe 30 PID 2080 wrote to memory of 2764 2080 {E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe 30 PID 2080 wrote to memory of 2764 2080 {E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe 30 PID 2080 wrote to memory of 2524 2080 {E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe 31 PID 2080 wrote to memory of 2524 2080 {E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe 31 PID 2080 wrote to memory of 2524 2080 {E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe 31 PID 2080 wrote to memory of 2524 2080 {E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe 31 PID 2764 wrote to memory of 2692 2764 {FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe 32 PID 2764 wrote to memory of 2692 2764 {FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe 32 PID 2764 wrote to memory of 2692 2764 {FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe 32 PID 2764 wrote to memory of 2692 2764 {FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe 32 PID 2764 wrote to memory of 1696 2764 {FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe 33 PID 2764 wrote to memory of 1696 2764 {FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe 33 PID 2764 wrote to memory of 1696 2764 {FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe 33 PID 2764 wrote to memory of 1696 2764 {FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe 33 PID 2692 wrote to memory of 2560 2692 {DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe 36 PID 2692 wrote to memory of 2560 2692 {DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe 36 PID 2692 wrote to memory of 2560 2692 {DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe 36 PID 2692 wrote to memory of 2560 2692 {DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe 36 PID 2692 wrote to memory of 316 2692 {DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe 37 PID 2692 wrote to memory of 316 2692 {DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe 37 PID 2692 wrote to memory of 316 2692 {DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe 37 PID 2692 wrote to memory of 316 2692 {DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe 37 PID 2560 wrote to memory of 2576 2560 {8DC3B475-2881-4142-9147-6607EA9FF666}.exe 38 PID 2560 wrote to memory of 2576 2560 {8DC3B475-2881-4142-9147-6607EA9FF666}.exe 38 PID 2560 wrote to memory of 2576 2560 {8DC3B475-2881-4142-9147-6607EA9FF666}.exe 38 PID 2560 wrote to memory of 2576 2560 {8DC3B475-2881-4142-9147-6607EA9FF666}.exe 38 PID 2560 wrote to memory of 1800 2560 {8DC3B475-2881-4142-9147-6607EA9FF666}.exe 39 PID 2560 wrote to memory of 1800 2560 {8DC3B475-2881-4142-9147-6607EA9FF666}.exe 39 PID 2560 wrote to memory of 1800 2560 {8DC3B475-2881-4142-9147-6607EA9FF666}.exe 39 PID 2560 wrote to memory of 1800 2560 {8DC3B475-2881-4142-9147-6607EA9FF666}.exe 39 PID 2576 wrote to memory of 1752 2576 {88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe 40 PID 2576 wrote to memory of 1752 2576 {88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe 40 PID 2576 wrote to memory of 1752 2576 {88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe 40 PID 2576 wrote to memory of 1752 2576 {88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe 40 PID 2576 wrote to memory of 1988 2576 {88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe 41 PID 2576 wrote to memory of 1988 2576 {88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe 41 PID 2576 wrote to memory of 1988 2576 {88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe 41 PID 2576 wrote to memory of 1988 2576 {88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe 41 PID 1752 wrote to memory of 1048 1752 {B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe 42 PID 1752 wrote to memory of 1048 1752 {B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe 42 PID 1752 wrote to memory of 1048 1752 {B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe 42 PID 1752 wrote to memory of 1048 1752 {B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe 42 PID 1752 wrote to memory of 760 1752 {B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe 43 PID 1752 wrote to memory of 760 1752 {B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe 43 PID 1752 wrote to memory of 760 1752 {B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe 43 PID 1752 wrote to memory of 760 1752 {B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe 43 PID 1048 wrote to memory of 1432 1048 {0FC9183B-BD88-4103-9A79-68504DAC337F}.exe 44 PID 1048 wrote to memory of 1432 1048 {0FC9183B-BD88-4103-9A79-68504DAC337F}.exe 44 PID 1048 wrote to memory of 1432 1048 {0FC9183B-BD88-4103-9A79-68504DAC337F}.exe 44 PID 1048 wrote to memory of 1432 1048 {0FC9183B-BD88-4103-9A79-68504DAC337F}.exe 44 PID 1048 wrote to memory of 2344 1048 {0FC9183B-BD88-4103-9A79-68504DAC337F}.exe 45 PID 1048 wrote to memory of 2344 1048 {0FC9183B-BD88-4103-9A79-68504DAC337F}.exe 45 PID 1048 wrote to memory of 2344 1048 {0FC9183B-BD88-4103-9A79-68504DAC337F}.exe 45 PID 1048 wrote to memory of 2344 1048 {0FC9183B-BD88-4103-9A79-68504DAC337F}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1dac16f56ee63b1b03619138ae17a3a0_NeikiAnalytics.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\{E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exeC:\Windows\{E15A96AA-3A2E-49ac-B22C-B364B4E4D8CF}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\{FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exeC:\Windows\{FE75D9D2-AD8E-4536-92C9-0ECC68B9E395}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\{DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exeC:\Windows\{DEF37D0D-7E14-46e1-AA03-C668E96A07BA}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\{8DC3B475-2881-4142-9147-6607EA9FF666}.exeC:\Windows\{8DC3B475-2881-4142-9147-6607EA9FF666}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\{88D8881F-2797-4265-8B78-2A95E5E79CB6}.exeC:\Windows\{88D8881F-2797-4265-8B78-2A95E5E79CB6}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\{B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exeC:\Windows\{B5E7F2B5-EA33-426d-A5E6-75E862BB4467}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\{0FC9183B-BD88-4103-9A79-68504DAC337F}.exeC:\Windows\{0FC9183B-BD88-4103-9A79-68504DAC337F}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\{923AFF73-DAFD-4101-9102-1544FFDACED2}.exeC:\Windows\{923AFF73-DAFD-4101-9102-1544FFDACED2}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Windows\{17B620FC-6799-4397-A1DB-2C1833911AA7}.exeC:\Windows\{17B620FC-6799-4397-A1DB-2C1833911AA7}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\{91C077E5-2B5A-45f1-80EB-5EE49D2189CB}.exeC:\Windows\{91C077E5-2B5A-45f1-80EB-5EE49D2189CB}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1244 -
C:\Windows\{6EC975BA-0253-4608-A4F8-3AB6EB1CA13F}.exeC:\Windows\{6EC975BA-0253-4608-A4F8-3AB6EB1CA13F}.exe12⤵
- Executes dropped EXE
PID:1812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{91C07~1.EXE > nul12⤵PID:2916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{17B62~1.EXE > nul11⤵PID:644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{923AF~1.EXE > nul10⤵PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0FC91~1.EXE > nul9⤵PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B5E7F~1.EXE > nul8⤵PID:760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{88D88~1.EXE > nul7⤵PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8DC3B~1.EXE > nul6⤵PID:1800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DEF37~1.EXE > nul5⤵PID:316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FE75D~1.EXE > nul4⤵PID:1696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E15A9~1.EXE > nul3⤵PID:2524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\1DAC16~1.EXE > nul2⤵
- Deletes itself
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5ccd649d32d70856f69c37d313c053f7d
SHA1263e70d2e4ac6144ad2ba3579f4c65527217c3ff
SHA256ab571d7ecbbe44c6ad0e49412b04c92ae91d3ee0ca0196559af15b337ffd94c3
SHA5123992bb7530113d87ff1be418fa8baa3fc6ee992f354534335a4556c6f9c4dc4e78b13c2951d392d4640abbf890f223f7e4d648e31b1683e256db5420b68863cc
-
Filesize
64KB
MD50dd220ce808b9eab13b3a93bcec2ab23
SHA12c90183294d65b6f1f29226cd272de36c5e51b52
SHA256537614cc945b98722630a1c802d317adf890a692c317ae97d91bf064aca8bb78
SHA512f784dae32f66d3741a76bf67cb0cd2b2c6445204bbfd535b6a688e7f22535c378a7764eadf1c98af8927f5a8050f4ab9abf82b65cf1fae2a7245f26055a22400
-
Filesize
64KB
MD5e4091cadc041881d8a5af5ca82ece714
SHA19542c2fb554484af014ece232763d47149de314d
SHA25616b56629a13e690fee4af5a5e072e44489551c4b65376aeeb67e2444f8202dd7
SHA5129ed354b8397986359811cfdd220a66ece72f78c0c891518d3da91559e22aa649071bb4e9ac109f8aed5851066960548d8fb6a2c1a3fdab28a5fb3377d8ea7b2e
-
Filesize
64KB
MD5bbf3bf9bb76ffc8b96a40fb41b4eabcf
SHA1afa879013033eea1efd113709a0450674668ff03
SHA25626765d414f411e1bed8442d28aa9536f55058a384a590b09aad57a1fb5501f11
SHA51275f5a24f4ae4f1ae02450b0226d7885a11c31286c8b0499e1049a0a94fce344686ed2b661bc373fb28bd8b201faf54cc43df74f3594cc1a75aed3630bc97260a
-
Filesize
64KB
MD50dc67372e2bb95f69790097a2ec73fb2
SHA1b6014da9f306adbe63263097f72c5d8e55ecbc58
SHA2563899f81184b226f8e42b8563275d0f6405f2b46539f0df9da5fb3d2480573acd
SHA512cecee173376894d5618186a545972f2f28365d57a6b130b567a06b577cca22c9d56a56d5099c2f62efcc85810410d2224d17d6eb162eccd8982c122f86cf1a67
-
Filesize
64KB
MD589f04650ed1d42986384324afdc49f04
SHA140687c2e0ae7473b769ee0bb45f26078b40582fc
SHA2569c6d5e31e126f36e64506bd343fc16b4f452ff04620892766c499e8b45ab0fd3
SHA512f0d1cfc3b9f716133f7e8bc421c8a3b4b5232c817e5d3c52b2e161e606e60c3af76fc0fda8d99191558a854dc5f0f9e9997da212ac987689b11365138f352d79
-
Filesize
64KB
MD58926da9d4ca5242a5b818732d0efa32b
SHA1409bd5fb64f91f1258951691a86a427947f3f591
SHA25602467b25dc34e179ed8ae4d7bd83fcdf94d688d2085390e6d96fc879144a214d
SHA51250b6040627d3cc248ef58fa664de03016280db761290abb0bae94f65f953750fe584bdcd3869adf42b6cce7e37dde8d0ba13c9a3e88df5b328b7b82fa60fc957
-
Filesize
64KB
MD50920719892d387f54fafe3b681d911e3
SHA1068e1ca4bb62cd0c124d9496e865a7c74902f480
SHA25692679fd4d6320430b087da2f387d224a6a64068449fe1982af5fda96174af2b3
SHA512e891368f2c41c322bd51b52579ea95763e57f2cde4d5afb61160eb24142315b5b73be4e8244252c0839eec4ed40da2baf8a566c431c2a6d30f48d2af07f05511
-
Filesize
64KB
MD56de27e854362e36bfde891b370dbd76c
SHA16e90ed03fb70882aaf7e735ef1e5c439d2038ce6
SHA256d033d47e8828dabb55445f524232a2279ebdedda4529e61e2a55c4d02592216a
SHA51204c3df72bc8d75420f343f9e2a0982f01cc9d8518015923c25baf75b9955adac1b5d554f1726f30455f75ad043dd45df757e559b52693d3db3643f4b930bb08a
-
Filesize
64KB
MD56f38e61bffff16a2b1836eef09fbc03b
SHA1b51cc2398bafd31ce11e8d3b8434330d218e0def
SHA256e02ef515dc8e9dde7c8fc2bce331b5093edcf66383c42d825ea99a551818c56f
SHA512e6b1f7aabde463a891ad12443447d539ffbf72561401dcaf8eaadda9e0e336e70080f7c2558828fe0b8e2b9f26d515032cc5c7213765d69c76263a0f628a5370
-
Filesize
64KB
MD5f16d780ba277a27d733d4a5f6ebb2504
SHA1bd2f3acc679a4f76771c41ac460c0adafc3ff03e
SHA256a34098fa0a29a0cff006078cc29da179234db17f09cdbbb202e3580ca5dd0d21
SHA512cdef5cb65a92691cfb28240720d142d97226ee4e901a81e0e1c2bedaa8f7f24f13778e2bc159c4d91770f9be80f82c1bf493324bc58e4972e4205b61a7821363