Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07/06/2024, 10:34
Behavioral task
behavioral1
Sample
4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe
-
Size
5.9MB
-
MD5
4eb881353e63084320c01d50069a2ac0
-
SHA1
2b97f2b57a8c40ac260a587d63e3b1e5f2e68c09
-
SHA256
36783adadb7d8a8bf81bde0ab340d8ea3a8cfc24a0094ab69839972cec487a30
-
SHA512
e5462c5abd1cd4874492c4f77bcf9097a6a54800c1f43f56f063f2047eaadd9c538e15122490bf3098dff2e9f6a91c5c4f82632f7b015e3296c1dc56ab2da80a
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32lUU:Q+856utgpPF8u/7U
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x000b000000014323-5.dat cobalt_reflective_dll behavioral1/files/0x0035000000014588-10.dat cobalt_reflective_dll behavioral1/files/0x000700000001480e-12.dat cobalt_reflective_dll behavioral1/files/0x00070000000149e1-22.dat cobalt_reflective_dll behavioral1/files/0x0007000000014b10-34.dat cobalt_reflective_dll behavioral1/files/0x0007000000014b36-39.dat cobalt_reflective_dll behavioral1/files/0x0035000000014662-43.dat cobalt_reflective_dll behavioral1/files/0x0009000000014dae-51.dat cobalt_reflective_dll behavioral1/files/0x0007000000015c85-59.dat cobalt_reflective_dll behavioral1/files/0x0006000000015c93-68.dat cobalt_reflective_dll behavioral1/files/0x0006000000015cbd-90.dat cobalt_reflective_dll behavioral1/files/0x0006000000015cce-98.dat cobalt_reflective_dll behavioral1/files/0x0006000000015c9c-75.dat cobalt_reflective_dll behavioral1/files/0x0006000000015cb0-83.dat cobalt_reflective_dll behavioral1/files/0x0006000000015cd9-103.dat cobalt_reflective_dll behavioral1/files/0x0006000000015ce3-108.dat cobalt_reflective_dll behavioral1/files/0x0006000000015cf5-113.dat cobalt_reflective_dll behavioral1/files/0x0006000000015d0c-117.dat cobalt_reflective_dll behavioral1/files/0x0006000000015d24-124.dat cobalt_reflective_dll behavioral1/files/0x0006000000015d44-131.dat cobalt_reflective_dll behavioral1/files/0x0006000000015d4c-132.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 61 IoCs
resource yara_rule behavioral1/memory/1804-0-0x000000013FFF0000-0x0000000140344000-memory.dmp xmrig behavioral1/files/0x000b000000014323-5.dat xmrig behavioral1/memory/2256-9-0x000000013FC70000-0x000000013FFC4000-memory.dmp xmrig behavioral1/files/0x0035000000014588-10.dat xmrig behavioral1/memory/3048-15-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig behavioral1/files/0x000700000001480e-12.dat xmrig behavioral1/memory/2608-24-0x000000013F340000-0x000000013F694000-memory.dmp xmrig behavioral1/files/0x00070000000149e1-22.dat xmrig behavioral1/memory/2884-36-0x000000013FDA0000-0x00000001400F4000-memory.dmp xmrig behavioral1/files/0x0007000000014b10-34.dat xmrig behavioral1/files/0x0007000000014b36-39.dat xmrig behavioral1/memory/2732-42-0x000000013F320000-0x000000013F674000-memory.dmp xmrig behavioral1/memory/2668-32-0x000000013F710000-0x000000013FA64000-memory.dmp xmrig behavioral1/files/0x0035000000014662-43.dat xmrig behavioral1/memory/3020-50-0x000000013F950000-0x000000013FCA4000-memory.dmp xmrig behavioral1/memory/1804-49-0x000000013FFF0000-0x0000000140344000-memory.dmp xmrig behavioral1/files/0x0009000000014dae-51.dat xmrig behavioral1/memory/3048-55-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig behavioral1/memory/2608-57-0x000000013F340000-0x000000013F694000-memory.dmp xmrig behavioral1/memory/2468-58-0x000000013FC20000-0x000000013FF74000-memory.dmp xmrig behavioral1/files/0x0007000000015c85-59.dat xmrig behavioral1/memory/2532-65-0x000000013F780000-0x000000013FAD4000-memory.dmp xmrig behavioral1/files/0x0006000000015c93-68.dat xmrig behavioral1/memory/2976-72-0x000000013F0F0000-0x000000013F444000-memory.dmp xmrig behavioral1/memory/2800-87-0x000000013FE10000-0x0000000140164000-memory.dmp xmrig behavioral1/memory/1804-85-0x00000000023A0000-0x00000000026F4000-memory.dmp xmrig behavioral1/files/0x0006000000015cbd-90.dat xmrig behavioral1/memory/2924-95-0x000000013F9B0000-0x000000013FD04000-memory.dmp xmrig behavioral1/memory/2732-92-0x000000013F320000-0x000000013F674000-memory.dmp xmrig behavioral1/memory/2668-77-0x000000013F710000-0x000000013FA64000-memory.dmp xmrig behavioral1/memory/2884-84-0x000000013FDA0000-0x00000001400F4000-memory.dmp xmrig behavioral1/files/0x0006000000015cce-98.dat xmrig behavioral1/memory/1812-101-0x000000013F550000-0x000000013F8A4000-memory.dmp xmrig behavioral1/memory/1804-100-0x000000013F550000-0x000000013F8A4000-memory.dmp xmrig behavioral1/files/0x0006000000015c9c-75.dat xmrig behavioral1/files/0x0006000000015cb0-83.dat xmrig behavioral1/memory/1816-82-0x000000013F180000-0x000000013F4D4000-memory.dmp xmrig behavioral1/files/0x0006000000015cd9-103.dat xmrig behavioral1/files/0x0006000000015ce3-108.dat xmrig behavioral1/files/0x0006000000015cf5-113.dat xmrig behavioral1/files/0x0006000000015d0c-117.dat xmrig behavioral1/files/0x0006000000015d24-124.dat xmrig behavioral1/files/0x0006000000015d44-131.dat xmrig behavioral1/files/0x0006000000015d4c-132.dat xmrig behavioral1/memory/1804-138-0x000000013F780000-0x000000013FAD4000-memory.dmp xmrig behavioral1/memory/1816-139-0x000000013F180000-0x000000013F4D4000-memory.dmp xmrig behavioral1/memory/1812-144-0x000000013F550000-0x000000013F8A4000-memory.dmp xmrig behavioral1/memory/2256-145-0x000000013FC70000-0x000000013FFC4000-memory.dmp xmrig behavioral1/memory/3048-146-0x000000013F090000-0x000000013F3E4000-memory.dmp xmrig behavioral1/memory/2608-147-0x000000013F340000-0x000000013F694000-memory.dmp xmrig behavioral1/memory/2668-148-0x000000013F710000-0x000000013FA64000-memory.dmp xmrig behavioral1/memory/2884-149-0x000000013FDA0000-0x00000001400F4000-memory.dmp xmrig behavioral1/memory/2732-150-0x000000013F320000-0x000000013F674000-memory.dmp xmrig behavioral1/memory/3020-151-0x000000013F950000-0x000000013FCA4000-memory.dmp xmrig behavioral1/memory/2468-152-0x000000013FC20000-0x000000013FF74000-memory.dmp xmrig behavioral1/memory/2532-153-0x000000013F780000-0x000000013FAD4000-memory.dmp xmrig behavioral1/memory/2976-154-0x000000013F0F0000-0x000000013F444000-memory.dmp xmrig behavioral1/memory/1816-155-0x000000013F180000-0x000000013F4D4000-memory.dmp xmrig behavioral1/memory/2800-156-0x000000013FE10000-0x0000000140164000-memory.dmp xmrig behavioral1/memory/2924-157-0x000000013F9B0000-0x000000013FD04000-memory.dmp xmrig behavioral1/memory/1812-158-0x000000013F550000-0x000000013F8A4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2256 BwxncLl.exe 3048 GopgVBB.exe 2608 QqNELKf.exe 2668 MFbtxLr.exe 2884 RaaAZMG.exe 2732 ilCdiPq.exe 3020 hyDNNdJ.exe 2468 riMZUrC.exe 2532 jlNcIyu.exe 2976 LwVOOMp.exe 1816 DoJdelZ.exe 2800 ywAOcTf.exe 2924 YEHYYhX.exe 1812 NcRUrfr.exe 772 cZbaArm.exe 1436 JzVCFcJ.exe 768 PMqNGmG.exe 1732 VTMUArY.exe 2536 QYLUBks.exe 2772 DnCjSNU.exe 1888 oiQIpIh.exe -
Loads dropped DLL 21 IoCs
pid Process 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/1804-0-0x000000013FFF0000-0x0000000140344000-memory.dmp upx behavioral1/files/0x000b000000014323-5.dat upx behavioral1/memory/2256-9-0x000000013FC70000-0x000000013FFC4000-memory.dmp upx behavioral1/files/0x0035000000014588-10.dat upx behavioral1/memory/3048-15-0x000000013F090000-0x000000013F3E4000-memory.dmp upx behavioral1/files/0x000700000001480e-12.dat upx behavioral1/memory/2608-24-0x000000013F340000-0x000000013F694000-memory.dmp upx behavioral1/files/0x00070000000149e1-22.dat upx behavioral1/memory/2884-36-0x000000013FDA0000-0x00000001400F4000-memory.dmp upx behavioral1/files/0x0007000000014b10-34.dat upx behavioral1/files/0x0007000000014b36-39.dat upx behavioral1/memory/2732-42-0x000000013F320000-0x000000013F674000-memory.dmp upx behavioral1/memory/2668-32-0x000000013F710000-0x000000013FA64000-memory.dmp upx behavioral1/files/0x0035000000014662-43.dat upx behavioral1/memory/3020-50-0x000000013F950000-0x000000013FCA4000-memory.dmp upx behavioral1/memory/1804-49-0x000000013FFF0000-0x0000000140344000-memory.dmp upx behavioral1/files/0x0009000000014dae-51.dat upx behavioral1/memory/3048-55-0x000000013F090000-0x000000013F3E4000-memory.dmp upx behavioral1/memory/2608-57-0x000000013F340000-0x000000013F694000-memory.dmp upx behavioral1/memory/2468-58-0x000000013FC20000-0x000000013FF74000-memory.dmp upx behavioral1/files/0x0007000000015c85-59.dat upx behavioral1/memory/2532-65-0x000000013F780000-0x000000013FAD4000-memory.dmp upx behavioral1/files/0x0006000000015c93-68.dat upx behavioral1/memory/2976-72-0x000000013F0F0000-0x000000013F444000-memory.dmp upx behavioral1/memory/2800-87-0x000000013FE10000-0x0000000140164000-memory.dmp upx behavioral1/files/0x0006000000015cbd-90.dat upx behavioral1/memory/2924-95-0x000000013F9B0000-0x000000013FD04000-memory.dmp upx behavioral1/memory/2732-92-0x000000013F320000-0x000000013F674000-memory.dmp upx behavioral1/memory/2668-77-0x000000013F710000-0x000000013FA64000-memory.dmp upx behavioral1/memory/2884-84-0x000000013FDA0000-0x00000001400F4000-memory.dmp upx behavioral1/files/0x0006000000015cce-98.dat upx behavioral1/memory/1812-101-0x000000013F550000-0x000000013F8A4000-memory.dmp upx behavioral1/files/0x0006000000015c9c-75.dat upx behavioral1/files/0x0006000000015cb0-83.dat upx behavioral1/memory/1816-82-0x000000013F180000-0x000000013F4D4000-memory.dmp upx behavioral1/files/0x0006000000015cd9-103.dat upx behavioral1/files/0x0006000000015ce3-108.dat upx behavioral1/files/0x0006000000015cf5-113.dat upx behavioral1/files/0x0006000000015d0c-117.dat upx behavioral1/files/0x0006000000015d24-124.dat upx behavioral1/files/0x0006000000015d44-131.dat upx behavioral1/files/0x0006000000015d4c-132.dat upx behavioral1/memory/1816-139-0x000000013F180000-0x000000013F4D4000-memory.dmp upx behavioral1/memory/1812-144-0x000000013F550000-0x000000013F8A4000-memory.dmp upx behavioral1/memory/2256-145-0x000000013FC70000-0x000000013FFC4000-memory.dmp upx behavioral1/memory/3048-146-0x000000013F090000-0x000000013F3E4000-memory.dmp upx behavioral1/memory/2608-147-0x000000013F340000-0x000000013F694000-memory.dmp upx behavioral1/memory/2668-148-0x000000013F710000-0x000000013FA64000-memory.dmp upx behavioral1/memory/2884-149-0x000000013FDA0000-0x00000001400F4000-memory.dmp upx behavioral1/memory/2732-150-0x000000013F320000-0x000000013F674000-memory.dmp upx behavioral1/memory/3020-151-0x000000013F950000-0x000000013FCA4000-memory.dmp upx behavioral1/memory/2468-152-0x000000013FC20000-0x000000013FF74000-memory.dmp upx behavioral1/memory/2532-153-0x000000013F780000-0x000000013FAD4000-memory.dmp upx behavioral1/memory/2976-154-0x000000013F0F0000-0x000000013F444000-memory.dmp upx behavioral1/memory/1816-155-0x000000013F180000-0x000000013F4D4000-memory.dmp upx behavioral1/memory/2800-156-0x000000013FE10000-0x0000000140164000-memory.dmp upx behavioral1/memory/2924-157-0x000000013F9B0000-0x000000013FD04000-memory.dmp upx behavioral1/memory/1812-158-0x000000013F550000-0x000000013F8A4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\JzVCFcJ.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\VTMUArY.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\cZbaArm.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\PMqNGmG.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\QYLUBks.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\DnCjSNU.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\QqNELKf.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\MFbtxLr.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\ilCdiPq.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\DoJdelZ.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\oiQIpIh.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\BwxncLl.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\GopgVBB.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\jlNcIyu.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\YEHYYhX.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\ywAOcTf.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\NcRUrfr.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\RaaAZMG.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\hyDNNdJ.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\riMZUrC.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe File created C:\Windows\System\LwVOOMp.exe 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe Token: SeLockMemoryPrivilege 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2256 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 29 PID 1804 wrote to memory of 2256 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 29 PID 1804 wrote to memory of 2256 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 29 PID 1804 wrote to memory of 3048 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 30 PID 1804 wrote to memory of 3048 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 30 PID 1804 wrote to memory of 3048 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 30 PID 1804 wrote to memory of 2608 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 31 PID 1804 wrote to memory of 2608 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 31 PID 1804 wrote to memory of 2608 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 31 PID 1804 wrote to memory of 2668 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 32 PID 1804 wrote to memory of 2668 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 32 PID 1804 wrote to memory of 2668 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 32 PID 1804 wrote to memory of 2884 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 33 PID 1804 wrote to memory of 2884 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 33 PID 1804 wrote to memory of 2884 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 33 PID 1804 wrote to memory of 2732 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 34 PID 1804 wrote to memory of 2732 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 34 PID 1804 wrote to memory of 2732 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 34 PID 1804 wrote to memory of 3020 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 35 PID 1804 wrote to memory of 3020 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 35 PID 1804 wrote to memory of 3020 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 35 PID 1804 wrote to memory of 2468 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 36 PID 1804 wrote to memory of 2468 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 36 PID 1804 wrote to memory of 2468 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 36 PID 1804 wrote to memory of 2532 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 37 PID 1804 wrote to memory of 2532 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 37 PID 1804 wrote to memory of 2532 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 37 PID 1804 wrote to memory of 2976 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 38 PID 1804 wrote to memory of 2976 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 38 PID 1804 wrote to memory of 2976 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 38 PID 1804 wrote to memory of 1816 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 39 PID 1804 wrote to memory of 1816 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 39 PID 1804 wrote to memory of 1816 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 39 PID 1804 wrote to memory of 2800 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 40 PID 1804 wrote to memory of 2800 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 40 PID 1804 wrote to memory of 2800 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 40 PID 1804 wrote to memory of 2924 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 41 PID 1804 wrote to memory of 2924 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 41 PID 1804 wrote to memory of 2924 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 41 PID 1804 wrote to memory of 1812 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 42 PID 1804 wrote to memory of 1812 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 42 PID 1804 wrote to memory of 1812 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 42 PID 1804 wrote to memory of 772 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 43 PID 1804 wrote to memory of 772 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 43 PID 1804 wrote to memory of 772 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 43 PID 1804 wrote to memory of 1436 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 44 PID 1804 wrote to memory of 1436 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 44 PID 1804 wrote to memory of 1436 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 44 PID 1804 wrote to memory of 768 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 45 PID 1804 wrote to memory of 768 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 45 PID 1804 wrote to memory of 768 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 45 PID 1804 wrote to memory of 1732 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 46 PID 1804 wrote to memory of 1732 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 46 PID 1804 wrote to memory of 1732 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 46 PID 1804 wrote to memory of 2536 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 47 PID 1804 wrote to memory of 2536 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 47 PID 1804 wrote to memory of 2536 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 47 PID 1804 wrote to memory of 2772 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 48 PID 1804 wrote to memory of 2772 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 48 PID 1804 wrote to memory of 2772 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 48 PID 1804 wrote to memory of 1888 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 49 PID 1804 wrote to memory of 1888 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 49 PID 1804 wrote to memory of 1888 1804 4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4eb881353e63084320c01d50069a2ac0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\System\BwxncLl.exeC:\Windows\System\BwxncLl.exe2⤵
- Executes dropped EXE
PID:2256
-
-
C:\Windows\System\GopgVBB.exeC:\Windows\System\GopgVBB.exe2⤵
- Executes dropped EXE
PID:3048
-
-
C:\Windows\System\QqNELKf.exeC:\Windows\System\QqNELKf.exe2⤵
- Executes dropped EXE
PID:2608
-
-
C:\Windows\System\MFbtxLr.exeC:\Windows\System\MFbtxLr.exe2⤵
- Executes dropped EXE
PID:2668
-
-
C:\Windows\System\RaaAZMG.exeC:\Windows\System\RaaAZMG.exe2⤵
- Executes dropped EXE
PID:2884
-
-
C:\Windows\System\ilCdiPq.exeC:\Windows\System\ilCdiPq.exe2⤵
- Executes dropped EXE
PID:2732
-
-
C:\Windows\System\hyDNNdJ.exeC:\Windows\System\hyDNNdJ.exe2⤵
- Executes dropped EXE
PID:3020
-
-
C:\Windows\System\riMZUrC.exeC:\Windows\System\riMZUrC.exe2⤵
- Executes dropped EXE
PID:2468
-
-
C:\Windows\System\jlNcIyu.exeC:\Windows\System\jlNcIyu.exe2⤵
- Executes dropped EXE
PID:2532
-
-
C:\Windows\System\LwVOOMp.exeC:\Windows\System\LwVOOMp.exe2⤵
- Executes dropped EXE
PID:2976
-
-
C:\Windows\System\DoJdelZ.exeC:\Windows\System\DoJdelZ.exe2⤵
- Executes dropped EXE
PID:1816
-
-
C:\Windows\System\ywAOcTf.exeC:\Windows\System\ywAOcTf.exe2⤵
- Executes dropped EXE
PID:2800
-
-
C:\Windows\System\YEHYYhX.exeC:\Windows\System\YEHYYhX.exe2⤵
- Executes dropped EXE
PID:2924
-
-
C:\Windows\System\NcRUrfr.exeC:\Windows\System\NcRUrfr.exe2⤵
- Executes dropped EXE
PID:1812
-
-
C:\Windows\System\cZbaArm.exeC:\Windows\System\cZbaArm.exe2⤵
- Executes dropped EXE
PID:772
-
-
C:\Windows\System\JzVCFcJ.exeC:\Windows\System\JzVCFcJ.exe2⤵
- Executes dropped EXE
PID:1436
-
-
C:\Windows\System\PMqNGmG.exeC:\Windows\System\PMqNGmG.exe2⤵
- Executes dropped EXE
PID:768
-
-
C:\Windows\System\VTMUArY.exeC:\Windows\System\VTMUArY.exe2⤵
- Executes dropped EXE
PID:1732
-
-
C:\Windows\System\QYLUBks.exeC:\Windows\System\QYLUBks.exe2⤵
- Executes dropped EXE
PID:2536
-
-
C:\Windows\System\DnCjSNU.exeC:\Windows\System\DnCjSNU.exe2⤵
- Executes dropped EXE
PID:2772
-
-
C:\Windows\System\oiQIpIh.exeC:\Windows\System\oiQIpIh.exe2⤵
- Executes dropped EXE
PID:1888
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD5694794bcdca01fc19fada51b28539721
SHA1be18a1834d5bf9ad26a4f16be7da4f52c59ff965
SHA25666e6a6e0060038ff1ee49d506461198063c4546bb2f7204418b764e32a344152
SHA51291cb1b0cd500e338b6dd60e2ad886e73d48b72b365f33ec3bd599227947eeddec00bb54f2d8b563ddb99063dc8f86a310cc41816bf6db764bc12e50d337d2be8
-
Filesize
5.9MB
MD54e8575fc718275e26a39b90dca5fed6e
SHA1f7455b0b4b2f0608e5ff5ac67c868180f46b706b
SHA256150bfa4498cdc7a0067b46a666b2fa2f0168ddcf87ec514c7f34f562a75557d4
SHA5124c212e7add337ec9a714803dcd0b1605d2a09dd7875e71b62be92753c88534a59d7bc08a57a6682d245a233ba967c0125560f534031ced5194ea7805051b7e91
-
Filesize
5.9MB
MD5afc5e5345a3f6f3ff76b578448a140fc
SHA18478c7cae40e977cef5f5e665486588a5fc19ec2
SHA256b8fa3fcff8b336e50fcff4f9ee74aa42dd7824fde1e18ea945bd2d5445e0958f
SHA51277a1f7536fb5425bd026f137ebc751eb0841736abe81296cdfe28ee387907b0c870c4138365a794ff28c32b5e2e1f1dc200b387eefc84d8e43f827258ddf5f3c
-
Filesize
5.9MB
MD5d3cba9e5bc44c4c30b22d876fc913342
SHA1e3c069b383ab9fcf8717418fd329b04ed63ff9ec
SHA256e3680f8e7e01718ae53dd47e4c685fed84d06480bfaff94c611c42d16881962c
SHA512d1fcffc8f699ba30585e05607cf484d478e5f5579e1a8a074c12cfcef4550e030b2d587e6a9663fc1e6cdd74ecbd4f1e6f0b97d6cc7308af1698c288d6aa4dea
-
Filesize
5.9MB
MD598cae4886def3487b26bad83dd45bfe6
SHA194cb6ebe823a687169801dde973a0a4078c9e249
SHA25671016a3ba90c0e2d6b7f2ee173e2657f9aad7385394d8a55850e54acc5cba3ba
SHA512a06a37b9e395fed84967d065c6af0205dbd8a3f743c8937cb4a5777d038814f0f8ba40ad209cbb64968aceaf0e5d7647809567e33ce31b1d5484dc3e1e5b595a
-
Filesize
5.9MB
MD54f59437214553655ce1bb0afcfbe99e6
SHA1178d4ea2af3f6b0972a8a2474f354875288a4fe4
SHA2563ea33de53dace6b9144a988638c735db470301860667a8ce2a981f2a619e1f1f
SHA5122098fd4e1057d173194f45bf97d48fe14369c9470ac04038b207289a7750043fa5e452cc7c4b7ad7029e37426b898d7d9ae13ec4de2e637cd775bb1c50e29bd2
-
Filesize
5.9MB
MD5c6f5372fc037fe68d96aa73271a84c4f
SHA1896967d55432a445567e37acb0727e896ae2fd13
SHA256bbd9d740ac18f07883b0fcf77b5f8384d80314e4a52c7647b16bcd6111ed74bf
SHA5121b64999fbf53f98d6e249a4bd7b603b0dfb6911256abb9fb435ebe1772efa7de24a69198bc7fba977f469206329b435d35ba17bf778ccf94d6df7d492599eebf
-
Filesize
5.9MB
MD503d560a85a52e9b8f4489f2d6ca3a9f8
SHA1888ac559c5075d66bbbcc53b541b79ab99494d4b
SHA25699e405cf0ba983736587cadca061cc625f730dd64a126c4b8a34ef5622c77b86
SHA51208a531abb57998e1d0e897f208684b3c3c8df682e284435e04469717b0e3eb62c302b7f00d4da0c52dae17c76798df7f1ac339d69371c262c4385196d6ee209b
-
Filesize
5.9MB
MD5ab1669c2518f6a12f99203c08ee96571
SHA189938de6b5922a769a7361e6e20c8c5f85792748
SHA256d1d1d25dcc3e7ca983302b16982c1e54b69c0280e4934f2cd0ea4e2f70e3484b
SHA512ae18c881f4afe10b0caa41fa2742a040b3fe0bed6588c0f87affe55c7d7e4f51e4bbd73b670731361ca722d2921b02d428158ab2fcf44865009787c2d2506a40
-
Filesize
5.9MB
MD59fe401e727656597e6907779bda9a5a4
SHA1c6e568ac7ccbd6b5a79167d22bc7cc1637ec9510
SHA256b0082d30f762c20f0f22eb9fd9a95765cb39ee87032ce3ff123b1d6fa6888029
SHA512c7bae61a59b36a4cd4cb44e0677f4802b0b2e49a27de390f4228e21a2d8a030b2639aeb7ef6f5662ecc5b383059691d5ba51b341ea7d461b5d1bed27a62a45e9
-
Filesize
5.9MB
MD5eaf6eb878b2c427c3da769b82454fcd5
SHA1da0ab9869906747c19aab2f4db1aead018925397
SHA256bdddc705f9f0e182fc11b32776d8c52fa7f4cbfa1115423dfd0f934807065dad
SHA51229800f5f4b1c2a6c33c767c9004a875ec3b722a5790b0de4b44a1daa3d6a23d2dbd5a3719b9d147e7974cb61e15c05168157b909ff4b7649909f59cec14ae955
-
Filesize
5.9MB
MD58950792d8d3fa91db57d09da05ee34b8
SHA11cceb073bd4204bf901935688eeb87cbf4a4fee3
SHA25695fa410efc1a3c1f7a4d2278ffba4cc501d4da7d563374a0132ce398e04aa398
SHA51216fef02875a1d47498e13aa3e75ac60b74d9f0fea35e344516fc41694373fc26e3d43c72d20dd4ff4cf7abf3bdb7b3907aa4374a257718e283f884baead220c1
-
Filesize
5.9MB
MD512b27a4efca06db32d7689aca513fccc
SHA17d7dc2d3caa06e6d762575f2059d79263ee6928e
SHA25648b2ab5558c91e6cbf889edaf798a2f4885f8961207413ef6aaec2f29d18541f
SHA5125fadb82637cd0ebcd5875757ad2983baf71aeaeefd4efdb905c8d0f297a45777923b4948bfba805a203368f2f9cc932a9dda3a8df7ee80ab699d89df661cc536
-
Filesize
5.9MB
MD5c4c89eeecbcbf7a46fffa02d0684b268
SHA1c1291882acce0ab64e9da68a9f4c601b90135af8
SHA256e6d0af3179816c5806723ca8cbc2f0d9ad8b1a9c155cec40bdbcb57501ef3138
SHA512c8f6625620fd0a3a771540e734c0858ed320473476ee19232d25eb5ab9557e6bc7c43718a8672ab1510dba7e5c2bf751757c40b94bb782f29b1997bedb2db63a
-
Filesize
5.9MB
MD58af16607e4cc11d67ce16456c31f8b1b
SHA1bf90ccf538d60c908594a5598229145cfb665fe4
SHA2561caad0c30701c432586a00a4633e20294e163edaf3b7d69f4cb988cbaa8d3acc
SHA512d0d831cb09f9f4e54f3e7402e10f7dd801739130be143d556b101b419b64a79c44864a12e7a7a9c085d495530465aaa85a880224a2805d3165d7cd49c2cef60f
-
Filesize
5.9MB
MD560cfdee59989a1767933a20d775c7e42
SHA113fbcce54e0b15a4e8245c4cd3a868be06db36d4
SHA256a7abcbc79521f5ca5eaf21492bbbbfdc41cb9619f4b249c59e57d3e06bfa812d
SHA512dba95fb0b5bafe04a4259404a3fd00d103872049291b4ca256fa7a112872c26c17ebe0ba73eff350c964561b5e26a187ee97f8c78e5944ebdf8102cd5973df34
-
Filesize
5.9MB
MD576b5ddbdcb73d7a8ac9aeab74b27e4b2
SHA1b9d1577aca8b5651ea36023d731ade6702a9e109
SHA256b478239848b8b1dc61ecaa68a1fbb56cb79160998bd799967e9bf00af1669846
SHA512287a5f36b6a12450a0d985d514074b5146fee366f33283e85491df2458800d78308e45c4064f50a45e8728a32124a5c9287cae11d6adf6aa5ad6c121bc967dd5
-
Filesize
5.9MB
MD56918172b2767354a5f6b47a06239a1c6
SHA152094f0ade9a1a66a910ff064e0014af36fe4f66
SHA256cab267f0909649dec4323fa12d8583ccc0cebae5457afd0ee25c51f0621ec279
SHA5124c6a3409a4d03425ff26070167682108daeea79b079555e31f07a331125ad7450dae018484fe290db6ed0811b7395109c2bec29947bc0d31ba762915b0e13b6c
-
Filesize
5.9MB
MD59562179fc9bb482f0b03e14c79a40b93
SHA1d686635a5150a93e8c021a3672c1def08292794b
SHA256198acce0277bc9cfc558e72876ae32edf5227a7e27d82f82d85e2ed06749c18b
SHA512d02241d5ded3692a038ba104ff9f4b0487de871f535d1370575bb6f212063814c05bed840372dfa64494965d0f04c69c09e25c241b3d285f5f72fb4932ce806c
-
Filesize
5.9MB
MD570661837b61da68a5afa2baf1d8ae33a
SHA14eb1cede8838b4db91c14a0d44f489f0ee8cfe34
SHA2568e0b8652a52b9714ebaab95b2c3ef4990131c59e1d1f7e804397854ed89144da
SHA5127fdfc30a080f6cdd67b196b6168ebdb41f3565ac4cc603517504e5c8467962f6c66b18f4125bf4618c386249bd38bef1bd9baf02d22ce44a68c86024f3f0cd59
-
Filesize
5.9MB
MD520cb1039eb9c8e09e5ef2808edee7072
SHA1213bc7db45c884a8a0a1b50edc91a768084a18c9
SHA256c35ac906dcee992c5f9771cae9b4991d286f6a10fe24278bfaa1e2f6dc0bab78
SHA512535bfe9642cdb20823dfb3a8cefab43cb69153d35dd68e9b9365f48d20265af7d22fab7ff0d27ad36a8ccc8a79f5b0d5bfc8a572b1a037e82b1e584d4358eed0