Analysis
-
max time kernel
147s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/06/2024, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
85d71b3e980e147c4d28e202a7b5a5e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
85d71b3e980e147c4d28e202a7b5a5e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
85d71b3e980e147c4d28e202a7b5a5e0_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
85d71b3e980e147c4d28e202a7b5a5e0
-
SHA1
2cb7f7e234460b3447d56541a2382d4e672e6dde
-
SHA256
e75a55d1cf32ff817ffc11b465468268e10d0083408faf53577aec79f9b8a55a
-
SHA512
b1442445f27f70a4bbe6ebde823d790fa6c36429217b46488c85b514aa07176923026f63b3b1e39073712bc3c67d3a984f075b3d9ab9807755d70be658dfb76f
-
SSDEEP
24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4eE:ObCjPKNqQEfsw43qtmVfq4p
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.me.com - Port:
587 - Username:
[email protected] - Password:
RICHARD205lord
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2484 jhdfkldfhndfkjdfnbfklfnf.exe 1676 winmgr119.exe 3008 winmgr119.exe -
Loads dropped DLL 1 IoCs
pid Process 2728 85d71b3e980e147c4d28e202a7b5a5e0_NeikiAnalytics.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2420-23-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2420-24-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2420-25-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2420-32-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2900-38-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2900-37-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2900-36-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2900-35-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2900-77-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts cvtres.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" 85d71b3e980e147c4d28e202a7b5a5e0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" jhdfkldfhndfkjdfnbfklfnf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 icanhazip.com 6 ipinfo.io -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00080000000122cd-2.dat autoit_exe behavioral1/files/0x002d000000015eaf-9.dat autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2484 set thread context of 2656 2484 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2656 set thread context of 2420 2656 RegAsm.exe 32 PID 2656 set thread context of 2900 2656 RegAsm.exe 35 PID 2656 set thread context of 2756 2656 RegAsm.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 26 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1920 schtasks.exe 2228 schtasks.exe 1404 schtasks.exe 2648 schtasks.exe 1620 schtasks.exe 2312 schtasks.exe 2508 schtasks.exe 3012 schtasks.exe 2272 schtasks.exe 348 schtasks.exe 2956 schtasks.exe 1932 schtasks.exe 3056 schtasks.exe 2996 schtasks.exe 2192 schtasks.exe 744 schtasks.exe 2684 schtasks.exe 3044 schtasks.exe 2820 schtasks.exe 896 schtasks.exe 1512 schtasks.exe 2228 schtasks.exe 1880 schtasks.exe 988 schtasks.exe 1656 schtasks.exe 1624 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe:Zone.Identifier:$DATA jhdfkldfhndfkjdfnbfklfnf.exe File created C:\ProgramData\winmgr119.exe:Zone.Identifier:$DATA winmgr119.exe File created C:\Users\Admin\AppData\Local\Temp\85d71b3e980e147c4d28e202a7b5a5e0_NeikiAnalytics.exe:Zone.Identifier:$DATA 85d71b3e980e147c4d28e202a7b5a5e0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 2728 85d71b3e980e147c4d28e202a7b5a5e0_NeikiAnalytics.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2656 RegAsm.exe 2656 RegAsm.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 1676 winmgr119.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 2656 RegAsm.exe 3008 winmgr119.exe 2484 jhdfkldfhndfkjdfnbfklfnf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2656 RegAsm.exe Token: SeDebugPrivilege 2420 cvtres.exe Token: SeDebugPrivilege 2900 cvtres.exe Token: SeDebugPrivilege 2756 cvtres.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2656 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2484 2728 85d71b3e980e147c4d28e202a7b5a5e0_NeikiAnalytics.exe 28 PID 2728 wrote to memory of 2484 2728 85d71b3e980e147c4d28e202a7b5a5e0_NeikiAnalytics.exe 28 PID 2728 wrote to memory of 2484 2728 85d71b3e980e147c4d28e202a7b5a5e0_NeikiAnalytics.exe 28 PID 2728 wrote to memory of 2484 2728 85d71b3e980e147c4d28e202a7b5a5e0_NeikiAnalytics.exe 28 PID 2484 wrote to memory of 2656 2484 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2484 wrote to memory of 2656 2484 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2484 wrote to memory of 2656 2484 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2484 wrote to memory of 2656 2484 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2484 wrote to memory of 2656 2484 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2484 wrote to memory of 2656 2484 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2484 wrote to memory of 2656 2484 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2484 wrote to memory of 2656 2484 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2484 wrote to memory of 2656 2484 jhdfkldfhndfkjdfnbfklfnf.exe 29 PID 2484 wrote to memory of 2228 2484 jhdfkldfhndfkjdfnbfklfnf.exe 30 PID 2484 wrote to memory of 2228 2484 jhdfkldfhndfkjdfnbfklfnf.exe 30 PID 2484 wrote to memory of 2228 2484 jhdfkldfhndfkjdfnbfklfnf.exe 30 PID 2484 wrote to memory of 2228 2484 jhdfkldfhndfkjdfnbfklfnf.exe 30 PID 2656 wrote to memory of 2420 2656 RegAsm.exe 32 PID 2656 wrote to memory of 2420 2656 RegAsm.exe 32 PID 2656 wrote to memory of 2420 2656 RegAsm.exe 32 PID 2656 wrote to memory of 2420 2656 RegAsm.exe 32 PID 2656 wrote to memory of 2420 2656 RegAsm.exe 32 PID 2656 wrote to memory of 2420 2656 RegAsm.exe 32 PID 2656 wrote to memory of 2420 2656 RegAsm.exe 32 PID 2656 wrote to memory of 2420 2656 RegAsm.exe 32 PID 2656 wrote to memory of 2900 2656 RegAsm.exe 35 PID 2656 wrote to memory of 2900 2656 RegAsm.exe 35 PID 2656 wrote to memory of 2900 2656 RegAsm.exe 35 PID 2656 wrote to memory of 2900 2656 RegAsm.exe 35 PID 2656 wrote to memory of 2900 2656 RegAsm.exe 35 PID 2656 wrote to memory of 2900 2656 RegAsm.exe 35 PID 2656 wrote to memory of 2900 2656 RegAsm.exe 35 PID 2656 wrote to memory of 2900 2656 RegAsm.exe 35 PID 2484 wrote to memory of 1620 2484 jhdfkldfhndfkjdfnbfklfnf.exe 37 PID 2484 wrote to memory of 1620 2484 jhdfkldfhndfkjdfnbfklfnf.exe 37 PID 2484 wrote to memory of 1620 2484 jhdfkldfhndfkjdfnbfklfnf.exe 37 PID 2484 wrote to memory of 1620 2484 jhdfkldfhndfkjdfnbfklfnf.exe 37 PID 2656 wrote to memory of 2756 2656 RegAsm.exe 39 PID 2656 wrote to memory of 2756 2656 RegAsm.exe 39 PID 2656 wrote to memory of 2756 2656 RegAsm.exe 39 PID 2656 wrote to memory of 2756 2656 RegAsm.exe 39 PID 2656 wrote to memory of 2756 2656 RegAsm.exe 39 PID 2656 wrote to memory of 2756 2656 RegAsm.exe 39 PID 2656 wrote to memory of 2756 2656 RegAsm.exe 39 PID 2484 wrote to memory of 744 2484 jhdfkldfhndfkjdfnbfklfnf.exe 41 PID 2484 wrote to memory of 744 2484 jhdfkldfhndfkjdfnbfklfnf.exe 41 PID 2484 wrote to memory of 744 2484 jhdfkldfhndfkjdfnbfklfnf.exe 41 PID 2484 wrote to memory of 744 2484 jhdfkldfhndfkjdfnbfklfnf.exe 41 PID 2484 wrote to memory of 1624 2484 jhdfkldfhndfkjdfnbfklfnf.exe 43 PID 2484 wrote to memory of 1624 2484 jhdfkldfhndfkjdfnbfklfnf.exe 43 PID 2484 wrote to memory of 1624 2484 jhdfkldfhndfkjdfnbfklfnf.exe 43 PID 2484 wrote to memory of 1624 2484 jhdfkldfhndfkjdfnbfklfnf.exe 43 PID 2484 wrote to memory of 1932 2484 jhdfkldfhndfkjdfnbfklfnf.exe 47 PID 2484 wrote to memory of 1932 2484 jhdfkldfhndfkjdfnbfklfnf.exe 47 PID 2484 wrote to memory of 1932 2484 jhdfkldfhndfkjdfnbfklfnf.exe 47 PID 2484 wrote to memory of 1932 2484 jhdfkldfhndfkjdfnbfklfnf.exe 47 PID 2484 wrote to memory of 2684 2484 jhdfkldfhndfkjdfnbfklfnf.exe 49 PID 2484 wrote to memory of 2684 2484 jhdfkldfhndfkjdfnbfklfnf.exe 49 PID 2484 wrote to memory of 2684 2484 jhdfkldfhndfkjdfnbfklfnf.exe 49 PID 2484 wrote to memory of 2684 2484 jhdfkldfhndfkjdfnbfklfnf.exe 49 PID 2484 wrote to memory of 3044 2484 jhdfkldfhndfkjdfnbfklfnf.exe 51 PID 2484 wrote to memory of 3044 2484 jhdfkldfhndfkjdfnbfklfnf.exe 51 PID 2484 wrote to memory of 3044 2484 jhdfkldfhndfkjdfnbfklfnf.exe 51 PID 2484 wrote to memory of 3044 2484 jhdfkldfhndfkjdfnbfklfnf.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\85d71b3e980e147c4d28e202a7b5a5e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\85d71b3e980e147c4d28e202a7b5a5e0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exeC:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe03⤵
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp8C19.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp8D04.tmp"4⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpA168.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2228
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1620
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:744
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1624
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1932
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2684
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3044
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1404
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2272
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:348
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3056
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2820
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1880
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:988
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:896
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2996
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2312
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2192
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1512
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2508
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2228
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:3012
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1920
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2956
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:1656
-
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
PID:2648
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7D53277A-81AB-4BB9-8376-32DE60B3D359} S-1-5-21-1298544033-3225604241-2703760938-1000:IZKCKOTP\Admin:Interactive:[1]1⤵PID:904
-
C:\ProgramData\winmgr119.exeC:\ProgramData\winmgr119.exe2⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\ProgramData\winmgr119.exeC:\ProgramData\winmgr119.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD567c093478a150f841be4c899bc545ee0
SHA11ca3b99167bf86ad511aa7666de77a260672a542
SHA2568a3c5787fb4672e1f8ca42d5abe2e6154f0ba457c048f0aae2d9762841c01817
SHA51259b4a66e651ee3d5b7150e3bfe57d92505da231c70992065bc39519b7cba181064a746e35ad9804e153bcbf6339f41a4ce23129a064290800254ee264bb89a71
-
Filesize
2.6MB
MD5aaf3f218ed759255dc67d8fd8e0a37dd
SHA1ded0dad2780cbc616385e8f25950fcf90ef3dd60
SHA25686f7b6309dbdc7e1ba677d787c36ff81d7da53e75bcec6a375406fbd0f30ecfc
SHA5122ff7bacc11c02819e745fbdcf1e875b260f8ae99f1e70e97daa021029a899910c97df9c6fd498510a8d83bbb64b3d26c5d4a38ee1aa19ff7fc06d6736632246c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
399B
MD5e4bf4f7accc657622fe419c0d62419ab
SHA1c2856936dd3de05bad0da5ca94d6b521e40ab5a2
SHA256b32fa68b79c5a7ceaa89e8e537efe33a963c499666202611329944bd2c09318e
SHA51285dc223e39a16ddeba53a4b3d6c9eff14d30ec67dfda1e650da2c9057f640edd033a31868915a31caac0d325d240a7f634f62cd52fbd2adc68bd1d9cb6281431
-
Filesize
400B
MD5de4e5ff058882957cf8a3b5f839a031f
SHA10b3d8279120fb5fa27efbd9eee89695aa040fc24
SHA256ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49
SHA512a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72
-
Filesize
391B
MD53525ea58bba48993ea0d01b65ea71381
SHA11b917678fdd969e5ee5916e5899e7c75a979cf4d
SHA256681bcee53cf679ac674e700136f9229b9184fe60ed6410dbd7a33d462ed13ae2
SHA5125aad8dca43ec85882daf50c469bd04dcf0b62affc8bc605b3e289496a2679d4d548fea8bb0aea7080bbfbcdcab9d275fc6797b9c95b64f9f97ecf79583a83986
-
Filesize
2.6MB
MD51966a6e30f64eb7c6379826c41b97058
SHA15f67694c8f23d917ef3366e5a9d57c8e500489f4
SHA256a390c8f728f55867a232b5e66755e7e3ecb3a459dd69d42ea524aecccfd03343
SHA512d2d7541433bb7b121b00856c0e1b01998d36405f36a33b06189b65a68cc8fe2cd1f3bb493c6ef8a5dcf6aadd6ca772ff30e4daf919ec31a5afbcb6057197e280