Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe
-
Size
226KB
-
MD5
47b9b3fa9ac2cb08f234382917930540
-
SHA1
10c93b6f06201fbb8d030b3f67cae1e59582d877
-
SHA256
d5d8a5c2e21754b89fc4d2cf2302ed803b191fc23f3778508ae6d7232a452ae5
-
SHA512
9b5f754d79926f029ed7f17c8e2f1c41e8068d52e82e8f02e8842ed00a10c0412e1936afdd5cbed14eff868b62a242961d5294ab9dd6e5660709ff919a411d12
-
SSDEEP
3072:GKcZcOUmoz93z8aKDe8hNau7XcgSZdfUq:GKuKD1ue8hNauXbF
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C82B0390-5E67-4b58-9A18-9356C387F8F3}\stubpath = "C:\\Windows\\{C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe" {1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BB06B29F-6A46-4bfa-8B28-A6A7A998BCE2}\stubpath = "C:\\Windows\\{BB06B29F-6A46-4bfa-8B28-A6A7A998BCE2}.exe" {2079DE55-BB76-4e4d-99CC-E6E21967AFDD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C5326210-BD2A-47a3-961B-9DCA2B3621B9} {15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EBC02437-F37F-4a60-A674-56A00BC62296} {FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1C0C0CF4-C17D-4396-8E2D-5483C63DBC37} {EBC02437-F37F-4a60-A674-56A00BC62296}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{15A57011-BC13-4efb-B0AB-BEC1C6ED60AB} 47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FBA9309E-A89E-490a-AF08-397F91CD4D1C} {C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AB5B6FF2-CEE2-4990-8DC9-C11BC4553B4A} {BB06B29F-6A46-4bfa-8B28-A6A7A998BCE2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{764D56A4-73FA-4b08-8828-F562AA86462B} {674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{764D56A4-73FA-4b08-8828-F562AA86462B}\stubpath = "C:\\Windows\\{764D56A4-73FA-4b08-8828-F562AA86462B}.exe" {674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EBC02437-F37F-4a60-A674-56A00BC62296}\stubpath = "C:\\Windows\\{EBC02437-F37F-4a60-A674-56A00BC62296}.exe" {FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C82B0390-5E67-4b58-9A18-9356C387F8F3} {1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{674F43C3-D32B-4e44-A4F1-156BA2E388B6} {C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}\stubpath = "C:\\Windows\\{1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe" {EBC02437-F37F-4a60-A674-56A00BC62296}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{674F43C3-D32B-4e44-A4F1-156BA2E388B6}\stubpath = "C:\\Windows\\{674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe" {C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2079DE55-BB76-4e4d-99CC-E6E21967AFDD} {764D56A4-73FA-4b08-8828-F562AA86462B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2079DE55-BB76-4e4d-99CC-E6E21967AFDD}\stubpath = "C:\\Windows\\{2079DE55-BB76-4e4d-99CC-E6E21967AFDD}.exe" {764D56A4-73FA-4b08-8828-F562AA86462B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BB06B29F-6A46-4bfa-8B28-A6A7A998BCE2} {2079DE55-BB76-4e4d-99CC-E6E21967AFDD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}\stubpath = "C:\\Windows\\{15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe" 47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C5326210-BD2A-47a3-961B-9DCA2B3621B9}\stubpath = "C:\\Windows\\{C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe" {15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FBA9309E-A89E-490a-AF08-397F91CD4D1C}\stubpath = "C:\\Windows\\{FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe" {C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AB5B6FF2-CEE2-4990-8DC9-C11BC4553B4A}\stubpath = "C:\\Windows\\{AB5B6FF2-CEE2-4990-8DC9-C11BC4553B4A}.exe" {BB06B29F-6A46-4bfa-8B28-A6A7A998BCE2}.exe -
Deletes itself 1 IoCs
pid Process 1248 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2792 {15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe 2452 {C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe 2736 {FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe 2872 {EBC02437-F37F-4a60-A674-56A00BC62296}.exe 2812 {1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe 1968 {C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe 2012 {674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe 2540 {764D56A4-73FA-4b08-8828-F562AA86462B}.exe 1932 {2079DE55-BB76-4e4d-99CC-E6E21967AFDD}.exe 1500 {BB06B29F-6A46-4bfa-8B28-A6A7A998BCE2}.exe 2136 {AB5B6FF2-CEE2-4990-8DC9-C11BC4553B4A}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe {C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe File created C:\Windows\{1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe {EBC02437-F37F-4a60-A674-56A00BC62296}.exe File created C:\Windows\{674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe {C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe File created C:\Windows\{2079DE55-BB76-4e4d-99CC-E6E21967AFDD}.exe {764D56A4-73FA-4b08-8828-F562AA86462B}.exe File created C:\Windows\{BB06B29F-6A46-4bfa-8B28-A6A7A998BCE2}.exe {2079DE55-BB76-4e4d-99CC-E6E21967AFDD}.exe File created C:\Windows\{AB5B6FF2-CEE2-4990-8DC9-C11BC4553B4A}.exe {BB06B29F-6A46-4bfa-8B28-A6A7A998BCE2}.exe File created C:\Windows\{15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe 47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe File created C:\Windows\{EBC02437-F37F-4a60-A674-56A00BC62296}.exe {FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe File created C:\Windows\{C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe {1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe File created C:\Windows\{764D56A4-73FA-4b08-8828-F562AA86462B}.exe {674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe File created C:\Windows\{C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe {15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1460 47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe Token: SeIncBasePriorityPrivilege 2792 {15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe Token: SeIncBasePriorityPrivilege 2452 {C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe Token: SeIncBasePriorityPrivilege 2736 {FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe Token: SeIncBasePriorityPrivilege 2872 {EBC02437-F37F-4a60-A674-56A00BC62296}.exe Token: SeIncBasePriorityPrivilege 2812 {1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe Token: SeIncBasePriorityPrivilege 1968 {C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe Token: SeIncBasePriorityPrivilege 2012 {674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe Token: SeIncBasePriorityPrivilege 2540 {764D56A4-73FA-4b08-8828-F562AA86462B}.exe Token: SeIncBasePriorityPrivilege 1932 {2079DE55-BB76-4e4d-99CC-E6E21967AFDD}.exe Token: SeIncBasePriorityPrivilege 1500 {BB06B29F-6A46-4bfa-8B28-A6A7A998BCE2}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1460 wrote to memory of 2792 1460 47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe 28 PID 1460 wrote to memory of 2792 1460 47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe 28 PID 1460 wrote to memory of 2792 1460 47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe 28 PID 1460 wrote to memory of 2792 1460 47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe 28 PID 1460 wrote to memory of 1248 1460 47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe 29 PID 1460 wrote to memory of 1248 1460 47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe 29 PID 1460 wrote to memory of 1248 1460 47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe 29 PID 1460 wrote to memory of 1248 1460 47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe 29 PID 2792 wrote to memory of 2452 2792 {15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe 30 PID 2792 wrote to memory of 2452 2792 {15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe 30 PID 2792 wrote to memory of 2452 2792 {15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe 30 PID 2792 wrote to memory of 2452 2792 {15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe 30 PID 2792 wrote to memory of 2928 2792 {15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe 31 PID 2792 wrote to memory of 2928 2792 {15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe 31 PID 2792 wrote to memory of 2928 2792 {15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe 31 PID 2792 wrote to memory of 2928 2792 {15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe 31 PID 2452 wrote to memory of 2736 2452 {C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe 32 PID 2452 wrote to memory of 2736 2452 {C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe 32 PID 2452 wrote to memory of 2736 2452 {C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe 32 PID 2452 wrote to memory of 2736 2452 {C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe 32 PID 2452 wrote to memory of 2448 2452 {C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe 33 PID 2452 wrote to memory of 2448 2452 {C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe 33 PID 2452 wrote to memory of 2448 2452 {C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe 33 PID 2452 wrote to memory of 2448 2452 {C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe 33 PID 2736 wrote to memory of 2872 2736 {FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe 36 PID 2736 wrote to memory of 2872 2736 {FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe 36 PID 2736 wrote to memory of 2872 2736 {FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe 36 PID 2736 wrote to memory of 2872 2736 {FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe 36 PID 2736 wrote to memory of 2896 2736 {FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe 37 PID 2736 wrote to memory of 2896 2736 {FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe 37 PID 2736 wrote to memory of 2896 2736 {FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe 37 PID 2736 wrote to memory of 2896 2736 {FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe 37 PID 2872 wrote to memory of 2812 2872 {EBC02437-F37F-4a60-A674-56A00BC62296}.exe 38 PID 2872 wrote to memory of 2812 2872 {EBC02437-F37F-4a60-A674-56A00BC62296}.exe 38 PID 2872 wrote to memory of 2812 2872 {EBC02437-F37F-4a60-A674-56A00BC62296}.exe 38 PID 2872 wrote to memory of 2812 2872 {EBC02437-F37F-4a60-A674-56A00BC62296}.exe 38 PID 2872 wrote to memory of 1676 2872 {EBC02437-F37F-4a60-A674-56A00BC62296}.exe 39 PID 2872 wrote to memory of 1676 2872 {EBC02437-F37F-4a60-A674-56A00BC62296}.exe 39 PID 2872 wrote to memory of 1676 2872 {EBC02437-F37F-4a60-A674-56A00BC62296}.exe 39 PID 2872 wrote to memory of 1676 2872 {EBC02437-F37F-4a60-A674-56A00BC62296}.exe 39 PID 2812 wrote to memory of 1968 2812 {1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe 40 PID 2812 wrote to memory of 1968 2812 {1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe 40 PID 2812 wrote to memory of 1968 2812 {1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe 40 PID 2812 wrote to memory of 1968 2812 {1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe 40 PID 2812 wrote to memory of 1776 2812 {1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe 41 PID 2812 wrote to memory of 1776 2812 {1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe 41 PID 2812 wrote to memory of 1776 2812 {1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe 41 PID 2812 wrote to memory of 1776 2812 {1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe 41 PID 1968 wrote to memory of 2012 1968 {C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe 42 PID 1968 wrote to memory of 2012 1968 {C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe 42 PID 1968 wrote to memory of 2012 1968 {C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe 42 PID 1968 wrote to memory of 2012 1968 {C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe 42 PID 1968 wrote to memory of 1632 1968 {C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe 43 PID 1968 wrote to memory of 1632 1968 {C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe 43 PID 1968 wrote to memory of 1632 1968 {C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe 43 PID 1968 wrote to memory of 1632 1968 {C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe 43 PID 2012 wrote to memory of 2540 2012 {674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe 44 PID 2012 wrote to memory of 2540 2012 {674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe 44 PID 2012 wrote to memory of 2540 2012 {674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe 44 PID 2012 wrote to memory of 2540 2012 {674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe 44 PID 2012 wrote to memory of 2296 2012 {674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe 45 PID 2012 wrote to memory of 2296 2012 {674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe 45 PID 2012 wrote to memory of 2296 2012 {674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe 45 PID 2012 wrote to memory of 2296 2012 {674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\47b9b3fa9ac2cb08f234382917930540_NeikiAnalytics.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\{15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exeC:\Windows\{15A57011-BC13-4efb-B0AB-BEC1C6ED60AB}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\{C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exeC:\Windows\{C5326210-BD2A-47a3-961B-9DCA2B3621B9}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\{FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exeC:\Windows\{FBA9309E-A89E-490a-AF08-397F91CD4D1C}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\{EBC02437-F37F-4a60-A674-56A00BC62296}.exeC:\Windows\{EBC02437-F37F-4a60-A674-56A00BC62296}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\{1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exeC:\Windows\{1C0C0CF4-C17D-4396-8E2D-5483C63DBC37}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\{C82B0390-5E67-4b58-9A18-9356C387F8F3}.exeC:\Windows\{C82B0390-5E67-4b58-9A18-9356C387F8F3}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\{674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exeC:\Windows\{674F43C3-D32B-4e44-A4F1-156BA2E388B6}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\{764D56A4-73FA-4b08-8828-F562AA86462B}.exeC:\Windows\{764D56A4-73FA-4b08-8828-F562AA86462B}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2540 -
C:\Windows\{2079DE55-BB76-4e4d-99CC-E6E21967AFDD}.exeC:\Windows\{2079DE55-BB76-4e4d-99CC-E6E21967AFDD}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1932 -
C:\Windows\{BB06B29F-6A46-4bfa-8B28-A6A7A998BCE2}.exeC:\Windows\{BB06B29F-6A46-4bfa-8B28-A6A7A998BCE2}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Windows\{AB5B6FF2-CEE2-4990-8DC9-C11BC4553B4A}.exeC:\Windows\{AB5B6FF2-CEE2-4990-8DC9-C11BC4553B4A}.exe12⤵
- Executes dropped EXE
PID:2136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BB06B~1.EXE > nul12⤵PID:448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2079D~1.EXE > nul11⤵PID:532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{764D5~1.EXE > nul10⤵PID:336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{674F4~1.EXE > nul9⤵PID:2296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C82B0~1.EXE > nul8⤵PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1C0C0~1.EXE > nul7⤵PID:1776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EBC02~1.EXE > nul6⤵PID:1676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FBA93~1.EXE > nul5⤵PID:2896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C5326~1.EXE > nul4⤵PID:2448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{15A57~1.EXE > nul3⤵PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\47B9B3~1.EXE > nul2⤵
- Deletes itself
PID:1248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226KB
MD53cc78497e9b4499b4c1ed2f3c3fffca9
SHA1ba221a9cfb5f08c263b2869e8b51c8245eda47a9
SHA25639ae04be78785f39ec36eb6167bbae7d152be555bf71a1dbeeb4e98ac1356262
SHA512b28360cd9f292d1c4b74191501079a6b5ac7b4efe3670317be91c7cf44b4160c453f48e14f8bfd96207e188201b6b06d6e2603692b7622b7caedb9cebb822716
-
Filesize
226KB
MD55771e0bee019c735dec38889a0b96496
SHA1cbaf1ef030642828d52fe7dda33c4ede1a924332
SHA256cbb6f02d2d28e022ac1e2189ffd5197464bf5b15b5717be8524ea5a6cfb7448f
SHA512b3c6d67c43da3cb56d6f706d320975d36bdbf84d52db98d62ade0512a2ed66c1513b606ac0afcac4e6c5215db14ab1991bdf0771e0759c376a0ffdf0d473cf9e
-
Filesize
226KB
MD52810e3d34e6fedbf7179505d81469a9b
SHA1bb0729828d6819095b50617c59df8091122c70b9
SHA256eceb367a2a245da487aa10c4a6b9881e2944f89709eb61fd906f53e8d771e497
SHA512cf20d7080002a97c17346ebcda4df361493e479b4d45af2df98694c785b7b2aa858b69421a73ebd07639db377f3a965166aa8b2278f317baf615b9787e995809
-
Filesize
226KB
MD535039b1c361265ee34edcc8a072affc7
SHA18965d04060df65e0cd578098edb5d5d384101b7c
SHA256bc2645487def19ebaba5f9aa80b5aa1ebd6e44d26aaa1d738b14dfd021ab2d86
SHA5120ca1b3146ace58574d1383055cbc236135c6a7751f54847a36404bedb9bb0a97814849af2592d790dd9f8048da794fcde19ffc1adbdf34ec7b899706a400e4c6
-
Filesize
226KB
MD5bf1a3683eac08a6120dae70f97c90ad1
SHA12ab02e1b2910c764f6928314edc061741e6df71e
SHA256f7cf5c5b3891da4693c534fc8ff95b680ce5b73fe03ea2ef34e2481ff3f12393
SHA512f3f266c35f279c7120266fc4835a981b03ad7fd6646421106c168d1f5240c937ac7cfde82536946c764432f2f0f5708c36e37f9ab557f69ca48ca53cf7b87a2e
-
Filesize
226KB
MD526d5dbac40630caaeab0197429cdded1
SHA140decd1d3050c4a8e21723a0cb3d25de67d5a2ac
SHA256d00f9b0b495b070687105ac986573c3fa08d932d2564d4a5ba9aefc6fed3a6ff
SHA512c1d1ee48b9b5b0e91843d80e51406d1bb127a86b03da8f930457fb3043c07eaf0bd5bdf2fc8c58a3c838af6ca446677ae7d9b3396b2ee351da491fd349106233
-
Filesize
226KB
MD5efb9841fae7d3ac55131385bbb329965
SHA12a80b29b3097486ec746657ec7289e39840cc756
SHA2569e0b2479048b54f0f91942d48d8812fe1c05f9ee9ad2815316ec360776eb7119
SHA512b83ffe6ae81b13636fc62ebeb3e4c93df8017039f506649d4d1e6461fe17d95b75f0ad2063a4e54ee4cd6e0c029659584019111fec5286eb816cc1f1e7442d1a
-
Filesize
226KB
MD555a9143869ab3110af7ae727eb3430bd
SHA12f3622a70eba503885733b4a44d1688629e36057
SHA256222b9acdb3b382693fb89b9b8dbe8deb9788506a8ef2d9b35fd2b031711d5a98
SHA5126baf1651b3577fcc5fc2c2bbd4d0c8eb93da0da4da5da3244f3d572f98140f41043ef3f037d5157026c184115544b7264f139646e4d540a9c643814d983b7c9f
-
Filesize
226KB
MD528b2ef4bade115753819f81457d12102
SHA1dca6efd7c677d285b898ca70a851d5a45982cb68
SHA2566769beae2ff466978e62c5abe89f141704130294d5c86cb3957bbad1924bd6d3
SHA512b8a02fe22c3c89d92622e3218d8652ee54be229d49493ce28f4f8a6151721688d51819641794b8f32b68525d98a69f399fd0466b6e7824798146900bf742bcbb
-
Filesize
226KB
MD5da50e0bf5090ea568ee3b65a6fe8b62f
SHA153265c4b37e4a7fa14376b0c6b16e698331b5216
SHA256979fe9adccda2dcff849547c769404512e83ba8f107431608b28de97af9ce7ec
SHA5128f9bd5819f111539a5b69dc5819abdaa9b4012d36a143cc73ce17eb0c94b89ef8b7997752b356d72975ef65d183d110be2a2880f045a1515a47d6520a35b77a2
-
Filesize
226KB
MD56eb3a68733ee858c4dae3868ba8b2959
SHA1087812072585fc114d02ff5edfae94a29ac11b5a
SHA2565097aed3dbf82b7bba37c0ca98f7406410c935954ff808c1c8da346b8ffce143
SHA512bacd9951ce109ee263e2cb5fd9cb1b83771ff17010b42a89ea3f4cd1501fe34b1e62862fe5d82a1cca7e27b1c1bf27166b2bff82c05f503b93c4b34804b407d8