Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 22:32
Behavioral task
behavioral1
Sample
498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe
-
Size
1.0MB
-
MD5
498e3f2d908ce17d520c80e8e1d97710
-
SHA1
809be62eec8ae9c5b5daef7e6eb7de97dea2e459
-
SHA256
7cf2b75bfdb06b745cfa5dea58aad9790ff832f9fa78d8682ab84b816d5cf2b5
-
SHA512
b0ab40e1462ece7fa287abe774aed384797267f96b04111a714628555d34686b944981148cc7bb0da9385d596895b90cdac42aceec5438de2447ab00a4bb90cf
-
SSDEEP
12288:/ubxAa9sUFxZ8oq7URPvyKBozWeL+vSgmtjJcDVrCTZSXlVB0mGEB0aNN/cPUeWl:g9sUFxZq7URPt6RL6nBrEZUjGE/L8YZ
Malware Config
Signatures
-
DcRat 64 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process File created C:\Program Files\Windows Mail\0a1fd5f707cd16 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 2700 schtasks.exe 1376 schtasks.exe 1632 schtasks.exe 2524 schtasks.exe 2324 schtasks.exe 2148 schtasks.exe 2356 schtasks.exe 1984 schtasks.exe 1524 schtasks.exe 1184 schtasks.exe 2968 schtasks.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\101b941d020240 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 1972 schtasks.exe 2108 schtasks.exe 876 schtasks.exe 1948 schtasks.exe 2816 schtasks.exe 2800 schtasks.exe 1940 schtasks.exe 880 schtasks.exe 2536 schtasks.exe 2508 schtasks.exe 1584 schtasks.exe 2800 schtasks.exe 1628 schtasks.exe 1960 schtasks.exe 1404 schtasks.exe 2500 schtasks.exe 3012 schtasks.exe 2780 schtasks.exe 1820 schtasks.exe 2804 schtasks.exe 2612 schtasks.exe 2520 schtasks.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 2056 schtasks.exe 2220 schtasks.exe 2676 schtasks.exe 944 schtasks.exe 1688 schtasks.exe 2992 schtasks.exe 1140 schtasks.exe 1060 schtasks.exe 2584 schtasks.exe 544 schtasks.exe 1588 schtasks.exe 2868 schtasks.exe 2880 schtasks.exe 2756 schtasks.exe File created C:\Program Files\Windows Photo Viewer\en-US\101b941d020240 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 2372 schtasks.exe 2984 schtasks.exe 1888 schtasks.exe 2044 schtasks.exe 1440 schtasks.exe 2912 schtasks.exe File created C:\Windows\PolicyDefinitions\b75386f1303e64 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 1756 schtasks.exe 1888 schtasks.exe 2672 schtasks.exe 2760 schtasks.exe 2664 schtasks.exe 556 schtasks.exe -
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2780 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2716 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2524 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2500 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2560 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2316 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1376 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 556 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2044 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 808 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 544 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2800 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2796 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 944 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1984 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 940 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2584 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2356 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1788 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1628 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1756 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2372 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1888 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1140 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2200 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1060 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1440 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1960 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1820 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1336 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1524 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1940 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2108 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1588 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2016 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2700 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2804 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2520 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2536 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2868 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2684 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1184 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1376 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2880 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 876 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1708 2752 schtasks.exe 28 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2676 2752 schtasks.exe 28 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WmiPrvSE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" WmiPrvSE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" WmiPrvSE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/836-1-0x0000000000FD0000-0x00000000010E2000-memory.dmp dcrat behavioral1/files/0x0006000000015cd2-18.dat dcrat behavioral1/memory/1612-179-0x00000000000F0000-0x0000000000202000-memory.dmp dcrat behavioral1/memory/1568-298-0x0000000001100000-0x0000000001212000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 31 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 580 powershell.exe 2256 powershell.exe 1532 powershell.exe 2072 powershell.exe 2472 powershell.exe 1872 powershell.exe 3028 powershell.exe 2040 powershell.exe 1828 powershell.exe 1060 powershell.exe 272 powershell.exe 1536 powershell.exe 1444 powershell.exe 776 powershell.exe 3044 powershell.exe 2420 powershell.exe 1704 powershell.exe 1952 powershell.exe 1500 powershell.exe 2696 powershell.exe 2140 powershell.exe 900 powershell.exe 972 powershell.exe 1352 powershell.exe 1180 powershell.exe 1576 powershell.exe 1964 powershell.exe 1540 powershell.exe 1948 powershell.exe 2456 powershell.exe 1876 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 1568 WmiPrvSE.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WmiPrvSE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WmiPrvSE.exe -
Drops file in Program Files directory 34 IoCs
description ioc Process File created C:\Program Files\Windows Photo Viewer\en-US\lsm.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\c5b4cb5e9653cc 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\spoolsv.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\System.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\csrss.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Program Files\Microsoft Office\sppsvc.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\services.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\lsm.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files\Windows Photo Viewer\en-US\101b941d020240 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\lsm.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Program Files\Windows Mail\sppsvc.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\1033\csrss.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\cc11b995f2a76d 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\27d1bcfc3c54e0 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files (x86)\Windows NT\Accessories\fr-FR\42af1c969fbb7b 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\System.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\RCX83D2.tmp 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Program Files\Windows Mail\RCX89FC.tmp 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\lsm.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files (x86)\Windows NT\Accessories\fr-FR\audiodg.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\fr-FR\audiodg.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\f3b6ecef712a24 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files\Windows Mail\sppsvc.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files\Windows Mail\0a1fd5f707cd16 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\RCX96BF.tmp 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\services.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\1033\886983d96e3d3e 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files\Microsoft Office\0a1fd5f707cd16 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\101b941d020240 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\RCX85E5.tmp 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Program Files\Microsoft Office\sppsvc.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\spoolsv.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe -
Drops file in Windows directory 20 IoCs
description ioc Process File opened for modification C:\Windows\PolicyDefinitions\RCX924A.tmp 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Windows\PolicyDefinitions\taskhost.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Windows\en-US\56085415360792 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\6cb0b6c459d5d3 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Windows\winsxs\x86_microsoft-windows-m..ditevtlog.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_fc5eccf9ae290445\csrss.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Windows\Performance\WinSAT\taskhost.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Windows\SchCache\csrss.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\dwm.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Windows\Globalization\MCT\6ccacd8608530f 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Windows\en-US\wininit.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\dwm.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Windows\en-US\wininit.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Windows\Globalization\MCT\Idle.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Windows\PolicyDefinitions\taskhost.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Windows\PolicyDefinitions\b75386f1303e64 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Windows\Performance\WinSAT\taskhost.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Windows\Performance\WinSAT\b75386f1303e64 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Windows\SchCache\csrss.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File created C:\Windows\SchCache\886983d96e3d3e 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe File opened for modification C:\Windows\Globalization\MCT\Idle.exe 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1404 schtasks.exe 1660 schtasks.exe 2780 schtasks.exe 2524 schtasks.exe 1888 schtasks.exe 1708 schtasks.exe 672 schtasks.exe 3012 schtasks.exe 2316 schtasks.exe 808 schtasks.exe 1060 schtasks.exe 2676 schtasks.exe 2756 schtasks.exe 892 schtasks.exe 1140 schtasks.exe 1820 schtasks.exe 1940 schtasks.exe 2684 schtasks.exe 2912 schtasks.exe 588 schtasks.exe 1376 schtasks.exe 1632 schtasks.exe 1888 schtasks.exe 2028 schtasks.exe 2892 schtasks.exe 2800 schtasks.exe 2672 schtasks.exe 2760 schtasks.exe 2816 schtasks.exe 2372 schtasks.exe 1972 schtasks.exe 804 schtasks.exe 2836 schtasks.exe 2044 schtasks.exe 1984 schtasks.exe 940 schtasks.exe 2612 schtasks.exe 1948 schtasks.exe 1184 schtasks.exe 2880 schtasks.exe 2716 schtasks.exe 544 schtasks.exe 2324 schtasks.exe 2356 schtasks.exe 1588 schtasks.exe 2016 schtasks.exe 876 schtasks.exe 2508 schtasks.exe 580 schtasks.exe 1628 schtasks.exe 2520 schtasks.exe 2616 schtasks.exe 2868 schtasks.exe 2612 schtasks.exe 556 schtasks.exe 1340 schtasks.exe 1336 schtasks.exe 2108 schtasks.exe 880 schtasks.exe 2992 schtasks.exe 2984 schtasks.exe 1756 schtasks.exe 2148 schtasks.exe 1976 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 2456 powershell.exe 272 powershell.exe 1576 powershell.exe 1532 powershell.exe 3044 powershell.exe 580 powershell.exe 1180 powershell.exe 2140 powershell.exe 900 powershell.exe 1948 powershell.exe 2256 powershell.exe 1872 powershell.exe 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Token: SeDebugPrivilege 2456 powershell.exe Token: SeDebugPrivilege 272 powershell.exe Token: SeDebugPrivilege 1576 powershell.exe Token: SeDebugPrivilege 1532 powershell.exe Token: SeDebugPrivilege 3044 powershell.exe Token: SeDebugPrivilege 580 powershell.exe Token: SeDebugPrivilege 1180 powershell.exe Token: SeDebugPrivilege 2140 powershell.exe Token: SeDebugPrivilege 900 powershell.exe Token: SeDebugPrivilege 1948 powershell.exe Token: SeDebugPrivilege 2256 powershell.exe Token: SeDebugPrivilege 1872 powershell.exe Token: SeDebugPrivilege 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Token: SeDebugPrivilege 2072 powershell.exe Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 3028 powershell.exe Token: SeDebugPrivilege 1828 powershell.exe Token: SeDebugPrivilege 972 powershell.exe Token: SeDebugPrivilege 2040 powershell.exe Token: SeDebugPrivilege 1876 powershell.exe Token: SeDebugPrivilege 1352 powershell.exe Token: SeDebugPrivilege 1540 powershell.exe Token: SeDebugPrivilege 2696 powershell.exe Token: SeDebugPrivilege 2420 powershell.exe Token: SeDebugPrivilege 776 powershell.exe Token: SeDebugPrivilege 1444 powershell.exe Token: SeDebugPrivilege 1704 powershell.exe Token: SeDebugPrivilege 1060 powershell.exe Token: SeDebugPrivilege 1964 powershell.exe Token: SeDebugPrivilege 1568 WmiPrvSE.exe Token: SeDebugPrivilege 1952 powershell.exe Token: SeDebugPrivilege 1500 powershell.exe Token: SeDebugPrivilege 1536 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 836 wrote to memory of 1948 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 62 PID 836 wrote to memory of 1948 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 62 PID 836 wrote to memory of 1948 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 62 PID 836 wrote to memory of 900 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 63 PID 836 wrote to memory of 900 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 63 PID 836 wrote to memory of 900 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 63 PID 836 wrote to memory of 1872 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 64 PID 836 wrote to memory of 1872 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 64 PID 836 wrote to memory of 1872 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 64 PID 836 wrote to memory of 272 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 65 PID 836 wrote to memory of 272 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 65 PID 836 wrote to memory of 272 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 65 PID 836 wrote to memory of 580 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 67 PID 836 wrote to memory of 580 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 67 PID 836 wrote to memory of 580 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 67 PID 836 wrote to memory of 3044 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 68 PID 836 wrote to memory of 3044 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 68 PID 836 wrote to memory of 3044 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 68 PID 836 wrote to memory of 1532 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 70 PID 836 wrote to memory of 1532 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 70 PID 836 wrote to memory of 1532 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 70 PID 836 wrote to memory of 2256 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 71 PID 836 wrote to memory of 2256 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 71 PID 836 wrote to memory of 2256 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 71 PID 836 wrote to memory of 2140 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 72 PID 836 wrote to memory of 2140 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 72 PID 836 wrote to memory of 2140 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 72 PID 836 wrote to memory of 2456 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 74 PID 836 wrote to memory of 2456 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 74 PID 836 wrote to memory of 2456 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 74 PID 836 wrote to memory of 1180 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 75 PID 836 wrote to memory of 1180 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 75 PID 836 wrote to memory of 1180 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 75 PID 836 wrote to memory of 1576 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 76 PID 836 wrote to memory of 1576 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 76 PID 836 wrote to memory of 1576 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 76 PID 836 wrote to memory of 2224 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 86 PID 836 wrote to memory of 2224 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 86 PID 836 wrote to memory of 2224 836 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 86 PID 2224 wrote to memory of 1884 2224 cmd.exe 88 PID 2224 wrote to memory of 1884 2224 cmd.exe 88 PID 2224 wrote to memory of 1884 2224 cmd.exe 88 PID 2224 wrote to memory of 1612 2224 cmd.exe 89 PID 2224 wrote to memory of 1612 2224 cmd.exe 89 PID 2224 wrote to memory of 1612 2224 cmd.exe 89 PID 1612 wrote to memory of 2072 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 146 PID 1612 wrote to memory of 2072 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 146 PID 1612 wrote to memory of 2072 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 146 PID 1612 wrote to memory of 2420 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 147 PID 1612 wrote to memory of 2420 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 147 PID 1612 wrote to memory of 2420 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 147 PID 1612 wrote to memory of 2696 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 148 PID 1612 wrote to memory of 2696 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 148 PID 1612 wrote to memory of 2696 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 148 PID 1612 wrote to memory of 1704 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 150 PID 1612 wrote to memory of 1704 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 150 PID 1612 wrote to memory of 1704 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 150 PID 1612 wrote to memory of 2472 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 151 PID 1612 wrote to memory of 2472 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 151 PID 1612 wrote to memory of 2472 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 151 PID 1612 wrote to memory of 1352 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 153 PID 1612 wrote to memory of 1352 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 153 PID 1612 wrote to memory of 1352 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 153 PID 1612 wrote to memory of 1536 1612 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe 155 -
System policy modification 1 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" WmiPrvSE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WmiPrvSE.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" WmiPrvSE.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe"1⤵
- DcRat
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:836 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Links\dllhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\lsm.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:272
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\explorer.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Mail\sppsvc.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\taskhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\spoolsv.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PolicyDefinitions\taskhost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Downloads\Idle.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Photo Viewer\en-US\lsm.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tw4fRItkxA.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1612 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows NT\Accessories\fr-FR\audiodg.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Performance\WinSAT\taskhost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Google\Chrome\Application\106.0.5249.119\services.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\wininit.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\spoolsv.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\RedistList\System.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft Office\Stationery\1033\csrss.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\audiodg.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Globalization\MCT\Idle.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\lsm.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SchCache\csrss.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\en-US\wininit.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\0f2bee02-28a9-11ef-983f-46d84c032646\lsass.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\0f2bee02-28a9-11ef-983f-46d84c032646\WmiPrvSE.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\dwm.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\services.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office\sppsvc.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Recovery\0f2bee02-28a9-11ef-983f-46d84c032646\WmiPrvSE.exe"C:\Recovery\0f2bee02-28a9-11ef-983f-46d84c032646\WmiPrvSE.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1568
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Links\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default\Links\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Links\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\lsm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
PID:2560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\explorer.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Admin\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Mail\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Mail\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:2796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
PID:944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 12 /tr "'C:\Windows\PolicyDefinitions\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 11 /tr "'C:\Windows\PolicyDefinitions\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Downloads\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default\Downloads\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:1788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Downloads\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Photo Viewer\en-US\lsm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\en-US\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Photo Viewer\en-US\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows NT\Accessories\fr-FR\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\Accessories\fr-FR\audiodg.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows NT\Accessories\fr-FR\audiodg.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Windows\Performance\WinSAT\taskhost.exe'" /f1⤵
- Process spawned unexpected child process
PID:2200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 8 /tr "'C:\Windows\Performance\WinSAT\taskhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\services.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Users\Public\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\Public\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Users\Public\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:1524
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2108
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft.NET\RedistList\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft Office\Stationery\1033\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Office\Stationery\1033\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft Office\Stationery\1033\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\audiodg.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
PID:2536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\audiodg.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Windows\Globalization\MCT\Idle.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1184
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\Globalization\MCT\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:1376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Windows\Globalization\MCT\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2880
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\lsm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:876
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsml" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Windows\SchCache\csrss.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\SchCache\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\SchCache\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:1584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\Windows\en-US\wininit.exe'" /f1⤵
- Creates scheduled task(s)
PID:804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\en-US\wininit.exe'" /rl HIGHEST /f1⤵
- Creates scheduled task(s)
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\Windows\en-US\wininit.exe'" /rl HIGHEST /f1⤵
- Creates scheduled task(s)
PID:672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Recovery\0f2bee02-28a9-11ef-983f-46d84c032646\lsass.exe'" /f1⤵
- DcRat
- Creates scheduled task(s)
PID:2800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\0f2bee02-28a9-11ef-983f-46d84c032646\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Recovery\0f2bee02-28a9-11ef-983f-46d84c032646\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:1404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics4" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe'" /f1⤵
- Creates scheduled task(s)
PID:2616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics4" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\498e3f2d908ce17d520c80e8e1d97710_NeikiAnalytics.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:2912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Recovery\0f2bee02-28a9-11ef-983f-46d84c032646\WmiPrvSE.exe'" /f1⤵
- Creates scheduled task(s)
PID:2836
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\0f2bee02-28a9-11ef-983f-46d84c032646\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:1688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Recovery\0f2bee02-28a9-11ef-983f-46d84c032646\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Creates scheduled task(s)
PID:588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\dwm.exe'" /f1⤵
- DcRat
- Creates scheduled task(s)
PID:2756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\dwm.exe'" /rl HIGHEST /f1⤵
- Creates scheduled task(s)
PID:2892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\dwm.exe'" /rl HIGHEST /f1⤵
- Creates scheduled task(s)
PID:580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Users\Public\services.exe'" /f1⤵PID:2740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Public\services.exe'" /rl HIGHEST /f1⤵
- Creates scheduled task(s)
PID:892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Users\Public\services.exe'" /rl HIGHEST /f1⤵
- DcRat
PID:2968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 5 /tr "'C:\Program Files\Microsoft Office\sppsvc.exe'" /f1⤵
- DcRat
- Creates scheduled task(s)
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Creates scheduled task(s)
PID:2672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Program Files\Microsoft Office\sppsvc.exe'" /rl HIGHEST /f1⤵
- Creates scheduled task(s)
PID:1660
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5498e3f2d908ce17d520c80e8e1d97710
SHA1809be62eec8ae9c5b5daef7e6eb7de97dea2e459
SHA2567cf2b75bfdb06b745cfa5dea58aad9790ff832f9fa78d8682ab84b816d5cf2b5
SHA512b0ab40e1462ece7fa287abe774aed384797267f96b04111a714628555d34686b944981148cc7bb0da9385d596895b90cdac42aceec5438de2447ab00a4bb90cf
-
Filesize
250B
MD5cd2914cc9e4e9d61d4c602b0ab9e999e
SHA1ddfa9d2b01605f0266ceec63c3c70016033ef9b8
SHA256a05b8e3f5ae8c23d13258edebe80683824641bf2eb6f226bbebf28b12ace17a0
SHA51275e4399b30ab454995d20f357f14b22a1c6ee3de9470ef4f7a8469ba6f9ad16284e9ce265ff8462dcb0c8f206b735c9e7ad536fa9faf7ec3d7fad1c044c57292
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5131e644f5685e892c6a24217f3abb04f
SHA1e2d490f60dd2489b0db430831d0a143d4939b5e5
SHA256be4818758d2d37a82b54aa2ea47d9e1dca7a615aa4f5b320f4f8b80b98b49128
SHA512e673ec75258104f3962ce516d6e0cb3b44f32037b87f32620ca6dac86549576b07f51e82dbccc1a8da85fcd094a5cbe3fca33fb33777b25eed5e3bb0695f1595