Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 04:48
Static task
static1
Behavioral task
behavioral1
Sample
5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exe
-
Size
2.6MB
-
MD5
5faf6fe31a74438f64465a4c55443620
-
SHA1
7dffad46208bbcd6a203ea695ef67a3a1126a31b
-
SHA256
0413c9f614a312dd40fb834255e2ae48056903c975249be3bd43b44879c67b79
-
SHA512
4f1a51469479d814378f06452ef2ebc8f3f1b5bf2b419fd8dc9c23dba366129cc714e95090bfc927e1c7e68a6cec99b2de3f8a2539ccca6475b33079e177d59b
-
SSDEEP
24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4eX:ObCjPKNqQEfsw43qtmVfq48
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
jhdfkldfhndfkjdfnbfklfnf.exewinmgr119.exewinmgr119.exepid process 1756 jhdfkldfhndfkjdfnbfklfnf.exe 2904 winmgr119.exe 2868 winmgr119.exe -
Loads dropped DLL 1 IoCs
Processes:
5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exepid process 2980 5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/1700-27-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/1700-28-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/1700-29-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/1700-26-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/1700-34-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/628-38-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/628-39-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/628-40-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/628-44-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
cvtres.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts cvtres.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exejhdfkldfhndfkjdfnbfklfnf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" 5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\jhdfkldfhndfkjdfnbfklfnf = "C:\\ProgramData\\jhdfkldfhndfkjdfnbfklfnf.exe" jhdfkldfhndfkjdfnbfklfnf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 icanhazip.com 6 ipinfo.io 8 bot.whatismyipaddress.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe autoit_exe C:\ProgramData\winmgr119.exe autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
jhdfkldfhndfkjdfnbfklfnf.exeRegAsm.exedescription pid process target process PID 1756 set thread context of 2776 1756 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 2776 set thread context of 1700 2776 RegAsm.exe cvtres.exe PID 2776 set thread context of 628 2776 RegAsm.exe cvtres.exe PID 2776 set thread context of 540 2776 RegAsm.exe cvtres.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 26 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 772 schtasks.exe 2732 schtasks.exe 2244 schtasks.exe 2076 schtasks.exe 2672 schtasks.exe 1940 schtasks.exe 1056 schtasks.exe 2672 schtasks.exe 3036 schtasks.exe 2056 schtasks.exe 1720 schtasks.exe 2628 schtasks.exe 2564 schtasks.exe 1528 schtasks.exe 404 schtasks.exe 876 schtasks.exe 2488 schtasks.exe 1236 schtasks.exe 888 schtasks.exe 1996 schtasks.exe 2040 schtasks.exe 2544 schtasks.exe 1592 schtasks.exe 3016 schtasks.exe 2812 schtasks.exe 2824 schtasks.exe -
NTFS ADS 4 IoCs
Processes:
winmgr119.exewinmgr119.exe5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exejhdfkldfhndfkjdfnbfklfnf.exedescription ioc process File created C:\ProgramData\winmgr119.exe:Zone.Identifier:$DATA winmgr119.exe File opened for modification C:\ProgramData\winmgr119.exe:Zone.Identifier:$DATA winmgr119.exe File created C:\Users\Admin\AppData\Local\Temp\5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exe:Zone.Identifier:$DATA 5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exe File created C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe:Zone.Identifier:$DATA jhdfkldfhndfkjdfnbfklfnf.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exejhdfkldfhndfkjdfnbfklfnf.exewinmgr119.exeRegAsm.exewinmgr119.exepid process 2980 5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 2904 winmgr119.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 2776 RegAsm.exe 2776 RegAsm.exe 2776 RegAsm.exe 2776 RegAsm.exe 2776 RegAsm.exe 2776 RegAsm.exe 2776 RegAsm.exe 2776 RegAsm.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 2776 RegAsm.exe 2776 RegAsm.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 2776 RegAsm.exe 2776 RegAsm.exe 2776 RegAsm.exe 2776 RegAsm.exe 2776 RegAsm.exe 2776 RegAsm.exe 2868 winmgr119.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 2776 RegAsm.exe 2776 RegAsm.exe 2776 RegAsm.exe 2776 RegAsm.exe 2776 RegAsm.exe 2776 RegAsm.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe 1756 jhdfkldfhndfkjdfnbfklfnf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
RegAsm.execvtres.execvtres.execvtres.exedescription pid process Token: SeDebugPrivilege 2776 RegAsm.exe Token: SeDebugPrivilege 1700 cvtres.exe Token: SeDebugPrivilege 628 cvtres.exe Token: SeDebugPrivilege 540 cvtres.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 2776 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exejhdfkldfhndfkjdfnbfklfnf.exetaskeng.exedescription pid process target process PID 2980 wrote to memory of 1756 2980 5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exe jhdfkldfhndfkjdfnbfklfnf.exe PID 2980 wrote to memory of 1756 2980 5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exe jhdfkldfhndfkjdfnbfklfnf.exe PID 2980 wrote to memory of 1756 2980 5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exe jhdfkldfhndfkjdfnbfklfnf.exe PID 2980 wrote to memory of 1756 2980 5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exe jhdfkldfhndfkjdfnbfklfnf.exe PID 1756 wrote to memory of 2776 1756 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 1756 wrote to memory of 2776 1756 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 1756 wrote to memory of 2776 1756 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 1756 wrote to memory of 2776 1756 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 1756 wrote to memory of 2776 1756 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 1756 wrote to memory of 2776 1756 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 1756 wrote to memory of 2776 1756 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 1756 wrote to memory of 2776 1756 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 1756 wrote to memory of 2776 1756 jhdfkldfhndfkjdfnbfklfnf.exe RegAsm.exe PID 1756 wrote to memory of 2672 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2672 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2672 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2672 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2824 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2824 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2824 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2824 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2564 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2564 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2564 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2564 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 3016 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 3016 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 3016 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 3016 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 2872 wrote to memory of 2904 2872 taskeng.exe winmgr119.exe PID 2872 wrote to memory of 2904 2872 taskeng.exe winmgr119.exe PID 2872 wrote to memory of 2904 2872 taskeng.exe winmgr119.exe PID 2872 wrote to memory of 2904 2872 taskeng.exe winmgr119.exe PID 1756 wrote to memory of 3036 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 3036 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 3036 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 3036 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2488 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2488 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2488 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2488 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2244 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2244 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2244 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2244 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2732 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2732 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2732 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2732 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 1592 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 1592 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 1592 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 1592 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 1528 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 1528 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 1528 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 1528 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2056 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2056 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2056 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2056 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2076 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2076 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe PID 1756 wrote to memory of 2076 1756 jhdfkldfhndfkjdfnbfklfnf.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5faf6fe31a74438f64465a4c55443620_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exeC:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe03⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp513C.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp5217.tmp"4⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp6615.tmp"4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {F957AC33-FB5D-428E-8821-3AC4C66E6045} S-1-5-21-268080393-3149932598-1824759070-1000:UHRQKJCP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\winmgr119.exeC:\ProgramData\winmgr119.exe2⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\winmgr119.exeC:\ProgramData\winmgr119.exe2⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\khaxFMfI\2c945db753d341ef9b0f02d75d493749Filesize
8B
MD5d294863310558e8912e398479a4578c8
SHA158ed3122af3787386d55610b663ab0795ed2a478
SHA256843c2750518e9e780fddec808330248f29ac9b4085b16aca33447064b147d2b2
SHA5126b952fa880be0473b1e19ec2618bc41e5330b09249f0d0af48a12736491f2183bc4dc05892790d917cba50ab9fcab882cd91c18478d00486aaec5f42ab20b1dc
-
C:\ProgramData\winmgr119.exeFilesize
2.6MB
MD5d3bc4daecfc1f262f318ad24c43fa5d8
SHA10f6209288d9d34360dc2822ba9a42cbcaa22586f
SHA2568ac32d3c00d54304c436b6a72af3f73881fe305507aa2055bf54fecf8d723a06
SHA512efa2a8d2fe9d97416ec33211a956e2acbdc180e9651a304519d94791d9eb12c07ae5a09546b177d686b269b13de988f9f22738a0ea6b60cbb0d8dd3c9ed6dd41
-
C:\Users\Admin\AppData\Local\Temp\tmp513C.tmpFilesize
399B
MD5e4bf4f7accc657622fe419c0d62419ab
SHA1c2856936dd3de05bad0da5ca94d6b521e40ab5a2
SHA256b32fa68b79c5a7ceaa89e8e537efe33a963c499666202611329944bd2c09318e
SHA51285dc223e39a16ddeba53a4b3d6c9eff14d30ec67dfda1e650da2c9057f640edd033a31868915a31caac0d325d240a7f634f62cd52fbd2adc68bd1d9cb6281431
-
C:\Users\Admin\AppData\Local\Temp\tmp5217.tmpFilesize
400B
MD5de4e5ff058882957cf8a3b5f839a031f
SHA10b3d8279120fb5fa27efbd9eee89695aa040fc24
SHA256ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49
SHA512a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72
-
C:\Users\Admin\AppData\Local\Temp\tmp6615.tmpFilesize
391B
MD53525ea58bba48993ea0d01b65ea71381
SHA11b917678fdd969e5ee5916e5899e7c75a979cf4d
SHA256681bcee53cf679ac674e700136f9229b9184fe60ed6410dbd7a33d462ed13ae2
SHA5125aad8dca43ec85882daf50c469bd04dcf0b62affc8bc605b3e289496a2679d4d548fea8bb0aea7080bbfbcdcab9d275fc6797b9c95b64f9f97ecf79583a83986
-
\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exeFilesize
2.6MB
MD5be8db666025182b6912a305890ae8eb5
SHA1ab85fc2a774418ac1e65320b068002263ae397e1
SHA256e63ef0c1fac0dd6b85ca5f2bf8ee278974be97523b4207c6a7c2f15965706388
SHA512d93e3f5dcfb219f3717773b4a87949cf6ff7f6f02755717d395d6e91047d91028a28ab58fc3d8f2fd80ccd6e8b70237c7ea9202e69bc9eae58e890e398f0f91a
-
memory/540-47-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/540-48-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/540-50-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/628-44-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/628-40-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/628-39-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/628-38-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/1700-26-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1700-34-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1700-29-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1700-28-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1700-27-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/2776-21-0x0000000074472000-0x0000000074474000-memory.dmpFilesize
8KB
-
memory/2776-18-0x0000000074472000-0x0000000074474000-memory.dmpFilesize
8KB
-
memory/2776-17-0x0000000000250000-0x000000000031A000-memory.dmpFilesize
808KB
-
memory/2776-10-0x0000000000250000-0x000000000031A000-memory.dmpFilesize
808KB
-
memory/2776-15-0x0000000000250000-0x000000000031A000-memory.dmpFilesize
808KB
-
memory/2776-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2776-13-0x0000000000250000-0x000000000031A000-memory.dmpFilesize
808KB