Analysis
-
max time kernel
125s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe
-
Size
78KB
-
MD5
84adf40fd3bae5667b60c75bad3f0320
-
SHA1
81820dfefa43ed01349a6c6a99a32e344c235bd0
-
SHA256
a247ca1fe9162f80db703c0066d5ede361e38b02017987f2a91d4eb81fbf3caf
-
SHA512
9ca0c4409e10c0c15e3cd282c7cd6b456c755f57625eeafcd3d9ed619ea62565256062f31b82a13bbc90495f083d98813d754a1532ba98cf7e4f7450f4d8816c
-
SSDEEP
1536:tJVSICrSkaw/p/EvPUV/INj1LaI1kCWibeCF5mNo8oSYQXQpbQqX+Pe/:NSleeEEV/OZaPCWibeCjsXEQXSXS6
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral1/memory/2244-1-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-3-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-5-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-6-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-23-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-24-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-22-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-21-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-4-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-7-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-33-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-32-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-34-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-35-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-36-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-38-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-39-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-41-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-42-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-44-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-51-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-53-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-54-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-58-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-61-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-66-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-68-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-69-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-72-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-73-0x0000000002130000-0x00000000031EA000-memory.dmp upx behavioral1/memory/2244-74-0x0000000002130000-0x00000000031EA000-memory.dmp upx -
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process File opened (read-only) \??\I: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\Q: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\J: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\L: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\X: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\Y: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\E: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\K: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\T: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\G: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\H: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\M: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\N: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\O: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\P: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\R: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\S: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\U: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\V: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\W: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened (read-only) \??\Z: 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process File opened for modification C:\autorun.inf 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification F:\autorun.inf 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Drops file in Program Files directory 5 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7z.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process File created C:\Windows\f762452 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe File opened for modification C:\Windows\SYSTEM.INI 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exepid process 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Token: SeDebugPrivilege 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription pid process target process PID 2244 wrote to memory of 1104 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhost.exe PID 2244 wrote to memory of 1180 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Dwm.exe PID 2244 wrote to memory of 1208 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 2244 wrote to memory of 2252 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe DllHost.exe PID 2244 wrote to memory of 1104 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhost.exe PID 2244 wrote to memory of 1180 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Dwm.exe PID 2244 wrote to memory of 1208 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 2244 wrote to memory of 1104 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhost.exe PID 2244 wrote to memory of 1180 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Dwm.exe PID 2244 wrote to memory of 1208 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 2244 wrote to memory of 1104 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhost.exe PID 2244 wrote to memory of 1180 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Dwm.exe PID 2244 wrote to memory of 1208 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 2244 wrote to memory of 1104 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhost.exe PID 2244 wrote to memory of 1180 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Dwm.exe PID 2244 wrote to memory of 1208 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 2244 wrote to memory of 1104 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhost.exe PID 2244 wrote to memory of 1180 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Dwm.exe PID 2244 wrote to memory of 1208 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 2244 wrote to memory of 1104 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhost.exe PID 2244 wrote to memory of 1180 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Dwm.exe PID 2244 wrote to memory of 1208 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 2244 wrote to memory of 1104 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhost.exe PID 2244 wrote to memory of 1180 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Dwm.exe PID 2244 wrote to memory of 1208 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 2244 wrote to memory of 1104 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhost.exe PID 2244 wrote to memory of 1180 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Dwm.exe PID 2244 wrote to memory of 1208 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 2244 wrote to memory of 1104 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhost.exe PID 2244 wrote to memory of 1180 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Dwm.exe PID 2244 wrote to memory of 1208 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 2244 wrote to memory of 1104 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhost.exe PID 2244 wrote to memory of 1180 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Dwm.exe PID 2244 wrote to memory of 1208 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 2244 wrote to memory of 1104 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhost.exe PID 2244 wrote to memory of 1180 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Dwm.exe PID 2244 wrote to memory of 1208 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE PID 2244 wrote to memory of 1104 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe taskhost.exe PID 2244 wrote to memory of 1180 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Dwm.exe PID 2244 wrote to memory of 1208 2244 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe Explorer.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\84adf40fd3bae5667b60c75bad3f0320_NeikiAnalytics.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\owwg.pifFilesize
97KB
MD556e9fb98a29b82e8575c63ab08bd40ad
SHA100ba73db3549db9bfd6af3dc6f2f64c41be18f88
SHA25635d9f901c8f5d0f274be24a995739713bc25b70b180847dac1b6d2a31e281f92
SHA512304249027d0410903e3147e2968dd47b9f710bd90418423d06a1c706d2118804ff9d90b1c6977b41f7182808eef4895939614bfb05463b97e6f7e10130a82ad7
-
memory/1104-8-0x00000000003A0000-0x00000000003A2000-memory.dmpFilesize
8KB
-
memory/2244-35-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-92-0x0000000003380000-0x0000000003382000-memory.dmpFilesize
8KB
-
memory/2244-20-0x0000000003D60000-0x0000000003D61000-memory.dmpFilesize
4KB
-
memory/2244-3-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-16-0x0000000003380000-0x0000000003382000-memory.dmpFilesize
8KB
-
memory/2244-17-0x0000000003D60000-0x0000000003D61000-memory.dmpFilesize
4KB
-
memory/2244-6-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-23-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-0-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/2244-24-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-22-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-26-0x0000000003380000-0x0000000003382000-memory.dmpFilesize
8KB
-
memory/2244-21-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-4-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-7-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-33-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-32-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-34-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-31-0x0000000003380000-0x0000000003382000-memory.dmpFilesize
8KB
-
memory/2244-5-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-51-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-39-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-41-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-42-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-44-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-38-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-53-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-54-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-58-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-61-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-66-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-68-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-69-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-72-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-73-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-74-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-36-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB
-
memory/2244-1-0x0000000002130000-0x00000000031EA000-memory.dmpFilesize
16.7MB