Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe
-
Size
124KB
-
MD5
827806b0db3be1c2b9a0d2fbc89cf1d0
-
SHA1
b294292235a931ba3841c8081786171ad42f8bcc
-
SHA256
1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5
-
SHA512
69b60f613dfd8f8ca992aedaa38b5929c9e6177156cdfaf0f360b0b1356d6b8803ea25a95e418fd39ff18a0a117c73c7ce4735e8506405261acef1f0af2144a7
-
SSDEEP
3072:X1i/NU8bOMYcYYcmy5cU+gTn6HOjDhWrzvvQwlgOts5YmMOMYcYY51i/NU8:li/NjO5YBgegD0PHzSW3Oai/N
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\qx.bat 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe File created C:\WINDOWS\SysWOW64\ie.bat 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 7 IoCs
pid Process 2784 cmd.exe 952 cmd.exe 752 cmd.exe 4844 cmd.exe 4812 cmd.exe 1092 cmd.exe 4148 cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe File opened for modification C:\WINDOWS\windows.exe 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0712f7b9ac2da01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078f1237f04e5404da848d5bad8ef862600000000020000000000106600000001000020000000501bedfc13e35c6d5c48dae3b0ca804b410cc751dec437283249435a3627a940000000000e8000000002000020000000440ec596a8d79adf59d5a8c5a5dfc9efb6ad31bcf5225c7d5971df36bb6f6f50200000004703ce2447cfadb2875740304ad019b8e316913cfd5688bd034bd9441b359356400000003f0a7bfd81bee3c0e4e7dfa9c2a9fc25adffee3743d567685b91ce6bf6a5ead0d314bc37d4c3a89a41586e1d130930d0af22c424e14ee9729ff7ba513e9b32e3 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424998993" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0046287b9ac2da01 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{98671BDA-2E8D-11EF-9519-66D3FDB32ECD} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078f1237f04e5404da848d5bad8ef8626000000000200000000001066000000010000200000003705429272bd2971cc9481d1f9a250ab9b36ca98e848f6e9aed6c1c840b86c61000000000e80000000020000200000006f5bb10f7cd1a628b176cb402695218f49dab20c47bc866981c75c93a0e7ab7d200000001495bc5ce232049680271966dbab49363523aadd4855193bc6595e16a82340e1400000002ee0651ede43acc6bf5785cc48ecd174802b531ab79585597acf2f517b76a146516ab7ada9455ea46db1e4541e453994a95fccf9347e74104f1065d0af1cd9fd IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4640 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 4640 IEXPLORE.EXE 4640 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 788 wrote to memory of 4640 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 82 PID 788 wrote to memory of 4640 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 82 PID 4640 wrote to memory of 1324 4640 IEXPLORE.EXE 84 PID 4640 wrote to memory of 1324 4640 IEXPLORE.EXE 84 PID 4640 wrote to memory of 1324 4640 IEXPLORE.EXE 84 PID 788 wrote to memory of 4612 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 85 PID 788 wrote to memory of 4612 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 85 PID 788 wrote to memory of 1092 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 86 PID 788 wrote to memory of 1092 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 86 PID 788 wrote to memory of 1092 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 86 PID 1092 wrote to memory of 3100 1092 cmd.exe 88 PID 1092 wrote to memory of 3100 1092 cmd.exe 88 PID 1092 wrote to memory of 3100 1092 cmd.exe 88 PID 788 wrote to memory of 4148 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 89 PID 788 wrote to memory of 4148 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 89 PID 788 wrote to memory of 4148 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 89 PID 4148 wrote to memory of 2132 4148 cmd.exe 91 PID 4148 wrote to memory of 2132 4148 cmd.exe 91 PID 4148 wrote to memory of 2132 4148 cmd.exe 91 PID 788 wrote to memory of 2784 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 92 PID 788 wrote to memory of 2784 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 92 PID 788 wrote to memory of 2784 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 92 PID 2784 wrote to memory of 3560 2784 cmd.exe 94 PID 2784 wrote to memory of 3560 2784 cmd.exe 94 PID 2784 wrote to memory of 3560 2784 cmd.exe 94 PID 788 wrote to memory of 952 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 95 PID 788 wrote to memory of 952 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 95 PID 788 wrote to memory of 952 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 95 PID 952 wrote to memory of 4584 952 cmd.exe 98 PID 952 wrote to memory of 4584 952 cmd.exe 98 PID 952 wrote to memory of 4584 952 cmd.exe 98 PID 788 wrote to memory of 752 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 99 PID 788 wrote to memory of 752 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 99 PID 788 wrote to memory of 752 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 99 PID 752 wrote to memory of 1412 752 cmd.exe 101 PID 752 wrote to memory of 1412 752 cmd.exe 101 PID 752 wrote to memory of 1412 752 cmd.exe 101 PID 788 wrote to memory of 4844 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 103 PID 788 wrote to memory of 4844 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 103 PID 788 wrote to memory of 4844 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 103 PID 4844 wrote to memory of 1432 4844 cmd.exe 105 PID 4844 wrote to memory of 1432 4844 cmd.exe 105 PID 4844 wrote to memory of 1432 4844 cmd.exe 105 PID 788 wrote to memory of 4812 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 106 PID 788 wrote to memory of 4812 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 106 PID 788 wrote to memory of 4812 788 1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe 106 PID 4812 wrote to memory of 3740 4812 cmd.exe 108 PID 4812 wrote to memory of 3740 4812 cmd.exe 108 PID 4812 wrote to memory of 3740 4812 cmd.exe 108 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 3560 attrib.exe 4584 attrib.exe 1412 attrib.exe 1432 attrib.exe 3740 attrib.exe 3100 attrib.exe 2132 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1336225b1887939b08767f3466eac707251f5869db2b7575715e301b904dcbe5_NeikiAnalytics.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.212ok.com/Gbook.asp?qita2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4640 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
PID:4612
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:3100
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:2132
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- Views/modifies file attributes
PID:3560
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:4584
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:1412
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:1432
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- Views/modifies file attributes
PID:3740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD55ef69fbb393310db6b5fbb23c9ce42a2
SHA1fa5253a71e50bdcfaff144e8a12f27a05f890ee8
SHA2561d148ac7dd5f933671e01016a1cc592a46222430b2f73ce6c76bbee44a6389b4
SHA512a4e0b4e7415fa7f8f60bafe3e77e074eea4596f5f9aa37eaa859350846b29e5d3a2f57eb5bad67eff5e4d6c362d2c0a0a40bcaf551daccad747392e87dad3635
-
Filesize
124KB
MD570525d04457d22b77114e6504e095d01
SHA1f86a22657dc2b5c1371fe8ae5e8b053066ad8c81
SHA256c7b2b0eb3f36d696c10d8a9053ac411b64c5f9f832e6d662811b4789db2a736e
SHA512d5642a895e2f1b07a445a3d21e5a040c4be01469c0a4c06bd2495a3b0c77aefc785e5e07df14dd1a3b4e866cd31b2f914c3aebd8d75aa6e5b363e56aea9361ac