Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 09:06
Static task
static1
Behavioral task
behavioral1
Sample
4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe
-
Size
116KB
-
MD5
fae3794fb88bc70ae89e006fe8b45270
-
SHA1
bdbfefaa7fafb37e9c3c39fec111c0ff18871a99
-
SHA256
4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4
-
SHA512
86fb10a27a3022ab194e05db35cb19d74af26af3a8ca76cba3c518dc0726e8a82d11a09af6e43a2d67a888f4e5e69ca8243beefc7873b5ac439b061af6c2a473
-
SSDEEP
768:Qvw9816vhKQLrou4/wQRNrfrunMxVFA3b7glwRjMlfwGxEI5nWAwxt6sDntNiLJN:YEGh0oul2unMxVS3HgdoKjhLJhL
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BB8CEB5D-E903-43e5-9CE3-F08DC93C68AA} {F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ED39B6A6-86F2-4d5d-98E0-F9229D855BC4} {BB8CEB5D-E903-43e5-9CE3-F08DC93C68AA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ED39B6A6-86F2-4d5d-98E0-F9229D855BC4}\stubpath = "C:\\Windows\\{ED39B6A6-86F2-4d5d-98E0-F9229D855BC4}.exe" {BB8CEB5D-E903-43e5-9CE3-F08DC93C68AA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CC73E47D-6A93-45b8-8B91-F7048856E3AF}\stubpath = "C:\\Windows\\{CC73E47D-6A93-45b8-8B91-F7048856E3AF}.exe" {ED39B6A6-86F2-4d5d-98E0-F9229D855BC4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A} 4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{02EF0BE8-A622-4b07-8605-DA841B5C393F}\stubpath = "C:\\Windows\\{02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe" {C4F88F33-5011-41b7-9854-687FE814ED57}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BB8CEB5D-E903-43e5-9CE3-F08DC93C68AA}\stubpath = "C:\\Windows\\{BB8CEB5D-E903-43e5-9CE3-F08DC93C68AA}.exe" {F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{141013D2-FE38-435e-98A8-8D6F9D45539A}\stubpath = "C:\\Windows\\{141013D2-FE38-435e-98A8-8D6F9D45539A}.exe" {1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{02EF0BE8-A622-4b07-8605-DA841B5C393F} {C4F88F33-5011-41b7-9854-687FE814ED57}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B64533F8-CC80-4ff1-9486-57C7367CE572} {141013D2-FE38-435e-98A8-8D6F9D45539A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B64533F8-CC80-4ff1-9486-57C7367CE572}\stubpath = "C:\\Windows\\{B64533F8-CC80-4ff1-9486-57C7367CE572}.exe" {141013D2-FE38-435e-98A8-8D6F9D45539A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E657BB03-48A9-4351-A3DA-4EB5B301E59C} {B64533F8-CC80-4ff1-9486-57C7367CE572}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4F88F33-5011-41b7-9854-687FE814ED57} {E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F9F786F7-C330-4d7a-8E88-EAF33F4D3300} {02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F9F786F7-C330-4d7a-8E88-EAF33F4D3300}\stubpath = "C:\\Windows\\{F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe" {02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}\stubpath = "C:\\Windows\\{1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe" 4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{141013D2-FE38-435e-98A8-8D6F9D45539A} {1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0E690B34-A9E4-4d2a-B396-8FCBF4B5E176}\stubpath = "C:\\Windows\\{0E690B34-A9E4-4d2a-B396-8FCBF4B5E176}.exe" {CC73E47D-6A93-45b8-8B91-F7048856E3AF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CC73E47D-6A93-45b8-8B91-F7048856E3AF} {ED39B6A6-86F2-4d5d-98E0-F9229D855BC4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0E690B34-A9E4-4d2a-B396-8FCBF4B5E176} {CC73E47D-6A93-45b8-8B91-F7048856E3AF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E657BB03-48A9-4351-A3DA-4EB5B301E59C}\stubpath = "C:\\Windows\\{E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe" {B64533F8-CC80-4ff1-9486-57C7367CE572}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4F88F33-5011-41b7-9854-687FE814ED57}\stubpath = "C:\\Windows\\{C4F88F33-5011-41b7-9854-687FE814ED57}.exe" {E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe -
Deletes itself 1 IoCs
pid Process 1504 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2184 {1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe 2712 {141013D2-FE38-435e-98A8-8D6F9D45539A}.exe 2704 {B64533F8-CC80-4ff1-9486-57C7367CE572}.exe 3064 {E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe 2940 {C4F88F33-5011-41b7-9854-687FE814ED57}.exe 620 {02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe 1244 {F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe 2796 {BB8CEB5D-E903-43e5-9CE3-F08DC93C68AA}.exe 2060 {ED39B6A6-86F2-4d5d-98E0-F9229D855BC4}.exe 2476 {CC73E47D-6A93-45b8-8B91-F7048856E3AF}.exe 1124 {0E690B34-A9E4-4d2a-B396-8FCBF4B5E176}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{C4F88F33-5011-41b7-9854-687FE814ED57}.exe {E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe File created C:\Windows\{02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe {C4F88F33-5011-41b7-9854-687FE814ED57}.exe File created C:\Windows\{F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe {02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe File created C:\Windows\{ED39B6A6-86F2-4d5d-98E0-F9229D855BC4}.exe {BB8CEB5D-E903-43e5-9CE3-F08DC93C68AA}.exe File created C:\Windows\{CC73E47D-6A93-45b8-8B91-F7048856E3AF}.exe {ED39B6A6-86F2-4d5d-98E0-F9229D855BC4}.exe File created C:\Windows\{1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe 4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe File created C:\Windows\{141013D2-FE38-435e-98A8-8D6F9D45539A}.exe {1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe File created C:\Windows\{B64533F8-CC80-4ff1-9486-57C7367CE572}.exe {141013D2-FE38-435e-98A8-8D6F9D45539A}.exe File created C:\Windows\{E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe {B64533F8-CC80-4ff1-9486-57C7367CE572}.exe File created C:\Windows\{BB8CEB5D-E903-43e5-9CE3-F08DC93C68AA}.exe {F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe File created C:\Windows\{0E690B34-A9E4-4d2a-B396-8FCBF4B5E176}.exe {CC73E47D-6A93-45b8-8B91-F7048856E3AF}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2208 4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe Token: SeIncBasePriorityPrivilege 2184 {1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe Token: SeIncBasePriorityPrivilege 2712 {141013D2-FE38-435e-98A8-8D6F9D45539A}.exe Token: SeIncBasePriorityPrivilege 2704 {B64533F8-CC80-4ff1-9486-57C7367CE572}.exe Token: SeIncBasePriorityPrivilege 3064 {E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe Token: SeIncBasePriorityPrivilege 2940 {C4F88F33-5011-41b7-9854-687FE814ED57}.exe Token: SeIncBasePriorityPrivilege 620 {02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe Token: SeIncBasePriorityPrivilege 1244 {F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe Token: SeIncBasePriorityPrivilege 2796 {BB8CEB5D-E903-43e5-9CE3-F08DC93C68AA}.exe Token: SeIncBasePriorityPrivilege 2060 {ED39B6A6-86F2-4d5d-98E0-F9229D855BC4}.exe Token: SeIncBasePriorityPrivilege 2476 {CC73E47D-6A93-45b8-8B91-F7048856E3AF}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2184 2208 4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe 28 PID 2208 wrote to memory of 2184 2208 4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe 28 PID 2208 wrote to memory of 2184 2208 4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe 28 PID 2208 wrote to memory of 2184 2208 4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe 28 PID 2208 wrote to memory of 1504 2208 4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe 29 PID 2208 wrote to memory of 1504 2208 4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe 29 PID 2208 wrote to memory of 1504 2208 4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe 29 PID 2208 wrote to memory of 1504 2208 4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe 29 PID 2184 wrote to memory of 2712 2184 {1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe 30 PID 2184 wrote to memory of 2712 2184 {1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe 30 PID 2184 wrote to memory of 2712 2184 {1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe 30 PID 2184 wrote to memory of 2712 2184 {1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe 30 PID 2184 wrote to memory of 2684 2184 {1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe 31 PID 2184 wrote to memory of 2684 2184 {1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe 31 PID 2184 wrote to memory of 2684 2184 {1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe 31 PID 2184 wrote to memory of 2684 2184 {1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe 31 PID 2712 wrote to memory of 2704 2712 {141013D2-FE38-435e-98A8-8D6F9D45539A}.exe 32 PID 2712 wrote to memory of 2704 2712 {141013D2-FE38-435e-98A8-8D6F9D45539A}.exe 32 PID 2712 wrote to memory of 2704 2712 {141013D2-FE38-435e-98A8-8D6F9D45539A}.exe 32 PID 2712 wrote to memory of 2704 2712 {141013D2-FE38-435e-98A8-8D6F9D45539A}.exe 32 PID 2712 wrote to memory of 2840 2712 {141013D2-FE38-435e-98A8-8D6F9D45539A}.exe 33 PID 2712 wrote to memory of 2840 2712 {141013D2-FE38-435e-98A8-8D6F9D45539A}.exe 33 PID 2712 wrote to memory of 2840 2712 {141013D2-FE38-435e-98A8-8D6F9D45539A}.exe 33 PID 2712 wrote to memory of 2840 2712 {141013D2-FE38-435e-98A8-8D6F9D45539A}.exe 33 PID 2704 wrote to memory of 3064 2704 {B64533F8-CC80-4ff1-9486-57C7367CE572}.exe 36 PID 2704 wrote to memory of 3064 2704 {B64533F8-CC80-4ff1-9486-57C7367CE572}.exe 36 PID 2704 wrote to memory of 3064 2704 {B64533F8-CC80-4ff1-9486-57C7367CE572}.exe 36 PID 2704 wrote to memory of 3064 2704 {B64533F8-CC80-4ff1-9486-57C7367CE572}.exe 36 PID 2704 wrote to memory of 568 2704 {B64533F8-CC80-4ff1-9486-57C7367CE572}.exe 37 PID 2704 wrote to memory of 568 2704 {B64533F8-CC80-4ff1-9486-57C7367CE572}.exe 37 PID 2704 wrote to memory of 568 2704 {B64533F8-CC80-4ff1-9486-57C7367CE572}.exe 37 PID 2704 wrote to memory of 568 2704 {B64533F8-CC80-4ff1-9486-57C7367CE572}.exe 37 PID 3064 wrote to memory of 2940 3064 {E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe 38 PID 3064 wrote to memory of 2940 3064 {E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe 38 PID 3064 wrote to memory of 2940 3064 {E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe 38 PID 3064 wrote to memory of 2940 3064 {E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe 38 PID 3064 wrote to memory of 2984 3064 {E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe 39 PID 3064 wrote to memory of 2984 3064 {E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe 39 PID 3064 wrote to memory of 2984 3064 {E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe 39 PID 3064 wrote to memory of 2984 3064 {E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe 39 PID 2940 wrote to memory of 620 2940 {C4F88F33-5011-41b7-9854-687FE814ED57}.exe 40 PID 2940 wrote to memory of 620 2940 {C4F88F33-5011-41b7-9854-687FE814ED57}.exe 40 PID 2940 wrote to memory of 620 2940 {C4F88F33-5011-41b7-9854-687FE814ED57}.exe 40 PID 2940 wrote to memory of 620 2940 {C4F88F33-5011-41b7-9854-687FE814ED57}.exe 40 PID 2940 wrote to memory of 1920 2940 {C4F88F33-5011-41b7-9854-687FE814ED57}.exe 41 PID 2940 wrote to memory of 1920 2940 {C4F88F33-5011-41b7-9854-687FE814ED57}.exe 41 PID 2940 wrote to memory of 1920 2940 {C4F88F33-5011-41b7-9854-687FE814ED57}.exe 41 PID 2940 wrote to memory of 1920 2940 {C4F88F33-5011-41b7-9854-687FE814ED57}.exe 41 PID 620 wrote to memory of 1244 620 {02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe 42 PID 620 wrote to memory of 1244 620 {02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe 42 PID 620 wrote to memory of 1244 620 {02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe 42 PID 620 wrote to memory of 1244 620 {02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe 42 PID 620 wrote to memory of 2756 620 {02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe 43 PID 620 wrote to memory of 2756 620 {02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe 43 PID 620 wrote to memory of 2756 620 {02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe 43 PID 620 wrote to memory of 2756 620 {02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe 43 PID 1244 wrote to memory of 2796 1244 {F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe 44 PID 1244 wrote to memory of 2796 1244 {F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe 44 PID 1244 wrote to memory of 2796 1244 {F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe 44 PID 1244 wrote to memory of 2796 1244 {F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe 44 PID 1244 wrote to memory of 1952 1244 {F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe 45 PID 1244 wrote to memory of 1952 1244 {F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe 45 PID 1244 wrote to memory of 1952 1244 {F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe 45 PID 1244 wrote to memory of 1952 1244 {F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4e45fe95f4de42f7035c05f1f988f84b84079126ad427a78e8bf6782ddb499d4_NeikiAnalytics.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\{1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exeC:\Windows\{1D1CC657-CA06-4236-BD4D-C4F8EA9FB11A}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\{141013D2-FE38-435e-98A8-8D6F9D45539A}.exeC:\Windows\{141013D2-FE38-435e-98A8-8D6F9D45539A}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\{B64533F8-CC80-4ff1-9486-57C7367CE572}.exeC:\Windows\{B64533F8-CC80-4ff1-9486-57C7367CE572}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\{E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exeC:\Windows\{E657BB03-48A9-4351-A3DA-4EB5B301E59C}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\{C4F88F33-5011-41b7-9854-687FE814ED57}.exeC:\Windows\{C4F88F33-5011-41b7-9854-687FE814ED57}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\{02EF0BE8-A622-4b07-8605-DA841B5C393F}.exeC:\Windows\{02EF0BE8-A622-4b07-8605-DA841B5C393F}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\{F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exeC:\Windows\{F9F786F7-C330-4d7a-8E88-EAF33F4D3300}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\{BB8CEB5D-E903-43e5-9CE3-F08DC93C68AA}.exeC:\Windows\{BB8CEB5D-E903-43e5-9CE3-F08DC93C68AA}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2796 -
C:\Windows\{ED39B6A6-86F2-4d5d-98E0-F9229D855BC4}.exeC:\Windows\{ED39B6A6-86F2-4d5d-98E0-F9229D855BC4}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\{CC73E47D-6A93-45b8-8B91-F7048856E3AF}.exeC:\Windows\{CC73E47D-6A93-45b8-8B91-F7048856E3AF}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Windows\{0E690B34-A9E4-4d2a-B396-8FCBF4B5E176}.exeC:\Windows\{0E690B34-A9E4-4d2a-B396-8FCBF4B5E176}.exe12⤵
- Executes dropped EXE
PID:1124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CC73E~1.EXE > nul12⤵PID:944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ED39B~1.EXE > nul11⤵PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BB8CE~1.EXE > nul10⤵PID:2072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F9F78~1.EXE > nul9⤵PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{02EF0~1.EXE > nul8⤵PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C4F88~1.EXE > nul7⤵PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E657B~1.EXE > nul6⤵PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6453~1.EXE > nul5⤵PID:568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{14101~1.EXE > nul4⤵PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1D1CC~1.EXE > nul3⤵PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\4E45FE~1.EXE > nul2⤵
- Deletes itself
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD52673287daa14c44a69c55d61c5faa83e
SHA1f42a70f8a02123feed03db36542974a1c5f26639
SHA256c8ad7aeb39ca5b990cdc1dabb530470fa7ea24c4d809d0787a86ffe2d43561ea
SHA512f04f55bf474d37bfbf3c87a88710315f584ba0f17877979d49c74835bb9f107ee5e90627420806f39b378065780b47a5e25643623cc12dce6b7c7a9b209db5d5
-
Filesize
116KB
MD575061d6c68034b35e1d33eab7f007c83
SHA1b99e54ef98230fff19097f6fd8bca71d4f405548
SHA256dc47018402626dbc24720fd7bf11823135e228d621d9dcc2198b26a8033646c4
SHA5127b4d90056d6a2ae2948e0ef86eeedb3396eaaf744abfb144779522f4fc126135f2ae70db980be129381d704b91addce8fb658cec85cfc5b353320461100e8f10
-
Filesize
116KB
MD5766adfd92f0c1b4bc1a8c2db54e57806
SHA1e5d93c0222e4e1861512c0a983c975978f81bf34
SHA25693da756022e3dd0632dd809caf1a850e77560921abe2e29fff437179d2c9eef9
SHA51244b5631f503598bde322c659713cbd5820b59aa26ab9b8964a3d86d4e4d3b435816bcc4dc4b9aa4cc243345d2005c711934862733996603fb6cbbb460e14c9ef
-
Filesize
116KB
MD5d9206aa6781a4bec951f9132d6eff17b
SHA1e0536921e3ab4a9b7f91f2475867ca201a9fc5c9
SHA256c5449447a4d71c5c6f9a4ed4a15bb52c200160d11e64831a12fd4b83731e329b
SHA512ecbf0def5b6ba066061413d686e648049c2d3f34f2881cfb356736c599ba6879350e98202f1a626d99a9fa7f78ba2a0ce41a9f3787614280ea6e527f46233de2
-
Filesize
116KB
MD5e20c8487a0152b3ee40bd585548c6a9f
SHA1ceb578b1585fa1e47f689369548892867ce10dd7
SHA2563805f47b2352205b2a7a2dcf412d1c18475da83f958ac553ac22adc080058cab
SHA5125d6b2acc6177120d8107992abcf020ca4c3cc3d830e788ecc8d7525354802052871d5d62c5ab9ae3b5e38465f045ff84ed58ae7dd4606dba7c64ecd81dce6b0c
-
Filesize
116KB
MD52b462b50fbaa05abf9d1360a14beccb9
SHA1399afed4f6d7d70317d0e1a395abdd45aaa86b98
SHA2560d285bb5be17fd484957ff454ceba07e85047b2c9884acb5d3d6aea59c779246
SHA5129a07cbb52b6bf6391f1e6eb376a514d70c3c25ee3bd5f14077359299563ceb5e2ebc24ffa9c86cacd952b9bb682250b34fcaf4b419462088c12f273c977004bb
-
Filesize
116KB
MD5da4a25d6f48381b979a064f8ebeb0874
SHA192b18b2fedf526de78d520e90c116c1afcb402bc
SHA256b8d623c4a7310120fc4429fa27996c3c8fcb3b08ad155810eaa4116862fea5fb
SHA512aab53d6abe817b465b3691dc0fc8a29cac160c76d764c8637247848ac0f975200e3e8defdc7fc9508e0efb4044af147b7e77480a3644f4cf751f88843b765262
-
Filesize
116KB
MD5ea642e35ff00514edb57616352359e73
SHA1293a0299edbed2c750fb7e44160ea05cd4a8e154
SHA2565e080e3422c8eaf4ece4f3b7cfe352a63d36112edbd0a778ee4d107d1d5844ab
SHA512c01339a18134a7c3e56056d4b5d803918a89973f5d0b517b887a740b7fce5ba34dc68b6f41189454ee15f8d1749a0561f343a58df92c462f8507c7fb2727cfbe
-
Filesize
116KB
MD5154f8f819972dd83adb102dc5a010360
SHA1cf686278095ae922ea20bbfdc4852098b899e29a
SHA2561f2938da7e5e8381d31f53a1a2e1ca6d4bb67531645884a354aaeae9d550f9a2
SHA5120fffd3337cdbffb5cec05d7731ae0c34f655cfc644c4efebc13bfeb5d2a4419d035bd3a17aa68a377047b13ee5846168edb9190edb42b3efaf55042595c0bf26
-
Filesize
116KB
MD563983c3626f4d07d528f91ec6f5a3b0c
SHA19658ddb6b160de38127afdc0b43b964ad0994b1e
SHA25627030e50d32bf18946f569a8b44bfa94359d55c869fdeaf68687326c1d8b88e3
SHA512e0c140255e697a57a787c85a04eca4ed3efc2ec757c06798a5b5240dc9fb2dae6180c95ce3184b25f96ecb89dccb402b3ea946a8cf5b2e00e7db57976b915b00
-
Filesize
116KB
MD57a264f5423dc55d701c5fc71b14f5a25
SHA1c98583d3464dcf422331db23f56634bca4db22eb
SHA256a8760aa6c43fdf89a38686a42a26e2f8ee43ff435c95623be300aab1204eb649
SHA512791256d1fe496d7296665b7b7456cd7e136653dabc68a5d8e8052643041f5c730c055c0f976579bb745876c0faf0d89c843ebe0aeda3a4e750a2b701278731f3