Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 09:36
Static task
static1
Behavioral task
behavioral1
Sample
51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe
-
Size
60KB
-
MD5
730443f70a591776eff905e8d1653990
-
SHA1
5ba86c737086259edd474afa2452b5d81c3d482f
-
SHA256
51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321
-
SHA512
b1db6ad43818e2ece52ded004651064f29e68837d693d797b5fa6e26ba4d36133794e2ec155eef618bc45f3b4ca1708afa399d79e7a425ee7cb5c2dcedefe5e3
-
SSDEEP
768:vvw9816vhKQLroCQ4/wQxWMZQcpFM1FgDagXP2TyS1tl7lfqvocqcdT3WVd:nEGh0oCQlwWMZQcpmgDagIyS1loL7Wr
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CE4C619F-7B69-4ed6-8768-E298CDB67DD1} {530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BF2B04AB-469A-4269-A906-5F1A09FEB079}\stubpath = "C:\\Windows\\{BF2B04AB-469A-4269-A906-5F1A09FEB079}.exe" {CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}\stubpath = "C:\\Windows\\{C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exe" {EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{79F6F035-3B88-463b-9CF3-3AF701ABFFC8} {C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{17A7AB09-FD95-473f-8A16-A245BF5851BC} {79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5} 51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DBD20F75-0246-40aa-895F-785357E94661} {FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{530EEABA-F396-4d94-895C-D2AA3BFEEC33} {DBD20F75-0246-40aa-895F-785357E94661}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{95BE712E-F6EC-43db-9ED9-32C795DC57A0} {17A7AB09-FD95-473f-8A16-A245BF5851BC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E93B9265-FE29-4443-BD91-70F7A124BC83}\stubpath = "C:\\Windows\\{E93B9265-FE29-4443-BD91-70F7A124BC83}.exe" {95BE712E-F6EC-43db-9ED9-32C795DC57A0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E7C9F9E4-CD5A-4dd3-994E-CEE3B049C7B8} {E93B9265-FE29-4443-BD91-70F7A124BC83}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E7C9F9E4-CD5A-4dd3-994E-CEE3B049C7B8}\stubpath = "C:\\Windows\\{E7C9F9E4-CD5A-4dd3-994E-CEE3B049C7B8}.exe" {E93B9265-FE29-4443-BD91-70F7A124BC83}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}\stubpath = "C:\\Windows\\{EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exe" {BF2B04AB-469A-4269-A906-5F1A09FEB079}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C5AB32A5-C7A3-4db6-A7B5-8CC09261138A} {EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{17A7AB09-FD95-473f-8A16-A245BF5851BC}\stubpath = "C:\\Windows\\{17A7AB09-FD95-473f-8A16-A245BF5851BC}.exe" {79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BF2B04AB-469A-4269-A906-5F1A09FEB079} {CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{79F6F035-3B88-463b-9CF3-3AF701ABFFC8}\stubpath = "C:\\Windows\\{79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exe" {C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{95BE712E-F6EC-43db-9ED9-32C795DC57A0}\stubpath = "C:\\Windows\\{95BE712E-F6EC-43db-9ED9-32C795DC57A0}.exe" {17A7AB09-FD95-473f-8A16-A245BF5851BC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CE4C619F-7B69-4ed6-8768-E298CDB67DD1}\stubpath = "C:\\Windows\\{CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exe" {530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E} {BF2B04AB-469A-4269-A906-5F1A09FEB079}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E93B9265-FE29-4443-BD91-70F7A124BC83} {95BE712E-F6EC-43db-9ED9-32C795DC57A0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}\stubpath = "C:\\Windows\\{FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exe" 51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DBD20F75-0246-40aa-895F-785357E94661}\stubpath = "C:\\Windows\\{DBD20F75-0246-40aa-895F-785357E94661}.exe" {FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{530EEABA-F396-4d94-895C-D2AA3BFEEC33}\stubpath = "C:\\Windows\\{530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exe" {DBD20F75-0246-40aa-895F-785357E94661}.exe -
Executes dropped EXE 12 IoCs
pid Process 2804 {FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exe 4032 {DBD20F75-0246-40aa-895F-785357E94661}.exe 1092 {530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exe 3804 {CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exe 3156 {BF2B04AB-469A-4269-A906-5F1A09FEB079}.exe 2796 {EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exe 2124 {C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exe 3672 {79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exe 1284 {17A7AB09-FD95-473f-8A16-A245BF5851BC}.exe 1164 {95BE712E-F6EC-43db-9ED9-32C795DC57A0}.exe 4860 {E93B9265-FE29-4443-BD91-70F7A124BC83}.exe 4532 {E7C9F9E4-CD5A-4dd3-994E-CEE3B049C7B8}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{DBD20F75-0246-40aa-895F-785357E94661}.exe {FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exe File created C:\Windows\{EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exe {BF2B04AB-469A-4269-A906-5F1A09FEB079}.exe File created C:\Windows\{17A7AB09-FD95-473f-8A16-A245BF5851BC}.exe {79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exe File created C:\Windows\{E93B9265-FE29-4443-BD91-70F7A124BC83}.exe {95BE712E-F6EC-43db-9ED9-32C795DC57A0}.exe File created C:\Windows\{E7C9F9E4-CD5A-4dd3-994E-CEE3B049C7B8}.exe {E93B9265-FE29-4443-BD91-70F7A124BC83}.exe File created C:\Windows\{FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exe 51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe File created C:\Windows\{530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exe {DBD20F75-0246-40aa-895F-785357E94661}.exe File created C:\Windows\{CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exe {530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exe File created C:\Windows\{BF2B04AB-469A-4269-A906-5F1A09FEB079}.exe {CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exe File created C:\Windows\{C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exe {EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exe File created C:\Windows\{79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exe {C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exe File created C:\Windows\{95BE712E-F6EC-43db-9ED9-32C795DC57A0}.exe {17A7AB09-FD95-473f-8A16-A245BF5851BC}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3808 51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe Token: SeIncBasePriorityPrivilege 2804 {FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exe Token: SeIncBasePriorityPrivilege 4032 {DBD20F75-0246-40aa-895F-785357E94661}.exe Token: SeIncBasePriorityPrivilege 1092 {530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exe Token: SeIncBasePriorityPrivilege 3804 {CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exe Token: SeIncBasePriorityPrivilege 3156 {BF2B04AB-469A-4269-A906-5F1A09FEB079}.exe Token: SeIncBasePriorityPrivilege 2796 {EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exe Token: SeIncBasePriorityPrivilege 2124 {C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exe Token: SeIncBasePriorityPrivilege 3672 {79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exe Token: SeIncBasePriorityPrivilege 1284 {17A7AB09-FD95-473f-8A16-A245BF5851BC}.exe Token: SeIncBasePriorityPrivilege 1164 {95BE712E-F6EC-43db-9ED9-32C795DC57A0}.exe Token: SeIncBasePriorityPrivilege 4860 {E93B9265-FE29-4443-BD91-70F7A124BC83}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3808 wrote to memory of 2804 3808 51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe 94 PID 3808 wrote to memory of 2804 3808 51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe 94 PID 3808 wrote to memory of 2804 3808 51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe 94 PID 3808 wrote to memory of 3592 3808 51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe 95 PID 3808 wrote to memory of 3592 3808 51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe 95 PID 3808 wrote to memory of 3592 3808 51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe 95 PID 2804 wrote to memory of 4032 2804 {FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exe 96 PID 2804 wrote to memory of 4032 2804 {FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exe 96 PID 2804 wrote to memory of 4032 2804 {FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exe 96 PID 2804 wrote to memory of 516 2804 {FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exe 97 PID 2804 wrote to memory of 516 2804 {FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exe 97 PID 2804 wrote to memory of 516 2804 {FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exe 97 PID 4032 wrote to memory of 1092 4032 {DBD20F75-0246-40aa-895F-785357E94661}.exe 101 PID 4032 wrote to memory of 1092 4032 {DBD20F75-0246-40aa-895F-785357E94661}.exe 101 PID 4032 wrote to memory of 1092 4032 {DBD20F75-0246-40aa-895F-785357E94661}.exe 101 PID 4032 wrote to memory of 1916 4032 {DBD20F75-0246-40aa-895F-785357E94661}.exe 102 PID 4032 wrote to memory of 1916 4032 {DBD20F75-0246-40aa-895F-785357E94661}.exe 102 PID 4032 wrote to memory of 1916 4032 {DBD20F75-0246-40aa-895F-785357E94661}.exe 102 PID 1092 wrote to memory of 3804 1092 {530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exe 103 PID 1092 wrote to memory of 3804 1092 {530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exe 103 PID 1092 wrote to memory of 3804 1092 {530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exe 103 PID 1092 wrote to memory of 2284 1092 {530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exe 104 PID 1092 wrote to memory of 2284 1092 {530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exe 104 PID 1092 wrote to memory of 2284 1092 {530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exe 104 PID 3804 wrote to memory of 3156 3804 {CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exe 106 PID 3804 wrote to memory of 3156 3804 {CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exe 106 PID 3804 wrote to memory of 3156 3804 {CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exe 106 PID 3804 wrote to memory of 4260 3804 {CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exe 107 PID 3804 wrote to memory of 4260 3804 {CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exe 107 PID 3804 wrote to memory of 4260 3804 {CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exe 107 PID 3156 wrote to memory of 2796 3156 {BF2B04AB-469A-4269-A906-5F1A09FEB079}.exe 108 PID 3156 wrote to memory of 2796 3156 {BF2B04AB-469A-4269-A906-5F1A09FEB079}.exe 108 PID 3156 wrote to memory of 2796 3156 {BF2B04AB-469A-4269-A906-5F1A09FEB079}.exe 108 PID 3156 wrote to memory of 4748 3156 {BF2B04AB-469A-4269-A906-5F1A09FEB079}.exe 109 PID 3156 wrote to memory of 4748 3156 {BF2B04AB-469A-4269-A906-5F1A09FEB079}.exe 109 PID 3156 wrote to memory of 4748 3156 {BF2B04AB-469A-4269-A906-5F1A09FEB079}.exe 109 PID 2796 wrote to memory of 2124 2796 {EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exe 110 PID 2796 wrote to memory of 2124 2796 {EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exe 110 PID 2796 wrote to memory of 2124 2796 {EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exe 110 PID 2796 wrote to memory of 4112 2796 {EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exe 111 PID 2796 wrote to memory of 4112 2796 {EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exe 111 PID 2796 wrote to memory of 4112 2796 {EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exe 111 PID 2124 wrote to memory of 3672 2124 {C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exe 115 PID 2124 wrote to memory of 3672 2124 {C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exe 115 PID 2124 wrote to memory of 3672 2124 {C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exe 115 PID 2124 wrote to memory of 4808 2124 {C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exe 116 PID 2124 wrote to memory of 4808 2124 {C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exe 116 PID 2124 wrote to memory of 4808 2124 {C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exe 116 PID 3672 wrote to memory of 1284 3672 {79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exe 120 PID 3672 wrote to memory of 1284 3672 {79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exe 120 PID 3672 wrote to memory of 1284 3672 {79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exe 120 PID 3672 wrote to memory of 676 3672 {79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exe 121 PID 3672 wrote to memory of 676 3672 {79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exe 121 PID 3672 wrote to memory of 676 3672 {79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exe 121 PID 1284 wrote to memory of 1164 1284 {17A7AB09-FD95-473f-8A16-A245BF5851BC}.exe 122 PID 1284 wrote to memory of 1164 1284 {17A7AB09-FD95-473f-8A16-A245BF5851BC}.exe 122 PID 1284 wrote to memory of 1164 1284 {17A7AB09-FD95-473f-8A16-A245BF5851BC}.exe 122 PID 1284 wrote to memory of 1764 1284 {17A7AB09-FD95-473f-8A16-A245BF5851BC}.exe 123 PID 1284 wrote to memory of 1764 1284 {17A7AB09-FD95-473f-8A16-A245BF5851BC}.exe 123 PID 1284 wrote to memory of 1764 1284 {17A7AB09-FD95-473f-8A16-A245BF5851BC}.exe 123 PID 1164 wrote to memory of 4860 1164 {95BE712E-F6EC-43db-9ED9-32C795DC57A0}.exe 127 PID 1164 wrote to memory of 4860 1164 {95BE712E-F6EC-43db-9ED9-32C795DC57A0}.exe 127 PID 1164 wrote to memory of 4860 1164 {95BE712E-F6EC-43db-9ED9-32C795DC57A0}.exe 127 PID 1164 wrote to memory of 4268 1164 {95BE712E-F6EC-43db-9ED9-32C795DC57A0}.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\51179732bc44509651ab7c13b151480926e22a94aaf9da7deb4a515399db3321_NeikiAnalytics.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\{FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exeC:\Windows\{FF8B19C8-B1B4-4eff-AD3C-68C23C3176D5}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\{DBD20F75-0246-40aa-895F-785357E94661}.exeC:\Windows\{DBD20F75-0246-40aa-895F-785357E94661}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\{530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exeC:\Windows\{530EEABA-F396-4d94-895C-D2AA3BFEEC33}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\{CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exeC:\Windows\{CE4C619F-7B69-4ed6-8768-E298CDB67DD1}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\{BF2B04AB-469A-4269-A906-5F1A09FEB079}.exeC:\Windows\{BF2B04AB-469A-4269-A906-5F1A09FEB079}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\{EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exeC:\Windows\{EFAF0F3B-EE85-4b2e-8FB3-1A87F4747D8E}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\{C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exeC:\Windows\{C5AB32A5-C7A3-4db6-A7B5-8CC09261138A}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\{79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exeC:\Windows\{79F6F035-3B88-463b-9CF3-3AF701ABFFC8}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\{17A7AB09-FD95-473f-8A16-A245BF5851BC}.exeC:\Windows\{17A7AB09-FD95-473f-8A16-A245BF5851BC}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\{95BE712E-F6EC-43db-9ED9-32C795DC57A0}.exeC:\Windows\{95BE712E-F6EC-43db-9ED9-32C795DC57A0}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\{E93B9265-FE29-4443-BD91-70F7A124BC83}.exeC:\Windows\{E93B9265-FE29-4443-BD91-70F7A124BC83}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4860 -
C:\Windows\{E7C9F9E4-CD5A-4dd3-994E-CEE3B049C7B8}.exeC:\Windows\{E7C9F9E4-CD5A-4dd3-994E-CEE3B049C7B8}.exe13⤵
- Executes dropped EXE
PID:4532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E93B9~1.EXE > nul13⤵PID:2512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{95BE7~1.EXE > nul12⤵PID:4268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{17A7A~1.EXE > nul11⤵PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{79F6F~1.EXE > nul10⤵PID:676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C5AB3~1.EXE > nul9⤵PID:4808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EFAF0~1.EXE > nul8⤵PID:4112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BF2B0~1.EXE > nul7⤵PID:4748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CE4C6~1.EXE > nul6⤵PID:4260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{530EE~1.EXE > nul5⤵PID:2284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DBD20~1.EXE > nul4⤵PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FF8B1~1.EXE > nul3⤵PID:516
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\511797~1.EXE > nul2⤵PID:3592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD59af2cea11b665fc6ff480c7b49d8d5db
SHA133ff49f2c5b7b1e09b77893e8d588426f0112019
SHA2561c7b56eb2ca72c45d82389a71e2319915b4a798503678d32b73c01e11c9c2d1e
SHA512438fed7c165f31eb2c1db2bbfaae6e148908c31c3b85010dc0154f91f2b89f05c686c6c86bfc40b7487e28dc7fa62fdd07cdc8be34f5df232135b48295a91553
-
Filesize
60KB
MD5c6457d288630d480d8d85d4e457b0a8b
SHA16d1fd3e520dfa9c19d7952ccd7315880ba81cf4d
SHA2562a0ff76b5d8f27de284008c602c82373440be1fde91d0c77342356e9aa38f9bc
SHA51210ced1506abec8ef10bad8d524bc3b86c256af1c470b69b599acc345701292ee02740b37fd0d2907a2a35438de5e8056e1659dacdf228b160169bb4bf12ab0c7
-
Filesize
60KB
MD59b86d2658856b8e23be02dc0ac06a7c6
SHA13ce5255d02b4c28316964790fce059fd53afe292
SHA2569ebec81d1714c08633cc15cf4a25621fb10d4bff86857a496e3e6805973668fc
SHA512783fa6f4a75b6ca58756e874236ce48a619aeb0ac1f3fb052b670d10ad0ae7b431c853f5949aafdc582a0870311b4cf2f154118af595cb57b33bcc7b67053d86
-
Filesize
60KB
MD5f8f092f59df275773b6d0da6025a01bb
SHA12159f121900734f35930c34093ab0ba023466baa
SHA25689b6e3ae2996a816c01cf96f8bcce30699faad183f59e747267d19536a5b7bc5
SHA512145223d91b025a99925570f63887a7c564e07615250cc4203820144b9f3275d638da14bd47dfaf22f92b583ea580a80738937dcf6fe91051011ee9cf6447fc7e
-
Filesize
60KB
MD54a3522b7d8398ff83bdc6cadab46a700
SHA1a49f24baf6f66916d9e6bad29c56ff403f4e79f2
SHA256d4581178ab1f8439c4f1c5aa2c780815287737a1508d3106087e7decd1b827ed
SHA5121fec7bcddf5303d34da91f31fb9a73ab3779f826362625400b172a3a51772d9d046a09d1fa0aab2934a706cda88eedeef6159bba243aff2c4cb421aa91e95a4e
-
Filesize
60KB
MD5bdca36c9929c2e6657f7b0203b233cda
SHA128b2e9771ba751fc94bbf0a7eeb35ebb67c87da8
SHA256865822c54692331f725153ecf40997a924fd9d75348a2de45e30c02370f69978
SHA512f200e702525d363e43ffb6542ea3299edeb8c30d62da7fadbff0ac44a8f3f15eb1bdadb92a950e749e1d2f3190528b1423601b911f708fac53245765c2fc21b4
-
Filesize
60KB
MD5420d558fbbbcf7ab592dffddced21965
SHA10227ee1f7c6d97757976408ce2aa974145ba7a1b
SHA256841763ba4b6820f5636fbc013bafe3c3376e12c5577f92652840bd029fcd702d
SHA512aef2e13bfe02c96d2e419cf57f08b13050ff023a076f70c91fe379d48672822ddeb6994c78ed282d19679cef9cffdda003500b2afe70c32be18fdf31633468a1
-
Filesize
60KB
MD5aa68186ac62a358691bcb9df757f34a4
SHA118746f276a38887361c49cdc8660709f03026c30
SHA2560973db7d0b89f16f3c0f158d4dfa12263d9ad7bac1a59c656580e229558f586d
SHA5121ba6da1885795a4bfa1d48a031e6baff1ac937cf72f0faea6c2e63bc81b3f3658b36bad37be895c5255328d94673fa2232fec1f5372362e35c04cf741c162c82
-
Filesize
60KB
MD5aebe7847748d1f821cbdfa84058c812d
SHA15eaf837073d093c11f70e3fbc71626f14ca035a3
SHA256db41191ff63e9790e468793ef04d30bf4af53acf251eedf022265150269aa1eb
SHA512417dadd0ad6811829f81ca80e1c1d313f3f7f953a83077a66e453835070d97122cfcfa4b8c8173a8787fe9b23e88d9fb549a229f55e578c48359ba93c89c20e6
-
Filesize
60KB
MD5231d524738722629f6fa233b3990effb
SHA169fcb46516766b0c72dc420a6f59a95911fb9220
SHA25696247a2b9e438736dfa6830ee801ead8d8c511f48b16af4f1816200448a5a5f3
SHA512fd8597798438aaead666ba2c09ee859b447a692bb02772ff9cc69c53e6bb731a91cab6cdb78f9e3b5c9033423c1876c1c3bf1202e51a1f65e406664443ce6bf7
-
Filesize
60KB
MD5810f315e307e0935a6de12ab298b9013
SHA16a473f6f883f8eacd874dd9937ed0f5bf9b5839e
SHA25673e37c5271d44864f73217d92eb4ec1bd5894085e9da5f7556ffa4d335a020e2
SHA512cccdcaa5e96557b1ea7946a60c59fb4213765f07921b69c578cc858c65c152d1eacda017a02a1c8aed4badf518d552c7035d366b04c3edf308b89b7bc5852e2e
-
Filesize
60KB
MD5c798a30dd235191447288652675b233c
SHA14b3c49e284f4d68a3faef1eae8d4366661a9744d
SHA256cade34794bafd899ca5802d7418384ad20b2e4b44ff8af4244030594fdfc067e
SHA512bcc7675709be81df11c64b24cef6ccffd8c3b00e404c5fb0110f45c1e1c16dada4c776d04e2869e1f4b862c890912028652c156b36d77a1baf97e86fb5f3d1f6