Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 21:18
Behavioral task
behavioral1
Sample
0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe
-
Size
156KB
-
MD5
aa28630b1d123bb45b7362d0b4c4b100
-
SHA1
acdf7d95d6f81103271c81652ce5c3ca37dabab7
-
SHA256
0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c
-
SHA512
b92341f0fed290a10f660294626a92e41a82c3b9858075200ee76c25e3d750a0ddbe76921ab2c7aeac328e29d7fa97bedc4d47adb83a60aef8695c6392694fd7
-
SSDEEP
1536:JxqjQ+P04wsmJCwugrZpVnWw7V15Frrmie3Mz8enofIxQrFP+ZruOxqjQ+P04wsX:sr85CwugDVnj7V15FrvweZQhGZwr85C
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe family_neshta C:\Windows\svchost.com family_neshta behavioral2/memory/4600-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4124-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1972-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3432-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3192-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1824-50-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5004-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/768-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3868-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4928-75-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1352-77-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe family_neshta behavioral2/memory/2136-101-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe family_neshta behavioral2/memory/2192-108-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2724-118-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4552-120-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1028-124-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4872-138-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe family_neshta C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe family_neshta behavioral2/memory/3216-147-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe family_neshta C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaw.exe family_neshta C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\java.exe family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe family_neshta C:\PROGRA~2\MICROS~1\EDGEUP~1\Install\{97D61~1\MicrosoftEdgeUpdateSetup_X86_1.3.187.37.exe family_neshta C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE family_neshta C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE family_neshta C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE family_neshta C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE family_neshta behavioral2/memory/2760-228-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2372-232-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4232-246-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4844-248-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2276-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1708-260-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2732-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4344-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1032-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3152-276-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1368-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2120-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1088-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4656-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2184-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3404-300-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1920-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2576-313-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3396-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1812-316-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2240-322-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1996-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1448-330-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2444-332-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1400-338-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Phorphiex payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe family_phorphiex C:\Windows\winrecsv.exe family_phorphiex -
Processes:
winrecsv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winrecsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winrecsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winrecsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" winrecsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winrecsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" winrecsv.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXEdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0F63FB~1.EXE -
Executes dropped EXE 64 IoCs
Processes:
0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exesvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.compid process 1192 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe 4600 svchost.com 4124 0F63FB~1.EXE 1972 svchost.com 3432 0F63FB~1.EXE 3192 svchost.com 1824 0F63FB~1.EXE 5004 svchost.com 768 0F63FB~1.EXE 3868 svchost.com 4928 0F63FB~1.EXE 1352 svchost.com 2136 0F63FB~1.EXE 2192 svchost.com 2724 0F63FB~1.EXE 4552 svchost.com 1028 0F63FB~1.EXE 4872 svchost.com 3216 0F63FB~1.EXE 2760 svchost.com 2372 0F63FB~1.EXE 4232 svchost.com 4844 0F63FB~1.EXE 2276 svchost.com 1708 0F63FB~1.EXE 2732 svchost.com 4344 0F63FB~1.EXE 1032 svchost.com 3152 0F63FB~1.EXE 1368 svchost.com 2120 0F63FB~1.EXE 1088 svchost.com 4656 0F63FB~1.EXE 2184 svchost.com 3404 0F63FB~1.EXE 1920 svchost.com 2576 0F63FB~1.EXE 3396 svchost.com 1812 0F63FB~1.EXE 2240 svchost.com 1996 0F63FB~1.EXE 1448 svchost.com 2444 0F63FB~1.EXE 1400 svchost.com 1156 0F63FB~1.EXE 4064 svchost.com 4440 0F63FB~1.EXE 4984 svchost.com 2200 0F63FB~1.EXE 3540 svchost.com 4580 0F63FB~1.EXE 2492 svchost.com 4236 0F63FB~1.EXE 3456 svchost.com 2056 0F63FB~1.EXE 2324 svchost.com 4616 0F63FB~1.EXE 4308 svchost.com 4812 0F63FB~1.EXE 388 svchost.com 1236 0F63FB~1.EXE 4600 svchost.com 2364 0F63FB~1.EXE 1972 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
winrecsv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winrecsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" winrecsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winrecsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" winrecsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winrecsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winrecsv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" winrecsv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0F63FB~1.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\winrecsv.exe" 0F63FB~1.EXE -
Drops file in Program Files directory 64 IoCs
Processes:
0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MI391D~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~3.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MIA062~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXEsvchost.comsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXE0F63FB~1.EXEsvchost.comsvchost.com0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.comsvchost.com0F63FB~1.EXEsvchost.comsvchost.com0F63FB~1.EXEsvchost.comsvchost.comsvchost.com0F63FB~1.EXEsvchost.comsvchost.com0F63FB~1.EXEsvchost.comsvchost.com0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXEsvchost.com0F63FB~1.EXE0F63FB~1.EXEsvchost.comsvchost.comsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXE0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.comsvchost.comsvchost.com0F63FB~1.EXEsvchost.comsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXE0F63FB~1.EXEdescription ioc process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0F63FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE File opened for modification C:\Windows\svchost.com 0F63FB~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
Processes:
0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXE0F63FB~1.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 0F63FB~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exesvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEsvchost.com0F63FB~1.EXEdescription pid process target process PID 4788 wrote to memory of 1192 4788 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe PID 4788 wrote to memory of 1192 4788 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe PID 4788 wrote to memory of 1192 4788 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe PID 1192 wrote to memory of 4600 1192 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe svchost.com PID 1192 wrote to memory of 4600 1192 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe svchost.com PID 1192 wrote to memory of 4600 1192 0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe svchost.com PID 4600 wrote to memory of 4124 4600 svchost.com 0F63FB~1.EXE PID 4600 wrote to memory of 4124 4600 svchost.com 0F63FB~1.EXE PID 4600 wrote to memory of 4124 4600 svchost.com 0F63FB~1.EXE PID 4124 wrote to memory of 1972 4124 0F63FB~1.EXE svchost.com PID 4124 wrote to memory of 1972 4124 0F63FB~1.EXE svchost.com PID 4124 wrote to memory of 1972 4124 0F63FB~1.EXE svchost.com PID 1972 wrote to memory of 3432 1972 svchost.com 0F63FB~1.EXE PID 1972 wrote to memory of 3432 1972 svchost.com 0F63FB~1.EXE PID 1972 wrote to memory of 3432 1972 svchost.com 0F63FB~1.EXE PID 3432 wrote to memory of 3192 3432 0F63FB~1.EXE svchost.com PID 3432 wrote to memory of 3192 3432 0F63FB~1.EXE svchost.com PID 3432 wrote to memory of 3192 3432 0F63FB~1.EXE svchost.com PID 3192 wrote to memory of 1824 3192 svchost.com 0F63FB~1.EXE PID 3192 wrote to memory of 1824 3192 svchost.com 0F63FB~1.EXE PID 3192 wrote to memory of 1824 3192 svchost.com 0F63FB~1.EXE PID 1824 wrote to memory of 5004 1824 0F63FB~1.EXE svchost.com PID 1824 wrote to memory of 5004 1824 0F63FB~1.EXE svchost.com PID 1824 wrote to memory of 5004 1824 0F63FB~1.EXE svchost.com PID 5004 wrote to memory of 768 5004 svchost.com 0F63FB~1.EXE PID 5004 wrote to memory of 768 5004 svchost.com 0F63FB~1.EXE PID 5004 wrote to memory of 768 5004 svchost.com 0F63FB~1.EXE PID 768 wrote to memory of 3868 768 0F63FB~1.EXE svchost.com PID 768 wrote to memory of 3868 768 0F63FB~1.EXE svchost.com PID 768 wrote to memory of 3868 768 0F63FB~1.EXE svchost.com PID 3868 wrote to memory of 4928 3868 svchost.com 0F63FB~1.EXE PID 3868 wrote to memory of 4928 3868 svchost.com 0F63FB~1.EXE PID 3868 wrote to memory of 4928 3868 svchost.com 0F63FB~1.EXE PID 4928 wrote to memory of 1352 4928 0F63FB~1.EXE svchost.com PID 4928 wrote to memory of 1352 4928 0F63FB~1.EXE svchost.com PID 4928 wrote to memory of 1352 4928 0F63FB~1.EXE svchost.com PID 1352 wrote to memory of 2136 1352 svchost.com 0F63FB~1.EXE PID 1352 wrote to memory of 2136 1352 svchost.com 0F63FB~1.EXE PID 1352 wrote to memory of 2136 1352 svchost.com 0F63FB~1.EXE PID 2136 wrote to memory of 2192 2136 0F63FB~1.EXE svchost.com PID 2136 wrote to memory of 2192 2136 0F63FB~1.EXE svchost.com PID 2136 wrote to memory of 2192 2136 0F63FB~1.EXE svchost.com PID 2192 wrote to memory of 2724 2192 svchost.com svchost.com PID 2192 wrote to memory of 2724 2192 svchost.com svchost.com PID 2192 wrote to memory of 2724 2192 svchost.com svchost.com PID 2724 wrote to memory of 4552 2724 0F63FB~1.EXE svchost.com PID 2724 wrote to memory of 4552 2724 0F63FB~1.EXE svchost.com PID 2724 wrote to memory of 4552 2724 0F63FB~1.EXE svchost.com PID 4552 wrote to memory of 1028 4552 svchost.com 0F63FB~1.EXE PID 4552 wrote to memory of 1028 4552 svchost.com 0F63FB~1.EXE PID 4552 wrote to memory of 1028 4552 svchost.com 0F63FB~1.EXE PID 1028 wrote to memory of 4872 1028 0F63FB~1.EXE svchost.com PID 1028 wrote to memory of 4872 1028 0F63FB~1.EXE svchost.com PID 1028 wrote to memory of 4872 1028 0F63FB~1.EXE svchost.com PID 4872 wrote to memory of 3216 4872 svchost.com 0F63FB~1.EXE PID 4872 wrote to memory of 3216 4872 svchost.com 0F63FB~1.EXE PID 4872 wrote to memory of 3216 4872 svchost.com 0F63FB~1.EXE PID 3216 wrote to memory of 2760 3216 0F63FB~1.EXE svchost.com PID 3216 wrote to memory of 2760 3216 0F63FB~1.EXE svchost.com PID 3216 wrote to memory of 2760 3216 0F63FB~1.EXE svchost.com PID 2760 wrote to memory of 2372 2760 svchost.com 0F63FB~1.EXE PID 2760 wrote to memory of 2372 2760 svchost.com 0F63FB~1.EXE PID 2760 wrote to memory of 2372 2760 svchost.com 0F63FB~1.EXE PID 2372 wrote to memory of 4232 2372 0F63FB~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\0f63fbdacbf4c7c588befd9fbda6a8ee896995067929fbc2c374b259e4503c4c_NeikiAnalytics.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"23⤵
- Executes dropped EXE
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
PID:4844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"25⤵
- Executes dropped EXE
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE26⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"27⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"29⤵
- Executes dropped EXE
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE30⤵
- Executes dropped EXE
PID:3152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"31⤵
- Executes dropped EXE
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE32⤵
- Executes dropped EXE
- Modifies registry class
PID:2120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"33⤵
- Executes dropped EXE
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE34⤵
- Executes dropped EXE
PID:4656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"35⤵
- Executes dropped EXE
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE36⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"37⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
PID:2576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"39⤵
- Executes dropped EXE
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE40⤵
- Executes dropped EXE
- Modifies registry class
PID:1812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"41⤵
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE42⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"43⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"45⤵
- Executes dropped EXE
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE46⤵
- Executes dropped EXE
PID:1156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
PID:4440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"49⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2200 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"51⤵
- Executes dropped EXE
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
PID:4580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"53⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"55⤵
- Executes dropped EXE
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE56⤵
- Executes dropped EXE
- Modifies registry class
PID:2056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"57⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE58⤵
- Executes dropped EXE
PID:4616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"59⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE60⤵
- Executes dropped EXE
PID:4812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"61⤵
- Executes dropped EXE
PID:388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
PID:1236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE64⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE66⤵PID:4672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"67⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE68⤵
- Drops file in Windows directory
- Modifies registry class
PID:1796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"69⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE70⤵PID:1420
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"71⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE72⤵
- Modifies registry class
PID:1616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"73⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE74⤵
- Modifies registry class
PID:3404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"75⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE76⤵
- Checks computer location settings
PID:548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"77⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE78⤵PID:3000
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"79⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE80⤵PID:4496
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"81⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE82⤵
- Modifies registry class
PID:1028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"83⤵
- Drops file in Windows directory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE84⤵PID:5096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"85⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE86⤵
- Checks computer location settings
PID:1196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"87⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE88⤵
- Checks computer location settings
PID:760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"89⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE90⤵PID:2492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"91⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE92⤵
- Modifies registry class
PID:3456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"93⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE94⤵
- Drops file in Windows directory
- Modifies registry class
PID:2324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"95⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE96⤵
- Modifies registry class
PID:1416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"97⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE98⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"99⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE100⤵
- Checks computer location settings
PID:1520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"101⤵
- Drops file in Windows directory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE102⤵
- Modifies registry class
PID:2732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"103⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE104⤵
- Modifies registry class
PID:1124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"105⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE106⤵
- Checks computer location settings
- Modifies registry class
PID:3192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"107⤵
- Drops file in Windows directory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE108⤵PID:1796
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"109⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE110⤵PID:2008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"111⤵
- Drops file in Windows directory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE112⤵
- Checks computer location settings
PID:2184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"113⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE114⤵
- Modifies registry class
PID:4188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"115⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE116⤵PID:3644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"117⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE118⤵PID:2136
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"119⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE120⤵PID:688
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE"121⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F63FB~1.EXE122⤵PID:3000
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-