Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 03:03
Static task
static1
Behavioral task
behavioral1
Sample
422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe
-
Size
89KB
-
MD5
fad7c493906bae1384218917ca67ba50
-
SHA1
db66f3efd4cff9726bfe1b0a6d6e2de5fa7701f7
-
SHA256
422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb
-
SHA512
1d8a1abde4e4e67761bc44bacd36874d231363cce5d6499de4f56fd1111afa47685e4f10bf192b24f6c6fc72de4617fe1db96c6cd72ad8942ef45380a5506069
-
SSDEEP
768:Qvw9816vhKQLroM4/wQRNrfrunMxVFA3b7glL:YEGh0oMl2unMxVS3Hg9
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0187CBC-81E6-4064-9FFC-BAEDE95A1B46} 422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}\stubpath = "C:\\Windows\\{A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe" 422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{58BE1E19-C899-4ee2-BE46-0D8F1E6259D1} {A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4BEE1809-3917-4860-9257-17C69029C1A4} {93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E76F0DF-5367-46ea-AA1E-B7CB6438CA24} {4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{272497CA-97FB-410a-A2ED-711C6F809E3A} {6F840BC5-2342-41ae-AEDB-278FCD7330FC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{272497CA-97FB-410a-A2ED-711C6F809E3A}\stubpath = "C:\\Windows\\{272497CA-97FB-410a-A2ED-711C6F809E3A}.exe" {6F840BC5-2342-41ae-AEDB-278FCD7330FC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D98A387-76B9-479e-87E0-42AFF703D6B7} {58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{93ED0473-8B56-42d5-A6F3-B38430456A0B} {0C0CFB91-B659-4803-A710-53A482119B45}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4C343D8A-7C1C-47ac-BC2C-A5791AA12509}\stubpath = "C:\\Windows\\{4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe" {4BEE1809-3917-4860-9257-17C69029C1A4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F840BC5-2342-41ae-AEDB-278FCD7330FC}\stubpath = "C:\\Windows\\{6F840BC5-2342-41ae-AEDB-278FCD7330FC}.exe" {8E76F0DF-5367-46ea-AA1E-B7CB6438CA24}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0C0CFB91-B659-4803-A710-53A482119B45} {0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{93ED0473-8B56-42d5-A6F3-B38430456A0B}\stubpath = "C:\\Windows\\{93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe" {0C0CFB91-B659-4803-A710-53A482119B45}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E76F0DF-5367-46ea-AA1E-B7CB6438CA24}\stubpath = "C:\\Windows\\{8E76F0DF-5367-46ea-AA1E-B7CB6438CA24}.exe" {4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3E36AED8-5A91-4068-AF1D-061CD1FEED0A} {272497CA-97FB-410a-A2ED-711C6F809E3A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3E36AED8-5A91-4068-AF1D-061CD1FEED0A}\stubpath = "C:\\Windows\\{3E36AED8-5A91-4068-AF1D-061CD1FEED0A}.exe" {272497CA-97FB-410a-A2ED-711C6F809E3A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}\stubpath = "C:\\Windows\\{58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe" {A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D98A387-76B9-479e-87E0-42AFF703D6B7}\stubpath = "C:\\Windows\\{0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe" {58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0C0CFB91-B659-4803-A710-53A482119B45}\stubpath = "C:\\Windows\\{0C0CFB91-B659-4803-A710-53A482119B45}.exe" {0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4BEE1809-3917-4860-9257-17C69029C1A4}\stubpath = "C:\\Windows\\{4BEE1809-3917-4860-9257-17C69029C1A4}.exe" {93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4C343D8A-7C1C-47ac-BC2C-A5791AA12509} {4BEE1809-3917-4860-9257-17C69029C1A4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F840BC5-2342-41ae-AEDB-278FCD7330FC} {8E76F0DF-5367-46ea-AA1E-B7CB6438CA24}.exe -
Deletes itself 1 IoCs
pid Process 2508 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2704 {A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe 2524 {58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe 2420 {0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe 360 {0C0CFB91-B659-4803-A710-53A482119B45}.exe 2644 {93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe 1560 {4BEE1809-3917-4860-9257-17C69029C1A4}.exe 1640 {4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe 2020 {8E76F0DF-5367-46ea-AA1E-B7CB6438CA24}.exe 1940 {6F840BC5-2342-41ae-AEDB-278FCD7330FC}.exe 2240 {272497CA-97FB-410a-A2ED-711C6F809E3A}.exe 2748 {3E36AED8-5A91-4068-AF1D-061CD1FEED0A}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe {0C0CFB91-B659-4803-A710-53A482119B45}.exe File created C:\Windows\{4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe {4BEE1809-3917-4860-9257-17C69029C1A4}.exe File created C:\Windows\{A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe 422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe File created C:\Windows\{0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe {58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe File created C:\Windows\{0C0CFB91-B659-4803-A710-53A482119B45}.exe {0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe File created C:\Windows\{6F840BC5-2342-41ae-AEDB-278FCD7330FC}.exe {8E76F0DF-5367-46ea-AA1E-B7CB6438CA24}.exe File created C:\Windows\{272497CA-97FB-410a-A2ED-711C6F809E3A}.exe {6F840BC5-2342-41ae-AEDB-278FCD7330FC}.exe File created C:\Windows\{3E36AED8-5A91-4068-AF1D-061CD1FEED0A}.exe {272497CA-97FB-410a-A2ED-711C6F809E3A}.exe File created C:\Windows\{58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe {A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe File created C:\Windows\{4BEE1809-3917-4860-9257-17C69029C1A4}.exe {93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe File created C:\Windows\{8E76F0DF-5367-46ea-AA1E-B7CB6438CA24}.exe {4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2872 422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe Token: SeIncBasePriorityPrivilege 2704 {A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe Token: SeIncBasePriorityPrivilege 2524 {58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe Token: SeIncBasePriorityPrivilege 2420 {0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe Token: SeIncBasePriorityPrivilege 360 {0C0CFB91-B659-4803-A710-53A482119B45}.exe Token: SeIncBasePriorityPrivilege 2644 {93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe Token: SeIncBasePriorityPrivilege 1560 {4BEE1809-3917-4860-9257-17C69029C1A4}.exe Token: SeIncBasePriorityPrivilege 1640 {4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe Token: SeIncBasePriorityPrivilege 2020 {8E76F0DF-5367-46ea-AA1E-B7CB6438CA24}.exe Token: SeIncBasePriorityPrivilege 1940 {6F840BC5-2342-41ae-AEDB-278FCD7330FC}.exe Token: SeIncBasePriorityPrivilege 2240 {272497CA-97FB-410a-A2ED-711C6F809E3A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2704 2872 422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe 28 PID 2872 wrote to memory of 2704 2872 422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe 28 PID 2872 wrote to memory of 2704 2872 422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe 28 PID 2872 wrote to memory of 2704 2872 422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe 28 PID 2872 wrote to memory of 2508 2872 422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe 29 PID 2872 wrote to memory of 2508 2872 422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe 29 PID 2872 wrote to memory of 2508 2872 422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe 29 PID 2872 wrote to memory of 2508 2872 422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe 29 PID 2704 wrote to memory of 2524 2704 {A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe 30 PID 2704 wrote to memory of 2524 2704 {A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe 30 PID 2704 wrote to memory of 2524 2704 {A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe 30 PID 2704 wrote to memory of 2524 2704 {A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe 30 PID 2704 wrote to memory of 2684 2704 {A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe 31 PID 2704 wrote to memory of 2684 2704 {A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe 31 PID 2704 wrote to memory of 2684 2704 {A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe 31 PID 2704 wrote to memory of 2684 2704 {A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe 31 PID 2524 wrote to memory of 2420 2524 {58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe 32 PID 2524 wrote to memory of 2420 2524 {58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe 32 PID 2524 wrote to memory of 2420 2524 {58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe 32 PID 2524 wrote to memory of 2420 2524 {58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe 32 PID 2524 wrote to memory of 2664 2524 {58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe 33 PID 2524 wrote to memory of 2664 2524 {58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe 33 PID 2524 wrote to memory of 2664 2524 {58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe 33 PID 2524 wrote to memory of 2664 2524 {58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe 33 PID 2420 wrote to memory of 360 2420 {0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe 36 PID 2420 wrote to memory of 360 2420 {0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe 36 PID 2420 wrote to memory of 360 2420 {0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe 36 PID 2420 wrote to memory of 360 2420 {0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe 36 PID 2420 wrote to memory of 2384 2420 {0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe 37 PID 2420 wrote to memory of 2384 2420 {0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe 37 PID 2420 wrote to memory of 2384 2420 {0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe 37 PID 2420 wrote to memory of 2384 2420 {0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe 37 PID 360 wrote to memory of 2644 360 {0C0CFB91-B659-4803-A710-53A482119B45}.exe 38 PID 360 wrote to memory of 2644 360 {0C0CFB91-B659-4803-A710-53A482119B45}.exe 38 PID 360 wrote to memory of 2644 360 {0C0CFB91-B659-4803-A710-53A482119B45}.exe 38 PID 360 wrote to memory of 2644 360 {0C0CFB91-B659-4803-A710-53A482119B45}.exe 38 PID 360 wrote to memory of 2756 360 {0C0CFB91-B659-4803-A710-53A482119B45}.exe 39 PID 360 wrote to memory of 2756 360 {0C0CFB91-B659-4803-A710-53A482119B45}.exe 39 PID 360 wrote to memory of 2756 360 {0C0CFB91-B659-4803-A710-53A482119B45}.exe 39 PID 360 wrote to memory of 2756 360 {0C0CFB91-B659-4803-A710-53A482119B45}.exe 39 PID 2644 wrote to memory of 1560 2644 {93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe 40 PID 2644 wrote to memory of 1560 2644 {93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe 40 PID 2644 wrote to memory of 1560 2644 {93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe 40 PID 2644 wrote to memory of 1560 2644 {93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe 40 PID 2644 wrote to memory of 2124 2644 {93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe 41 PID 2644 wrote to memory of 2124 2644 {93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe 41 PID 2644 wrote to memory of 2124 2644 {93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe 41 PID 2644 wrote to memory of 2124 2644 {93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe 41 PID 1560 wrote to memory of 1640 1560 {4BEE1809-3917-4860-9257-17C69029C1A4}.exe 42 PID 1560 wrote to memory of 1640 1560 {4BEE1809-3917-4860-9257-17C69029C1A4}.exe 42 PID 1560 wrote to memory of 1640 1560 {4BEE1809-3917-4860-9257-17C69029C1A4}.exe 42 PID 1560 wrote to memory of 1640 1560 {4BEE1809-3917-4860-9257-17C69029C1A4}.exe 42 PID 1560 wrote to memory of 2372 1560 {4BEE1809-3917-4860-9257-17C69029C1A4}.exe 43 PID 1560 wrote to memory of 2372 1560 {4BEE1809-3917-4860-9257-17C69029C1A4}.exe 43 PID 1560 wrote to memory of 2372 1560 {4BEE1809-3917-4860-9257-17C69029C1A4}.exe 43 PID 1560 wrote to memory of 2372 1560 {4BEE1809-3917-4860-9257-17C69029C1A4}.exe 43 PID 1640 wrote to memory of 2020 1640 {4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe 44 PID 1640 wrote to memory of 2020 1640 {4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe 44 PID 1640 wrote to memory of 2020 1640 {4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe 44 PID 1640 wrote to memory of 2020 1640 {4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe 44 PID 1640 wrote to memory of 2880 1640 {4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe 45 PID 1640 wrote to memory of 2880 1640 {4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe 45 PID 1640 wrote to memory of 2880 1640 {4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe 45 PID 1640 wrote to memory of 2880 1640 {4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\422568ff8f4136550d1cf128f7ecc1ae445ec4f909130f9d78fa2002607ceaeb_NeikiAnalytics.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\{A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exeC:\Windows\{A0187CBC-81E6-4064-9FFC-BAEDE95A1B46}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\{58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exeC:\Windows\{58BE1E19-C899-4ee2-BE46-0D8F1E6259D1}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\{0D98A387-76B9-479e-87E0-42AFF703D6B7}.exeC:\Windows\{0D98A387-76B9-479e-87E0-42AFF703D6B7}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\{0C0CFB91-B659-4803-A710-53A482119B45}.exeC:\Windows\{0C0CFB91-B659-4803-A710-53A482119B45}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\{93ED0473-8B56-42d5-A6F3-B38430456A0B}.exeC:\Windows\{93ED0473-8B56-42d5-A6F3-B38430456A0B}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\{4BEE1809-3917-4860-9257-17C69029C1A4}.exeC:\Windows\{4BEE1809-3917-4860-9257-17C69029C1A4}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\{4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exeC:\Windows\{4C343D8A-7C1C-47ac-BC2C-A5791AA12509}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\{8E76F0DF-5367-46ea-AA1E-B7CB6438CA24}.exeC:\Windows\{8E76F0DF-5367-46ea-AA1E-B7CB6438CA24}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2020 -
C:\Windows\{6F840BC5-2342-41ae-AEDB-278FCD7330FC}.exeC:\Windows\{6F840BC5-2342-41ae-AEDB-278FCD7330FC}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1940 -
C:\Windows\{272497CA-97FB-410a-A2ED-711C6F809E3A}.exeC:\Windows\{272497CA-97FB-410a-A2ED-711C6F809E3A}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2240 -
C:\Windows\{3E36AED8-5A91-4068-AF1D-061CD1FEED0A}.exeC:\Windows\{3E36AED8-5A91-4068-AF1D-061CD1FEED0A}.exe12⤵
- Executes dropped EXE
PID:2748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{27249~1.EXE > nul12⤵PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6F840~1.EXE > nul11⤵PID:688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E76F~1.EXE > nul10⤵PID:2224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4C343~1.EXE > nul9⤵PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4BEE1~1.EXE > nul8⤵PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{93ED0~1.EXE > nul7⤵PID:2124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0C0CF~1.EXE > nul6⤵PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0D98A~1.EXE > nul5⤵PID:2384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{58BE1~1.EXE > nul4⤵PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A0187~1.EXE > nul3⤵PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\422568~1.EXE > nul2⤵
- Deletes itself
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5bb51f218d1fb9c3912fc47e4bc272adb
SHA18c093d5021b262d0df37cd7186139a52832c45ea
SHA256fb443ab05af5dc29a30ef8cc8874b7a8694a6e9433c84ae3907930c686098696
SHA5122a2ce30744e1b951b658346547fc1d8df419f4d716eea1aa13f6f97914f70a45163376ba4b2729716d08cd0f0d128e2ee4cef7a51f99e877f1026986d9b11f03
-
Filesize
89KB
MD578c0e6ad4a5f61ba95bd8a660fac429e
SHA1d980eafce5f5be7cf5c4e66568d9198917377553
SHA25646ecc5af762518ba565745001cb69fbc36de11178c9d35496572912b6d93652e
SHA51200f312d45672ad173e8cd6f8ab17863b4385cf2428a3880a1285f54062f230aa4ecaf2f894c92693cd351aa59ac2a870be783908fe97900ce3c2b0055e918f1c
-
Filesize
89KB
MD509b540617236e810901ceec9cb9859c9
SHA15265ac200b1cf03081b4f4ef72b1df6259a34b7e
SHA256d686aff79045819deffb0d640ed4e4869a2cc7ff7ba89bf0d7aca177dcc871af
SHA512e9123391a172643a6f9290ccd476408450b40fa0a226f783b270dc56fad49754b529b2e1e24d1eacbb2bdc55bb31dffe5acd72a59243e7efb9154ffd38ed5fb7
-
Filesize
89KB
MD54e51c682800ba89f8128e1abea386f97
SHA14f8cc2e59f51891ea66f182725db4cb91dfe6dcb
SHA2563cd3f28dbdfb90eb5dc3170934b41fece117808e491cba989cb1e12ed6630d32
SHA512b1fbd7c3ad5f71d0e9761d54f0f2800891ec3942deb94f24f15161ef2561dc57754a5593efe5a9e83a04b0e4325c2f364efc961129b625b738dd55c787259f72
-
Filesize
89KB
MD53db74503c4e3f0592e839373f5c546a6
SHA1bbbfe2fff57bdcc45153da14379d2837423fa852
SHA256b24e5fd21e841fc7431c3745ba9fa20dc4b2ff9fa4973be56b03e4af05324ec3
SHA512e8d874665389390fc22dcdc5d3eda9149a330a6729a1006a1407a0c7c21a50be3584dc325cedaa6a08df790b2785c0242a7fb3c99702ad3f150e1c2a597aeaca
-
Filesize
89KB
MD5832d862932d2042648e7012b3d67badc
SHA190fdc7697c45e2883d2b2794234da04e0d1599c5
SHA2564a7f97aa28f2860b29ddad55b6aedb6a9981755ff9154d4b894f8ac5a9e19001
SHA512cd5d0a933cd8b6914270f309928b6da39f15adca85c43ea4821d1cb1a8b035dde1935bb4e677b2a03c46ad0cfa0d87b8ff4564c64564f6e3c5c6c840d8aa39c1
-
Filesize
89KB
MD52dfbfe136f01caf318a6d331e5d4807f
SHA1d2bc08284c20de8919c1051e2e05e4f2ad17230f
SHA256f2466e372e9ba89e0d403e126f25011698a51efb7dbbda29a1a649a53072b635
SHA512d3e1c6ed61538cb0e775a3a78704fb6c02b0b6db5ebfe485ec3688db9b952367c54f0392cd401e19814d8640adedad5fc21e6a11226514d2b9f6b940738c46e1
-
Filesize
89KB
MD52a4229cf945dbfaa5a24b13eb961a010
SHA15aead06fe886ed6de27da59bc49ca1ee4cf095a4
SHA256df0eb9aaec34b499f8457b7bab7a4edeca602d07a3e45db785831af51f3a6c04
SHA5125be3b145e5771da01c613d0f812be449ae56407ca77be896734be17a6fbf85f616bfda2d151c7301e0180f8614ada36a0cc55435ace9ce410fc54e80b7c17957
-
Filesize
89KB
MD5224e4e5f3d28e7b913138210da0d44f1
SHA1a966f3c0d2f345cb4c09cce9dbfaa80f80081e53
SHA256ccb1cb654e5c2ba227ee1b79669ce95e14f55f9f67a3b40db92a99f3c1203aa7
SHA512a1d779713521f0c8e8cad0838ee699377d94c5881f481210127bf4bd149fe751cdb0965e06dbc8842c56289568ac94bdd604e44aa9b7127f0d77b718f92d9905
-
Filesize
89KB
MD523778e13db7e0a8b23da47e53d68c92b
SHA10fbaab35fea2ed236fa2354b76bbc72a7cf8712f
SHA25650a4d84f78d337adae082b4d3f770c9a8f0e3855734cf9fef6c8abd40ca1cc95
SHA512f85832e3218b930113c48a6672fd38790ba7dc65ed34c28d991c3669c0e3c06b7ad4286db31749a81395c198fb5cbfeb03f88808e91a3b6262773f2f47e30c8d
-
Filesize
89KB
MD59e774ec114561dd93c2e21826029f0b0
SHA1448d0411c13874affcba487b7f74091281776350
SHA2561740d93c90b55fbf448d24e649e824bca05bbe4d7d35df2c59e64141683b181c
SHA51251f19ba33b6b85841fc7483b4ff123b5e997602b407ef2f53d518738a5c95d79eb57588b2bb304faf1632e2b9d76ff7c67f280830f1f62d26727e244622fc3e5