Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe
-
Size
384KB
-
MD5
996c62c43013653ccb15711c62875d90
-
SHA1
d91ae854d03c95b5d05d42892d1f3d19fc5ced34
-
SHA256
04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e
-
SHA512
f83b01bc275db8c88079eaf330282784aea939cdfa0d4dbb68aae86a6fd2d588858ddd23f5ca9933b930a94ea1ab4ab67fb300bebaeb67ce4235e6815ecc9c0f
-
SSDEEP
3072:ZRbn3k0CdM1vabyzJYWq5yuUt9zeQDJBPQismhLqP46Ov3oG3fmJGHaMrayh4MJO:ZRD0LS6VKDzNde5w6G4s3haDYd8oI
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 5 IoCs
Processes:
04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exeWaterMark.exeWaterMark.exeWaterMarkmgr.exeWaterMark.exepid process 1348 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exe 2716 WaterMark.exe 2704 WaterMark.exe 2756 WaterMarkmgr.exe 2512 WaterMark.exe -
Loads dropped DLL 10 IoCs
Processes:
04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exeWaterMark.exeWaterMarkmgr.exepid process 2248 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe 2248 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe 1348 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exe 2248 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe 2248 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe 1348 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exe 2704 WaterMark.exe 2704 WaterMark.exe 2756 WaterMarkmgr.exe 2756 WaterMarkmgr.exe -
Processes:
resource yara_rule behavioral1/memory/2248-19-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2248-17-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2248-16-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2248-11-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2248-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2248-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2248-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2512-85-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2704-78-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2756-76-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2716-67-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2756-66-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2704-64-0x0000000000130000-0x000000000016C000-memory.dmp upx behavioral1/memory/1348-29-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2512-772-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 64 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\settings.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\liblibmpeg2_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\calendar.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\WindowsFormsIntegration.resources.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\RSSFeeds.html svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Internet Explorer\D3DCompiler_47.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2iexp.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\nssckbi.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.DirectoryServices.AccountManagement.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPOBJS.DLL svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcor.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcs.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Windows.Presentation.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libnsc_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libschroedinger_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libttml_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\libdummy_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libcaf_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libdemux_chromecast_plugin.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\PresentationCore.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\UIAutomationProvider.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libchorus_flanger_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libdirect3d9_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\AiodLite.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libtrivial_channel_mixer_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\librawaud_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libaudio_format_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\libmemory_keystore_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libscene_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\cpu.html svchost.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.IdentityModel.Selectors.Resources.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\atl.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libsid_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_copy_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\npdeployJava1.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\ReachFramework.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.Routing.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\index.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi420_yuy2_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\micaut.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\CsiSoap.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jsound.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libglwin32_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\about.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libvc1_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\libfolder_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\currency.html svchost.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\MSTTSLoc.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msdatl3.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\jsdbgui.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Net.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libspeex_resampler_plugin.dll svchost.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
Processes:
WaterMark.exeWaterMark.exeWaterMark.exesvchost.exepid process 2704 WaterMark.exe 2704 WaterMark.exe 2716 WaterMark.exe 2716 WaterMark.exe 2512 WaterMark.exe 2512 WaterMark.exe 2512 WaterMark.exe 2512 WaterMark.exe 2512 WaterMark.exe 2512 WaterMark.exe 2512 WaterMark.exe 2704 WaterMark.exe 2704 WaterMark.exe 2704 WaterMark.exe 2704 WaterMark.exe 2512 WaterMark.exe 2716 WaterMark.exe 2716 WaterMark.exe 2716 WaterMark.exe 2716 WaterMark.exe 2704 WaterMark.exe 2704 WaterMark.exe 2716 WaterMark.exe 2716 WaterMark.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe 2840 svchost.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
WaterMark.exeWaterMark.exeWaterMark.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exedescription pid process Token: SeDebugPrivilege 2704 WaterMark.exe Token: SeDebugPrivilege 2716 WaterMark.exe Token: SeDebugPrivilege 2512 WaterMark.exe Token: SeDebugPrivilege 1948 svchost.exe Token: SeDebugPrivilege 2840 svchost.exe Token: SeDebugPrivilege 2564 svchost.exe Token: SeDebugPrivilege 2704 WaterMark.exe Token: SeDebugPrivilege 2716 WaterMark.exe Token: SeDebugPrivilege 2512 WaterMark.exe Token: SeDebugPrivilege 2404 svchost.exe Token: SeDebugPrivilege 2728 svchost.exe -
Suspicious use of UnmapMainImage 6 IoCs
Processes:
04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exeWaterMark.exeWaterMark.exeWaterMarkmgr.exeWaterMark.exepid process 2248 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe 1348 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exe 2716 WaterMark.exe 2704 WaterMark.exe 2756 WaterMarkmgr.exe 2512 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exeWaterMark.exeWaterMarkmgr.exeWaterMark.exeWaterMark.exedescription pid process target process PID 2248 wrote to memory of 1348 2248 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exe PID 2248 wrote to memory of 1348 2248 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exe PID 2248 wrote to memory of 1348 2248 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exe PID 2248 wrote to memory of 1348 2248 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exe PID 2248 wrote to memory of 2716 2248 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe WaterMark.exe PID 2248 wrote to memory of 2716 2248 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe WaterMark.exe PID 2248 wrote to memory of 2716 2248 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe WaterMark.exe PID 2248 wrote to memory of 2716 2248 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe WaterMark.exe PID 1348 wrote to memory of 2704 1348 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exe WaterMark.exe PID 1348 wrote to memory of 2704 1348 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exe WaterMark.exe PID 1348 wrote to memory of 2704 1348 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exe WaterMark.exe PID 1348 wrote to memory of 2704 1348 04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exe WaterMark.exe PID 2704 wrote to memory of 2756 2704 WaterMark.exe WaterMarkmgr.exe PID 2704 wrote to memory of 2756 2704 WaterMark.exe WaterMarkmgr.exe PID 2704 wrote to memory of 2756 2704 WaterMark.exe WaterMarkmgr.exe PID 2704 wrote to memory of 2756 2704 WaterMark.exe WaterMarkmgr.exe PID 2756 wrote to memory of 2512 2756 WaterMarkmgr.exe WaterMark.exe PID 2756 wrote to memory of 2512 2756 WaterMarkmgr.exe WaterMark.exe PID 2756 wrote to memory of 2512 2756 WaterMarkmgr.exe WaterMark.exe PID 2756 wrote to memory of 2512 2756 WaterMarkmgr.exe WaterMark.exe PID 2716 wrote to memory of 2404 2716 WaterMark.exe svchost.exe PID 2716 wrote to memory of 2404 2716 WaterMark.exe svchost.exe PID 2716 wrote to memory of 2404 2716 WaterMark.exe svchost.exe PID 2716 wrote to memory of 2404 2716 WaterMark.exe svchost.exe PID 2716 wrote to memory of 2404 2716 WaterMark.exe svchost.exe PID 2716 wrote to memory of 2404 2716 WaterMark.exe svchost.exe PID 2704 wrote to memory of 2728 2704 WaterMark.exe svchost.exe PID 2704 wrote to memory of 2728 2704 WaterMark.exe svchost.exe PID 2704 wrote to memory of 2728 2704 WaterMark.exe svchost.exe PID 2704 wrote to memory of 2728 2704 WaterMark.exe svchost.exe PID 2704 wrote to memory of 2728 2704 WaterMark.exe svchost.exe PID 2704 wrote to memory of 2728 2704 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1188 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1188 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1188 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1188 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1188 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1188 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1188 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1188 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1188 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1188 2512 WaterMark.exe svchost.exe PID 2716 wrote to memory of 2404 2716 WaterMark.exe svchost.exe PID 2716 wrote to memory of 2404 2716 WaterMark.exe svchost.exe PID 2716 wrote to memory of 2404 2716 WaterMark.exe svchost.exe PID 2716 wrote to memory of 2404 2716 WaterMark.exe svchost.exe PID 2704 wrote to memory of 2728 2704 WaterMark.exe svchost.exe PID 2704 wrote to memory of 2728 2704 WaterMark.exe svchost.exe PID 2704 wrote to memory of 2728 2704 WaterMark.exe svchost.exe PID 2704 wrote to memory of 2728 2704 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1948 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1948 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1948 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1948 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1948 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1948 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1948 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1948 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1948 2512 WaterMark.exe svchost.exe PID 2512 wrote to memory of 1948 2512 WaterMark.exe svchost.exe PID 2704 wrote to memory of 2564 2704 WaterMark.exe svchost.exe PID 2704 wrote to memory of 2564 2704 WaterMark.exe svchost.exe PID 2704 wrote to memory of 2564 2704 WaterMark.exe svchost.exe PID 2704 wrote to memory of 2564 2704 WaterMark.exe svchost.exe
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\wininit.exewininit.exe1⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalytics.exe"2⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exeC:\Users\Admin\AppData\Local\Temp\04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe7⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe7⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.htmlFilesize
782KB
MD511b1d72c88b2aee327bb6d5559a33a77
SHA152adacaa444bd88d447e10e54fb0c455279c225b
SHA2562d813360b2bd1c02c207ea1e26a020aa5ce056982be3e738ab1d107904e93294
SHA5120ee4342bd2a335e751ed801156cc35d7a539f5f3b5d00f6247a36a28485736ba84513e09e9559ccd3c9fe0d54df85ad555e0f58db568d1bc540d434402c8f347
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.htmlFilesize
779KB
MD519a35e745201d5383f4f15924e85380e
SHA10d396fef59e87b7181e76e96a235a58148e232fa
SHA25625756f70d53a7178373d18003d6e6528e11054eb789995bee41c316788214a71
SHA5124a05eec478ce6236b4e08f95192b7ec56ef2fb10b063d43226f28efe7e288389a0ac27f88c137fa320dc6f8c4ae4357c8f238d484809a59b6d81c2ca4efe7b4f
-
\Program Files (x86)\Microsoft\WaterMark.exeFilesize
384KB
MD5996c62c43013653ccb15711c62875d90
SHA1d91ae854d03c95b5d05d42892d1f3d19fc5ced34
SHA25604ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e
SHA512f83b01bc275db8c88079eaf330282784aea939cdfa0d4dbb68aae86a6fd2d588858ddd23f5ca9933b930a94ea1ab4ab67fb300bebaeb67ce4235e6815ecc9c0f
-
\Users\Admin\AppData\Local\Temp\04ed3acbb8ab4546d3f0fdcf12ab7e64d8b772da82db356842c1a53b02963a5e_NeikiAnalyticsmgr.exeFilesize
191KB
MD5e2eb051d51dd5a956b7070c03fcf467f
SHA1e5d9ce816454cddf643719ef71b6891fd8c0e429
SHA256c05dc40a59dc4c41af052c5a9e02e72545f62bbe8b908ec9114183daef880576
SHA512e09268688bc34ba899fffa8f42daed6916fabc2eaa8b5a8887fd4a27d3745dfb6c9f6bc05282371fe4b8eb2b1ff0c9e15a3d1abdaacb820a7ba89c285b5dc2fd
-
memory/1348-38-0x0000000000290000-0x00000000002FD000-memory.dmpFilesize
436KB
-
memory/1348-29-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1348-18-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2248-10-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2248-16-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2248-11-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2248-13-0x00000000000D0000-0x00000000000D1000-memory.dmpFilesize
4KB
-
memory/2248-9-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2248-8-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2248-14-0x00000000000B0000-0x00000000000EC000-memory.dmpFilesize
240KB
-
memory/2248-19-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2248-17-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2248-0-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/2248-12-0x00000000000B0000-0x00000000000EC000-memory.dmpFilesize
240KB
-
memory/2404-88-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/2404-90-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/2512-85-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/2512-772-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2512-86-0x0000000000050000-0x0000000000051000-memory.dmpFilesize
4KB
-
memory/2704-78-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2704-41-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/2704-64-0x0000000000130000-0x000000000016C000-memory.dmpFilesize
240KB
-
memory/2704-65-0x0000000000130000-0x000000000016C000-memory.dmpFilesize
240KB
-
memory/2704-70-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/2716-67-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2716-77-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/2756-66-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2756-76-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB