Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 04:27
Behavioral task
behavioral1
Sample
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe
-
Size
91KB
-
MD5
8817bdfda92eb788f989aa5305311820
-
SHA1
c02ad0c8f7faaa7510c73796810e9c0e1cbd76e3
-
SHA256
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e
-
SHA512
1ccf67b7b111c0f6d7b2c2025699510c7b3f2e5bc01673808839d5228320adf04c0b0f304730040499265593945f10e3e1f3f2f5c4e4c70273315dcd18f82898
-
SSDEEP
1536:yOcjUpkWb2TTgKwu0haOcjUpkWb2TTgKwuq:yOcjWJu7trOcjWJu7tq
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 16 IoCs
Processes:
SERVICES.EXELSASS.EXE4k51k4.exeCSRSS.EXEIExplorer.exeWINLOGON.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exeSMSS.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" SMSS.EXE -
Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
Processes:
WINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe4k51k4.exeIExplorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
Processes:
4k51k4.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe -
Disables RegEdit via registry modification 16 IoCs
Processes:
WINLOGON.EXELSASS.EXE4k51k4.exeCSRSS.EXESMSS.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exeIExplorer.exeSERVICES.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 56 IoCs
Processes:
4k51k4.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXE4k51k4.exeIExplorer.exeWINLOGON.EXE4k51k4.exe4k51k4.exeCSRSS.EXESERVICES.EXEIExplorer.exeLSASS.EXESMSS.EXEWINLOGON.EXE4k51k4.exeIExplorer.exeCSRSS.EXE4k51k4.exeIExplorer.exeIExplorer.exeWINLOGON.EXESERVICES.EXEWINLOGON.EXEWINLOGON.EXE4k51k4.exe4k51k4.exeCSRSS.EXEIExplorer.exeIExplorer.exeLSASS.EXECSRSS.EXEWINLOGON.EXESERVICES.EXEWINLOGON.EXESERVICES.EXECSRSS.EXELSASS.EXESMSS.EXECSRSS.EXESERVICES.EXESMSS.EXESERVICES.EXELSASS.EXECSRSS.EXELSASS.EXELSASS.EXESERVICES.EXESMSS.EXESMSS.EXELSASS.EXESMSS.EXESMSS.EXEpid process 1196 4k51k4.exe 2844 IExplorer.exe 2180 WINLOGON.EXE 1652 CSRSS.EXE 1636 SERVICES.EXE 2728 LSASS.EXE 1200 SMSS.EXE 1500 4k51k4.exe 2396 IExplorer.exe 2988 WINLOGON.EXE 272 4k51k4.exe 1048 4k51k4.exe 2952 CSRSS.EXE 3040 SERVICES.EXE 2908 IExplorer.exe 2968 LSASS.EXE 1740 SMSS.EXE 1296 WINLOGON.EXE 2776 4k51k4.exe 1992 IExplorer.exe 2416 CSRSS.EXE 2608 4k51k4.exe 2620 IExplorer.exe 2640 IExplorer.exe 2556 WINLOGON.EXE 3016 SERVICES.EXE 2740 WINLOGON.EXE 2424 WINLOGON.EXE 1248 4k51k4.exe 1960 4k51k4.exe 2696 CSRSS.EXE 1816 IExplorer.exe 1256 IExplorer.exe 2432 LSASS.EXE 1684 CSRSS.EXE 1400 WINLOGON.EXE 1700 SERVICES.EXE 264 WINLOGON.EXE 2324 SERVICES.EXE 2940 CSRSS.EXE 1548 LSASS.EXE 296 SMSS.EXE 1488 CSRSS.EXE 1824 SERVICES.EXE 2252 SMSS.EXE 1964 SERVICES.EXE 1792 LSASS.EXE 1048 CSRSS.EXE 1948 LSASS.EXE 2304 LSASS.EXE 1056 SERVICES.EXE 1680 SMSS.EXE 2312 SMSS.EXE 2172 LSASS.EXE 2860 SMSS.EXE 2316 SMSS.EXE -
Loads dropped DLL 64 IoCs
Processes:
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe4k51k4.exeWINLOGON.EXEIExplorer.exeCSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 1196 4k51k4.exe 1196 4k51k4.exe 1196 4k51k4.exe 1196 4k51k4.exe 1196 4k51k4.exe 2180 WINLOGON.EXE 2180 WINLOGON.EXE 1196 4k51k4.exe 1196 4k51k4.exe 1196 4k51k4.exe 1196 4k51k4.exe 1196 4k51k4.exe 1196 4k51k4.exe 1196 4k51k4.exe 2844 IExplorer.exe 2180 WINLOGON.EXE 2180 WINLOGON.EXE 2844 IExplorer.exe 2180 WINLOGON.EXE 1652 CSRSS.EXE 1652 CSRSS.EXE 2180 WINLOGON.EXE 2180 WINLOGON.EXE 1636 SERVICES.EXE 1636 SERVICES.EXE 2844 IExplorer.exe 1652 CSRSS.EXE 2844 IExplorer.exe 1652 CSRSS.EXE 1636 SERVICES.EXE 1636 SERVICES.EXE 1636 SERVICES.EXE 1636 SERVICES.EXE 2728 LSASS.EXE 1200 SMSS.EXE 2728 LSASS.EXE 1652 CSRSS.EXE 1200 SMSS.EXE 2180 WINLOGON.EXE 1200 SMSS.EXE 1636 SERVICES.EXE 2728 LSASS.EXE 2844 IExplorer.exe 2180 WINLOGON.EXE 1200 SMSS.EXE 2728 LSASS.EXE 2180 WINLOGON.EXE 1652 CSRSS.EXE 1652 CSRSS.EXE 2180 WINLOGON.EXE 2844 IExplorer.exe 1200 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 64 IoCs
Processes:
WINLOGON.EXESERVICES.EXELSASS.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exeIExplorer.exe4k51k4.exeCSRSS.EXESMSS.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral1/memory/2136-0-0x0000000000400000-0x0000000000423000-memory.dmp upx C:\Users\Admin\AppData\Local\winlogon.exe upx behavioral1/memory/1196-116-0x0000000000400000-0x0000000000423000-memory.dmp upx C:\Windows\4k51k4.exe upx \Windows\SysWOW64\IExplorer.exe upx behavioral1/memory/2136-121-0x0000000000560000-0x0000000000583000-memory.dmp upx \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE upx behavioral1/memory/2180-141-0x0000000000400000-0x0000000000423000-memory.dmp upx C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE upx \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE upx C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE upx C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE upx behavioral1/memory/2136-181-0x0000000000400000-0x0000000000423000-memory.dmp upx C:\4k51k4.exe upx behavioral1/memory/2396-234-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1652-281-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2988-288-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1636-300-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/3040-321-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1296-344-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2908-350-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2776-382-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2608-393-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1960-461-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1256-485-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2696-483-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1964-564-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1488-558-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1056-580-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1792-578-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1792-572-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1048-568-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1700-544-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2844-542-0x00000000004F0000-0x0000000000513000-memory.dmp upx behavioral1/memory/1824-559-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2252-556-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1824-554-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/296-553-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2940-539-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1548-537-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1400-535-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/264-524-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/264-526-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1700-522-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1400-521-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1684-515-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2432-501-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/3016-479-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1816-475-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1248-455-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1960-453-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1248-458-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2640-424-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1740-449-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2740-431-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2556-417-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2556-407-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1652-404-0x0000000001E70000-0x0000000001E93000-memory.dmp upx behavioral1/memory/2416-390-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2620-388-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2620-385-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1296-342-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2968-329-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2968-327-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Adds Run key to start application 2 TTPs 40 IoCs
Processes:
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe4k51k4.exeCSRSS.EXEWINLOGON.EXESERVICES.EXESMSS.EXELSASS.EXEIExplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SMSS.EXE -
Drops desktop.ini file(s) 4 IoCs
Processes:
4k51k4.exedescription ioc process File opened for modification C:\desktop.ini 4k51k4.exe File created C:\desktop.ini 4k51k4.exe File opened for modification F:\desktop.ini 4k51k4.exe File created F:\desktop.ini 4k51k4.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
SMSS.EXECSRSS.EXE4k51k4.exeWINLOGON.EXESERVICES.EXELSASS.EXEIExplorer.exedescription ioc process File opened (read-only) \??\Y: SMSS.EXE File opened (read-only) \??\Z: SMSS.EXE File opened (read-only) \??\B: CSRSS.EXE File opened (read-only) \??\V: 4k51k4.exe File opened (read-only) \??\E: WINLOGON.EXE File opened (read-only) \??\H: SERVICES.EXE File opened (read-only) \??\K: LSASS.EXE File opened (read-only) \??\N: SERVICES.EXE File opened (read-only) \??\S: SMSS.EXE File opened (read-only) \??\G: LSASS.EXE File opened (read-only) \??\E: SERVICES.EXE File opened (read-only) \??\I: CSRSS.EXE File opened (read-only) \??\U: CSRSS.EXE File opened (read-only) \??\W: LSASS.EXE File opened (read-only) \??\K: 4k51k4.exe File opened (read-only) \??\I: IExplorer.exe File opened (read-only) \??\L: IExplorer.exe File opened (read-only) \??\Z: IExplorer.exe File opened (read-only) \??\I: LSASS.EXE File opened (read-only) \??\N: LSASS.EXE File opened (read-only) \??\E: 4k51k4.exe File opened (read-only) \??\P: CSRSS.EXE File opened (read-only) \??\Q: IExplorer.exe File opened (read-only) \??\U: 4k51k4.exe File opened (read-only) \??\I: SERVICES.EXE File opened (read-only) \??\M: SERVICES.EXE File opened (read-only) \??\V: WINLOGON.EXE File opened (read-only) \??\R: SERVICES.EXE File opened (read-only) \??\I: SMSS.EXE File opened (read-only) \??\G: IExplorer.exe File opened (read-only) \??\J: IExplorer.exe File opened (read-only) \??\W: 4k51k4.exe File opened (read-only) \??\Y: 4k51k4.exe File opened (read-only) \??\Q: WINLOGON.EXE File opened (read-only) \??\H: LSASS.EXE File opened (read-only) \??\O: LSASS.EXE File opened (read-only) \??\S: WINLOGON.EXE File opened (read-only) \??\W: CSRSS.EXE File opened (read-only) \??\H: IExplorer.exe File opened (read-only) \??\M: LSASS.EXE File opened (read-only) \??\O: IExplorer.exe File opened (read-only) \??\X: IExplorer.exe File opened (read-only) \??\P: 4k51k4.exe File opened (read-only) \??\W: SMSS.EXE File opened (read-only) \??\L: CSRSS.EXE File opened (read-only) \??\N: CSRSS.EXE File opened (read-only) \??\T: SERVICES.EXE File opened (read-only) \??\V: SERVICES.EXE File opened (read-only) \??\H: CSRSS.EXE File opened (read-only) \??\R: IExplorer.exe File opened (read-only) \??\Z: SERVICES.EXE File opened (read-only) \??\M: SMSS.EXE File opened (read-only) \??\Y: CSRSS.EXE File opened (read-only) \??\B: SMSS.EXE File opened (read-only) \??\E: LSASS.EXE File opened (read-only) \??\Z: LSASS.EXE File opened (read-only) \??\B: WINLOGON.EXE File opened (read-only) \??\O: WINLOGON.EXE File opened (read-only) \??\Q: SERVICES.EXE File opened (read-only) \??\J: CSRSS.EXE File opened (read-only) \??\R: CSRSS.EXE File opened (read-only) \??\M: IExplorer.exe File opened (read-only) \??\Q: LSASS.EXE File opened (read-only) \??\R: LSASS.EXE -
Drops file in System32 directory 50 IoCs
Processes:
IExplorer.exeIExplorer.exeCSRSS.EXEIExplorer.exeSERVICES.EXELSASS.EXEIExplorer.exe4k51k4.exeIExplorer.exe352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exeIExplorer.exeSMSS.EXEWINLOGON.EXEIExplorer.exeIExplorer.exedescription ioc process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe CSRSS.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe SERVICES.EXE File created C:\Windows\SysWOW64\IExplorer.exe LSASS.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 4k51k4.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe CSRSS.EXE File opened for modification C:\Windows\SysWOW64\shell.exe 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr LSASS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe LSASS.EXE File created C:\Windows\SysWOW64\IExplorer.exe CSRSS.EXE File opened for modification C:\Windows\SysWOW64\shell.exe SERVICES.EXE File opened for modification C:\Windows\SysWOW64\MrHelloween.scr SMSS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe WINLOGON.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe 4k51k4.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe WINLOGON.EXE File created C:\Windows\SysWOW64\IExplorer.exe SERVICES.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe SMSS.EXE File created C:\Windows\SysWOW64\shell.exe 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\shell.exe 4k51k4.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr WINLOGON.EXE File opened for modification C:\Windows\SysWOW64\MrHelloween.scr SERVICES.EXE File created C:\Windows\SysWOW64\IExplorer.exe SMSS.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr CSRSS.EXE File created C:\Windows\SysWOW64\MrHelloween.scr 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\shell.exe WINLOGON.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe SMSS.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr 4k51k4.exe -
Drops file in Windows directory 32 IoCs
Processes:
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe4k51k4.exeIExplorer.exeSMSS.EXEIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXEIExplorer.exeLSASS.EXEIExplorer.exedescription ioc process File created C:\Windows\4k51k4.exe 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened for modification C:\Windows\4k51k4.exe 4k51k4.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe SMSS.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe 4k51k4.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe WINLOGON.EXE File created C:\Windows\4k51k4.exe WINLOGON.EXE File created C:\Windows\4k51k4.exe CSRSS.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened for modification C:\Windows\4k51k4.exe IExplorer.exe File opened for modification C:\Windows\4k51k4.exe SERVICES.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe CSRSS.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe SERVICES.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe LSASS.EXE File opened for modification C:\Windows\4k51k4.exe LSASS.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe SMSS.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 32 IoCs
Processes:
4k51k4.exeIExplorer.exeCSRSS.EXESERVICES.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exeSMSS.EXEWINLOGON.EXELSASS.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" IExplorer.exe -
Modifies registry class 64 IoCs
Processes:
WINLOGON.EXESMSS.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe4k51k4.exeIExplorer.exeCSRSS.EXELSASS.EXESERVICES.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WINLOGON.EXE -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
Notepad.exepid process 2832 Notepad.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exepid process 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 7 IoCs
Processes:
4k51k4.exeCSRSS.EXEWINLOGON.EXESERVICES.EXESMSS.EXEIExplorer.exeLSASS.EXEpid process 1196 4k51k4.exe 1652 CSRSS.EXE 2180 WINLOGON.EXE 1636 SERVICES.EXE 1200 SMSS.EXE 2844 IExplorer.exe 2728 LSASS.EXE -
Suspicious use of SetWindowsHookEx 57 IoCs
Processes:
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe4k51k4.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXE4k51k4.exeIExplorer.exe4k51k4.exeWINLOGON.EXE4k51k4.exeCSRSS.EXESERVICES.EXELSASS.EXEIExplorer.exeSMSS.EXEWINLOGON.EXE4k51k4.exeIExplorer.exeCSRSS.EXE4k51k4.exeIExplorer.exeWINLOGON.EXEIExplorer.exeWINLOGON.EXE4k51k4.exe4k51k4.exeWINLOGON.EXESERVICES.EXECSRSS.EXEIExplorer.exeIExplorer.exeLSASS.EXECSRSS.EXEWINLOGON.EXESERVICES.EXEWINLOGON.EXESERVICES.EXELSASS.EXECSRSS.EXESMSS.EXESMSS.EXESERVICES.EXECSRSS.EXESERVICES.EXECSRSS.EXELSASS.EXELSASS.EXESERVICES.EXELSASS.EXESMSS.EXESMSS.EXELSASS.EXESMSS.EXESMSS.EXEpid process 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 1196 4k51k4.exe 2844 IExplorer.exe 2180 WINLOGON.EXE 1652 CSRSS.EXE 1636 SERVICES.EXE 2728 LSASS.EXE 1200 SMSS.EXE 1500 4k51k4.exe 2396 IExplorer.exe 1048 4k51k4.exe 2988 WINLOGON.EXE 272 4k51k4.exe 2952 CSRSS.EXE 3040 SERVICES.EXE 2968 LSASS.EXE 2908 IExplorer.exe 1740 SMSS.EXE 1296 WINLOGON.EXE 2776 4k51k4.exe 1992 IExplorer.exe 2416 CSRSS.EXE 2608 4k51k4.exe 2620 IExplorer.exe 2556 WINLOGON.EXE 2640 IExplorer.exe 2740 WINLOGON.EXE 1248 4k51k4.exe 1960 4k51k4.exe 2424 WINLOGON.EXE 3016 SERVICES.EXE 2696 CSRSS.EXE 1816 IExplorer.exe 1256 IExplorer.exe 2432 LSASS.EXE 1684 CSRSS.EXE 1400 WINLOGON.EXE 1700 SERVICES.EXE 264 WINLOGON.EXE 2324 SERVICES.EXE 1548 LSASS.EXE 2940 CSRSS.EXE 296 SMSS.EXE 2252 SMSS.EXE 1824 SERVICES.EXE 1488 CSRSS.EXE 1964 SERVICES.EXE 1048 CSRSS.EXE 1792 LSASS.EXE 2304 LSASS.EXE 1056 SERVICES.EXE 1948 LSASS.EXE 2312 SMSS.EXE 1680 SMSS.EXE 2172 LSASS.EXE 2860 SMSS.EXE 2316 SMSS.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe4k51k4.exeIExplorer.exeWINLOGON.EXEdescription pid process target process PID 2136 wrote to memory of 1196 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 4k51k4.exe PID 2136 wrote to memory of 1196 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 4k51k4.exe PID 2136 wrote to memory of 1196 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 4k51k4.exe PID 2136 wrote to memory of 1196 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 4k51k4.exe PID 1196 wrote to memory of 2832 1196 4k51k4.exe Notepad.exe PID 1196 wrote to memory of 2832 1196 4k51k4.exe Notepad.exe PID 1196 wrote to memory of 2832 1196 4k51k4.exe Notepad.exe PID 1196 wrote to memory of 2832 1196 4k51k4.exe Notepad.exe PID 2136 wrote to memory of 2844 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe IExplorer.exe PID 2136 wrote to memory of 2844 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe IExplorer.exe PID 2136 wrote to memory of 2844 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe IExplorer.exe PID 2136 wrote to memory of 2844 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe IExplorer.exe PID 2136 wrote to memory of 2180 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe WINLOGON.EXE PID 2136 wrote to memory of 2180 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe WINLOGON.EXE PID 2136 wrote to memory of 2180 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe WINLOGON.EXE PID 2136 wrote to memory of 2180 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe WINLOGON.EXE PID 2136 wrote to memory of 1652 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe CSRSS.EXE PID 2136 wrote to memory of 1652 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe CSRSS.EXE PID 2136 wrote to memory of 1652 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe CSRSS.EXE PID 2136 wrote to memory of 1652 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe CSRSS.EXE PID 2136 wrote to memory of 1636 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SERVICES.EXE PID 2136 wrote to memory of 1636 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SERVICES.EXE PID 2136 wrote to memory of 1636 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SERVICES.EXE PID 2136 wrote to memory of 1636 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SERVICES.EXE PID 2136 wrote to memory of 2728 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe LSASS.EXE PID 2136 wrote to memory of 2728 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe LSASS.EXE PID 2136 wrote to memory of 2728 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe LSASS.EXE PID 2136 wrote to memory of 2728 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe LSASS.EXE PID 2136 wrote to memory of 1200 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SMSS.EXE PID 2136 wrote to memory of 1200 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SMSS.EXE PID 2136 wrote to memory of 1200 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SMSS.EXE PID 2136 wrote to memory of 1200 2136 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SMSS.EXE PID 1196 wrote to memory of 1500 1196 4k51k4.exe 4k51k4.exe PID 1196 wrote to memory of 1500 1196 4k51k4.exe 4k51k4.exe PID 1196 wrote to memory of 1500 1196 4k51k4.exe 4k51k4.exe PID 1196 wrote to memory of 1500 1196 4k51k4.exe 4k51k4.exe PID 1196 wrote to memory of 2396 1196 4k51k4.exe IExplorer.exe PID 1196 wrote to memory of 2396 1196 4k51k4.exe IExplorer.exe PID 1196 wrote to memory of 2396 1196 4k51k4.exe IExplorer.exe PID 1196 wrote to memory of 2396 1196 4k51k4.exe IExplorer.exe PID 1196 wrote to memory of 2988 1196 4k51k4.exe WINLOGON.EXE PID 1196 wrote to memory of 2988 1196 4k51k4.exe WINLOGON.EXE PID 1196 wrote to memory of 2988 1196 4k51k4.exe WINLOGON.EXE PID 1196 wrote to memory of 2988 1196 4k51k4.exe WINLOGON.EXE PID 2844 wrote to memory of 272 2844 IExplorer.exe 4k51k4.exe PID 2844 wrote to memory of 272 2844 IExplorer.exe 4k51k4.exe PID 2844 wrote to memory of 272 2844 IExplorer.exe 4k51k4.exe PID 2844 wrote to memory of 272 2844 IExplorer.exe 4k51k4.exe PID 2180 wrote to memory of 1048 2180 WINLOGON.EXE CSRSS.EXE PID 2180 wrote to memory of 1048 2180 WINLOGON.EXE CSRSS.EXE PID 2180 wrote to memory of 1048 2180 WINLOGON.EXE CSRSS.EXE PID 2180 wrote to memory of 1048 2180 WINLOGON.EXE CSRSS.EXE PID 2180 wrote to memory of 2908 2180 WINLOGON.EXE IExplorer.exe PID 2180 wrote to memory of 2908 2180 WINLOGON.EXE IExplorer.exe PID 2180 wrote to memory of 2908 2180 WINLOGON.EXE IExplorer.exe PID 2180 wrote to memory of 2908 2180 WINLOGON.EXE IExplorer.exe PID 1196 wrote to memory of 2952 1196 4k51k4.exe CSRSS.EXE PID 1196 wrote to memory of 2952 1196 4k51k4.exe CSRSS.EXE PID 1196 wrote to memory of 2952 1196 4k51k4.exe CSRSS.EXE PID 1196 wrote to memory of 2952 1196 4k51k4.exe CSRSS.EXE PID 1196 wrote to memory of 3040 1196 4k51k4.exe SERVICES.EXE PID 1196 wrote to memory of 3040 1196 4k51k4.exe SERVICES.EXE PID 1196 wrote to memory of 3040 1196 4k51k4.exe SERVICES.EXE PID 1196 wrote to memory of 3040 1196 4k51k4.exe SERVICES.EXE -
System policy modification 1 TTPs 40 IoCs
Processes:
WINLOGON.EXECSRSS.EXESERVICES.EXESMSS.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe4k51k4.exeIExplorer.exeLSASS.EXEdescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System CSRSS.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\Notepad.exeNotepad.exe C:\Puisi.txt3⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Modify Registry
6Hide Artifacts
2Hidden Files and Directories
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\4k51k4.exeFilesize
91KB
MD59936f75965a4b81e87477b88ba35b0eb
SHA178563ad86dfea7faebddee04cc4e4697d1fdeef7
SHA256dba5038f015542a95639501c97da6225a31adc0d086746bbed9a227ffb311b85
SHA512e61195cfb54ce5cfef6ea2b8bbf5b8898228a4163607781b9507e5d10f9ee934372a6cc030dea31fdc99f521e0943ff4ce2d1a872a88785329e93b821b8287d8
-
C:\4k51k4.exeFilesize
91KB
MD59fb93e83dccbd4f484fe94a3bea31729
SHA15b31c7b017b940ece387597e3daaef2d3692e1a5
SHA2568a896269ef5b581355844cf83e973d23f9e8c07f62fa01fd77d4d4007fd768be
SHA5127b59da968225d80b8b40097add761e8796a74f000fd380695c17764bdc846157d5c1fbe63d0456ccd8f6d62e35701024e6e0139a370a41492ba13880ddd75a42
-
C:\Puisi.txtFilesize
442B
MD5001424d7974b9a3995af292f6fcfe171
SHA1f8201d49d594d712c8450679c856c2e8307d2337
SHA256660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d
SHA51266ec4330b9a9961a2926516ec96d71e3311f67a61e6ac3070303453d26fa4fdc9524296f583c0e2179414f1a0d795cedbd094a83f5ecd3f1faa0cccfe4276657
-
C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXEFilesize
91KB
MD53db47f9427d21fcaad354868337a2352
SHA1cedf36aa8493f0d3ec044f48e65763ee7aefbe9e
SHA25669d6a33f152ded3312dc61dd2ae64034952a46a5605fe8169a7bd25bba8d3747
SHA5124a4d9dc761645f9d517fd8e1ed8092a00b942817dbb787ad50df9b3de450ab270bc1d12c5209673ef822c9679e4265d574e596eb7e0e5b8f9bea2610c2f1ff82
-
C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXEFilesize
91KB
MD561da4db7a0eed043c4ce9f290852135c
SHA1c48d7f4ec55fd83b20167598f598137e44b95143
SHA256da5878c87f0242ff1895703d57b544227f1a9793a9d0fe3061a0ef6552252d1e
SHA512081fdc5f8f8a66b90337b6c341d55c954481d5722d8d18e7e9d0f0320079657417512bee931967e5fa5ecc7f825175ebc33d5bd3b5314fb35f4155bf5b58c32b
-
C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXEFilesize
91KB
MD5167853398d01cfb0fb69b9e06d228d29
SHA15e80d5ee7ffb275d10cea4dac9c747ae1fd01b84
SHA256c09b778172a70ffd9849d61988225807c2fa644a321b3c7d329642f645878f18
SHA5129559ac0c139d0294daab22c228a87da89739489ca35a4a11574c87343a4a6e6840a059204771c2c5d29aa5ae4efbbf8922d4824bc06a32b6ce2be0584432a960
-
C:\Users\Admin\AppData\Local\winlogon.exeFilesize
91KB
MD58817bdfda92eb788f989aa5305311820
SHA1c02ad0c8f7faaa7510c73796810e9c0e1cbd76e3
SHA256352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e
SHA5121ccf67b7b111c0f6d7b2c2025699510c7b3f2e5bc01673808839d5228320adf04c0b0f304730040499265593945f10e3e1f3f2f5c4e4c70273315dcd18f82898
-
C:\Windows\4k51k4.exeFilesize
91KB
MD5275f32f9ddd235610766fe5f82e8e6c9
SHA1e9bfd25e958596666618a85366e05f43eb888b6e
SHA2566f7d656d55e12c488e22f5a2a4a5e91e9c80019162602ae7dd0b025a634b5147
SHA512c1ffe5d997c69b64d424f2ce4a64d05f16d86fa8b721d87f533c2ba5c17b42754983c350ad95f497941dfa782e9a2cbcd608ec9697a00fe04938be8b4fab826d
-
C:\Windows\MSVBVM60.DLLFilesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
C:\Windows\SysWOW64\shell.exeFilesize
91KB
MD50f6ac3d326a4a75f6c628f3a6d9f12e0
SHA127f3f429f876226ff00331b38c9e9727c59a04eb
SHA256884bfaf545113c2e8809587aefc5a8f259d04d3c7dbfe40b683b6bee286e0570
SHA5127a962b8018ea257e9e2daacdc47fe00cf03f52f63cb9ea85e3531a7cd87d660db7bf968b3815f9de0f2cdd9a7d2634bee754bf2574d4edc32b2f67a382c1b38e
-
\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXEFilesize
91KB
MD5f647db30515831c1e17e9cdddb420028
SHA1ea9dbf7c4007f3321e25bcd1a22fae0abf1f1429
SHA25683ff00676184bffe804bce78a13adcf975ab46a7b4583bddcabd00c15d4e8451
SHA51200f217f81ad6097c5391952211d8b3cf880595eeb7ec16aeed87d86a63bd50696353587962365da60f9e10f6d72d867d842258ab2099d2aad743c31bc0d61cb5
-
\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXEFilesize
91KB
MD58b6501ec496939a12e41f169cccb1f5f
SHA142c0e548436c99446fa9a8acb80d2f74d6cdf078
SHA25636d89080b229729b62e697f3b5947a1b7aa97e49b850bcec83d3a2284d3d6614
SHA51248e9f4dec227b240cb43437073022821ec6c0e0df4b03c2e538f2145d7a79a16d39b59d63806a441f0000c244978f334e640656a2a76f90d90bd7c42b6f63b89
-
\Windows\SysWOW64\IExplorer.exeFilesize
91KB
MD5ed73bbed67c4030a9ef221f9f75795a7
SHA1bd0d4c587b539e163827322fb2e318f0ff605e11
SHA256264681e034b0e419de72c62f00bf7d26049db043a330ad17bcb323a2112e8980
SHA51262921220e9850b3ef2f5004bf4c3173c725e3e3c1e327ce79975b25364f1e3a7a19f27a660aa78e13aeda94e7e0e3299af0fe28f8363099ed036341fccab9532
-
memory/264-526-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/264-524-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/272-298-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/272-297-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/296-553-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1048-294-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1048-291-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/1048-566-0x0000000000220000-0x0000000000230000-memory.dmpFilesize
64KB
-
memory/1048-565-0x0000000000220000-0x0000000000230000-memory.dmpFilesize
64KB
-
memory/1048-568-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1056-580-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1196-452-0x00000000031F0000-0x0000000003213000-memory.dmpFilesize
140KB
-
memory/1196-116-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1196-348-0x00000000031F0000-0x0000000003213000-memory.dmpFilesize
140KB
-
memory/1196-218-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1196-253-0x00000000031F0000-0x0000000003213000-memory.dmpFilesize
140KB
-
memory/1196-220-0x00000000031F0000-0x0000000003213000-memory.dmpFilesize
140KB
-
memory/1196-312-0x00000000031F0000-0x0000000003213000-memory.dmpFilesize
140KB
-
memory/1196-614-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1196-330-0x00000000031F0000-0x0000000003213000-memory.dmpFilesize
140KB
-
memory/1196-221-0x00000000031F0000-0x0000000003213000-memory.dmpFilesize
140KB
-
memory/1196-340-0x00000000031F0000-0x0000000003213000-memory.dmpFilesize
140KB
-
memory/1200-520-0x00000000030E0000-0x0000000003103000-memory.dmpFilesize
140KB
-
memory/1200-326-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1248-457-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/1248-458-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1248-455-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1256-485-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1296-344-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1296-342-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1400-521-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1400-535-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1488-558-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1500-219-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1500-217-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/1548-537-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1636-454-0x0000000000540000-0x0000000000563000-memory.dmpFilesize
140KB
-
memory/1636-300-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1636-518-0x0000000000540000-0x0000000000563000-memory.dmpFilesize
140KB
-
memory/1652-281-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1652-361-0x0000000001E70000-0x0000000001E93000-memory.dmpFilesize
140KB
-
memory/1652-617-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1652-404-0x0000000001E70000-0x0000000001E93000-memory.dmpFilesize
140KB
-
memory/1680-590-0x0000000000220000-0x0000000000230000-memory.dmpFilesize
64KB
-
memory/1684-515-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1700-544-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1700-522-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1740-449-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1792-572-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1792-578-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1816-475-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1824-559-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1824-554-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1960-460-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/1960-461-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1960-453-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1964-564-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2136-139-0x0000000000560000-0x0000000000583000-memory.dmpFilesize
140KB
-
memory/2136-159-0x0000000000560000-0x0000000000583000-memory.dmpFilesize
140KB
-
memory/2136-0-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2136-121-0x0000000000560000-0x0000000000583000-memory.dmpFilesize
140KB
-
memory/2136-115-0x0000000000560000-0x0000000000583000-memory.dmpFilesize
140KB
-
memory/2136-181-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2136-114-0x0000000000560000-0x0000000000583000-memory.dmpFilesize
140KB
-
memory/2180-470-0x0000000001C30000-0x0000000001C53000-memory.dmpFilesize
140KB
-
memory/2180-301-0x0000000001C30000-0x0000000001C53000-memory.dmpFilesize
140KB
-
memory/2180-616-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2180-255-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2180-401-0x0000000001C30000-0x0000000001C53000-memory.dmpFilesize
140KB
-
memory/2180-398-0x0000000001C30000-0x0000000001C53000-memory.dmpFilesize
140KB
-
memory/2180-141-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2252-556-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2396-234-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2416-390-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2432-501-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2556-407-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2556-417-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2608-392-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/2608-393-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2620-385-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2620-388-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2640-424-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2696-483-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2728-519-0x0000000000820000-0x0000000000843000-memory.dmpFilesize
140KB
-
memory/2728-560-0x0000000000820000-0x0000000000843000-memory.dmpFilesize
140KB
-
memory/2728-523-0x0000000000820000-0x0000000000843000-memory.dmpFilesize
140KB
-
memory/2728-311-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2740-431-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2776-382-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2776-381-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/2844-615-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2844-252-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2844-549-0x00000000004F0000-0x0000000000513000-memory.dmpFilesize
140KB
-
memory/2844-406-0x00000000004F0000-0x0000000000513000-memory.dmpFilesize
140KB
-
memory/2844-341-0x00000000004F0000-0x0000000000513000-memory.dmpFilesize
140KB
-
memory/2844-473-0x00000000004F0000-0x0000000000513000-memory.dmpFilesize
140KB
-
memory/2844-403-0x00000000004F0000-0x0000000000513000-memory.dmpFilesize
140KB
-
memory/2844-279-0x00000000004F0000-0x0000000000513000-memory.dmpFilesize
140KB
-
memory/2844-467-0x00000000004F0000-0x0000000000513000-memory.dmpFilesize
140KB
-
memory/2844-360-0x00000000004F0000-0x0000000000513000-memory.dmpFilesize
140KB
-
memory/2844-542-0x00000000004F0000-0x0000000000513000-memory.dmpFilesize
140KB
-
memory/2844-359-0x00000000004F0000-0x0000000000513000-memory.dmpFilesize
140KB
-
memory/2908-350-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2940-539-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2952-305-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2968-327-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2968-329-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2988-288-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3016-479-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3040-321-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3040-313-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB