Analysis

  • max time kernel
    150s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 04:27

General

  • Target

    352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    8817bdfda92eb788f989aa5305311820

  • SHA1

    c02ad0c8f7faaa7510c73796810e9c0e1cbd76e3

  • SHA256

    352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e

  • SHA512

    1ccf67b7b111c0f6d7b2c2025699510c7b3f2e5bc01673808839d5228320adf04c0b0f304730040499265593945f10e3e1f3f2f5c4e4c70273315dcd18f82898

  • SSDEEP

    1536:yOcjUpkWb2TTgKwu0haOcjUpkWb2TTgKwuq:yOcjWJu7trOcjWJu7tq

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 16 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
  • Disables RegEdit via registry modification 16 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 63 IoCs
  • Loads dropped DLL 8 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 40 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 53 IoCs
  • Drops file in Windows directory 34 IoCs
  • Modifies Control Panel 32 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 7 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4528
    • C:\Windows\4k51k4.exe
      C:\Windows\4k51k4.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3728
      • C:\Windows\Notepad.exe
        Notepad.exe C:\Puisi.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2688
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4004
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:3976
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4444
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4620
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1316
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2860
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2272
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4944
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2836
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:5088
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4824
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:780
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1820
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4084
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4908
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2060
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3448
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:860
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3524
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:820
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3820
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3748
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2900
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:3016
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1400
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1136
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:664
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1540
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3912
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:5092
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1552
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:5040
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2936
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:4932
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1336
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4868
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2412
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3536
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:368
    • C:\Windows\4k51k4.exe
      C:\Windows\4k51k4.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1148
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:2888
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1472
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2380
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3900
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:3240
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4708
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1360
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4380
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3608
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3644
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1340
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3012
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:956
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3280
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:392
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1316
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1588
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2860
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4592
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3312
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1776
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4136

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

6
T1112

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

1
T1490

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\4k51k4.exe
    Filesize

    91KB

    MD5

    c896b31a412d7ffb5131fc60a9740613

    SHA1

    1da741b1654b870c8e80c995874a9de6a6e745fa

    SHA256

    c6166baf3ffbab587c10dd25b05399d8976ac954290e713dd9761f22015b9510

    SHA512

    92382c26bd8e57752992bbb1e8f8aa72f2b178b45da1185287ae10574308a78c198e3d7092aa79dfa2a5baf60541109295f15fa913eedef6a528e6992ca85cce

  • C:\Puisi.txt
    Filesize

    442B

    MD5

    001424d7974b9a3995af292f6fcfe171

    SHA1

    f8201d49d594d712c8450679c856c2e8307d2337

    SHA256

    660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d

    SHA512

    66ec4330b9a9961a2926516ec96d71e3311f67a61e6ac3070303453d26fa4fdc9524296f583c0e2179414f1a0d795cedbd094a83f5ecd3f1faa0cccfe4276657

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE
    Filesize

    91KB

    MD5

    05a359da0220bd90075e3c5696eae200

    SHA1

    7ff58871de5528510baffd157d6d2279bec30428

    SHA256

    dd979d7eb25bf86d485b6e36b8cd1194d45824d00b7f087fc5e8775cd965ece8

    SHA512

    edef1687c7f4134bc48d8e51bde83cb3596108993d5ba29734bc730ea5e06ee984f0cabb8235a3986fff1f0c02942a02227c5ac9f295b60b70d3516d21d5ede6

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE
    Filesize

    91KB

    MD5

    8c09475dbdebcee5e244960990914eec

    SHA1

    3b6b14292cd7331bfc96f6fafdcb376307374e77

    SHA256

    600c95840f31828ef732b92e34d4543a8f62cb6afb66e6667d0089f343b6cffc

    SHA512

    2c74a7118e64c151d9dbb5d56845f31bfc501bd0b97677cb26182991f6070cda0bed65817ca4af90eff0cc3ea0d65ff938b0c4c4ec18aecdf320138919302505

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE
    Filesize

    91KB

    MD5

    2d3326b7a3887fa220971c5f6508356f

    SHA1

    3f5821c7e03ec311633e2da952af5c75a91c6998

    SHA256

    19ff08c0eedcebd6143c99a4393790de4e47d92cfdfd8df2e5c96560b751d502

    SHA512

    a8a84963d1b8a172b35f76ae2a67e8ca9fa62116ad46d0914c2fa80ede624e43a8d0e41e0bec82ef8cf7a0fac17c3d6154931a666a883ee585ba2936de43e604

  • C:\Users\Admin\AppData\Local\winlogon.exe
    Filesize

    91KB

    MD5

    8817bdfda92eb788f989aa5305311820

    SHA1

    c02ad0c8f7faaa7510c73796810e9c0e1cbd76e3

    SHA256

    352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e

    SHA512

    1ccf67b7b111c0f6d7b2c2025699510c7b3f2e5bc01673808839d5228320adf04c0b0f304730040499265593945f10e3e1f3f2f5c4e4c70273315dcd18f82898

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.exe
    Filesize

    91KB

    MD5

    6da6065fc338873c10044c9a252214f8

    SHA1

    a08c305be86b136e620f5f639436107facc269fd

    SHA256

    ab9c5b6f383df2c9ba0dee457b58541dad9946cac5a38ad9b3f2ec9291cc9179

    SHA512

    0156ac1597b84e28560ebda43bc4b27c2b6d60f344b8273b78f7e90fa81494a7e94d41f632ea19214a72e0b2ee1dc5fabdcf05d6c00380a13a74e5a85c388027

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
    Filesize

    91KB

    MD5

    4f7abb248a5a48f0df44ba9c95069599

    SHA1

    daf85f46ef7674b09f5aa40d701997233d5fe753

    SHA256

    3fca2fa5ecc1bd38de94daa50fc9e9a1a136e53ffb1e64a680d25cb0401a61d7

    SHA512

    be3d292bff23c27f1d2ef5ede658fded010630fbd5c855aa41437b43afc2657af179f080abe71e734b46614f6bfe9c525d8525140afa74bc85b7bd2650fadbaa

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
    Filesize

    91KB

    MD5

    8d53fd16ad34d8d130ea8b205c425af4

    SHA1

    71284904d6fefe8b652eeb941956a83d4a019b20

    SHA256

    c98c7794cc98c12b9d5dc676ce8c523d0a46a79599753805b616c0e5f1969acf

    SHA512

    f27ff3c9a7aea668eb80b19780fa02982bae251d6036f0a5c1f7a7a0e947bec7c7e701f60e0f53f4cd19dd107c38921a35863e013b7491c4818cd91133544c53

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
    Filesize

    91KB

    MD5

    d52eed41cdf332d4db2c9e7fbec6300f

    SHA1

    fce4bfac2502ecb17dcf1b57c95d2f63169e5b6e

    SHA256

    5eda23ca78d6a6063453cddc3ef641580a7784bf0058f0c15339dca1531c3bad

    SHA512

    820be5d192656fdf5ae9d45b2b1e7bbb476c5b1ea70d7c1a2cf6e7e7c058ff432f731dfea596d2ba2b94e3d5736b9a185f990cb9625f28317fdbbfda53805813

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif
    Filesize

    91KB

    MD5

    6ee28b1857fbb1a5c6dce9ed607c1129

    SHA1

    f80191232e5ab7d985b41a456744d2186db97576

    SHA256

    468f85aaf2cd7195e689e0803781a2fcbf8ffa16d56a18af4c24ed34e6e67aff

    SHA512

    19af1f698e62c7fa0e35b9fb6a252ad6caab5a602e90f9f944c73a0e29a688a362416cffe73057c0105319b7b90a8410b689625f20555f041a94308f63eb5b44

  • C:\Windows\4k51k4.exe
    Filesize

    91KB

    MD5

    1289d9791bf532bd9008406dd518af45

    SHA1

    1c950ec69b1cd8023759d3eb0a24a938668757f4

    SHA256

    3b2d31191fbf6e0f90bc1eefb2c61deb14b0a0467c1e88557478864ee14d2354

    SHA512

    50995e21816559579adbaaf0fa00afb7036f6e66e958a3c26b2536d23fb61033b19caaaa980b1d05d1cb3ff751452445edf71cbae404d6f228fd554af3037a77

  • C:\Windows\MSVBVM60.DLL
    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\IExplorer.exe
    Filesize

    91KB

    MD5

    3232345390d40bf633b247a68a09a2cd

    SHA1

    4c516dc4f6bfae0a643a6a5730e1f1b8759ed7d5

    SHA256

    fbb83fe1bfa3b2e2eae55cd06187523a6f784629aeede17b8e9502e4845b92e9

    SHA512

    c7fd79519731402b72da46f527466928219f02a03eb801aa6dc22f447bb3ed4ab20dadbf6f663cdcbc6daa2b0d03e250428d17e2f764aa73508c032efeb5198f

  • C:\Windows\SysWOW64\MrHelloween.scr
    Filesize

    91KB

    MD5

    001caf3fb6b9889e5aa195a399c15ee0

    SHA1

    0f68c03031770ce5c81b1df7f35f0ce1fb30dc69

    SHA256

    fe948d5a6a71eaa21297ae74becb95399bf2f8cc23dd84127732792effb09f64

    SHA512

    6cecaca7a4ca86b1c3339a0deeda71ab8e5f8d55d6f892d495c92665a914632ef2c357a6ef9766e2171d64220f70666ec199c7e97da476f5bdef854a0142679d

  • C:\Windows\SysWOW64\shell.exe
    Filesize

    91KB

    MD5

    82a465ee3815377a57c4122b1006a3f7

    SHA1

    795c762ab1edde96a7cc6c50d6a54d2ccbddcbdf

    SHA256

    42958b462d2d6a6d8a6ea6d9e294add5ba55635e2307a596027daf41beb95355

    SHA512

    5d9beae24c20b608c8e27c461890867924d182f25d82cb22b29c6db52d1304c1b500b8e1420ea7da1a4220940f9c770be18fb0a0648106561ee2c993d013cc6b

  • C:\Windows\SysWOW64\shell.exe
    Filesize

    91KB

    MD5

    69799760b9c6cfbe55039340fe6ab4e2

    SHA1

    ca9da6390c774aedf86051379870a154cfcd6f62

    SHA256

    dbf9e43bc269051c15a6a9ca7045c476cdc90e7dd41785ef648f245273208919

    SHA512

    1dcbe36a680f116ef17b5bd62047ccb737c58b797122bc0b3b0eecc050c09f6ef95e9595e9bb22164155fb2d27c4397779da16a9c3dbbe076e5317f3449e85fc

  • memory/368-501-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/392-550-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/664-430-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/860-405-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/956-417-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/956-587-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/1136-419-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/1148-174-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/1316-558-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/1316-275-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/1336-484-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/1360-529-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/1400-408-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/1472-223-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/1552-475-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/1588-567-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/1776-354-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/1820-423-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/2060-241-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/2060-583-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/2060-125-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/2272-338-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/2380-233-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/2380-226-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/2412-490-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/2836-336-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/2860-573-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/2860-294-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/2888-177-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/2900-472-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/2936-477-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3012-571-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3016-250-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3016-584-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3240-394-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3240-586-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3280-542-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3312-580-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3448-393-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3524-411-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3524-416-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3536-493-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3608-548-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3644-556-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3728-225-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3728-581-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3820-441-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3900-242-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3912-451-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/3976-237-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4004-213-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4004-221-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4084-434-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4136-379-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4380-540-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4444-249-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4528-0-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4528-382-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4528-219-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4592-577-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4620-258-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4708-514-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4824-384-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4868-487-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4908-448-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4932-480-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4944-234-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/4944-582-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/5040-254-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/5040-585-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/5088-356-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB

  • memory/5092-460-0x0000000000400000-0x0000000000423000-memory.dmp
    Filesize

    140KB