Analysis
-
max time kernel
150s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 04:27
Behavioral task
behavioral1
Sample
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe
-
Size
91KB
-
MD5
8817bdfda92eb788f989aa5305311820
-
SHA1
c02ad0c8f7faaa7510c73796810e9c0e1cbd76e3
-
SHA256
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e
-
SHA512
1ccf67b7b111c0f6d7b2c2025699510c7b3f2e5bc01673808839d5228320adf04c0b0f304730040499265593945f10e3e1f3f2f5c4e4c70273315dcd18f82898
-
SSDEEP
1536:yOcjUpkWb2TTgKwu0haOcjUpkWb2TTgKwuq:yOcjWJu7trOcjWJu7tq
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 16 IoCs
Processes:
4k51k4.exeIExplorer.exeLSASS.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exeCSRSS.EXESMSS.EXEWINLOGON.EXESERVICES.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" SMSS.EXE -
Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
Processes:
CSRSS.EXESERVICES.EXELSASS.EXESMSS.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe4k51k4.exeIExplorer.exeWINLOGON.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WINLOGON.EXE -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
Processes:
SERVICES.EXELSASS.EXESMSS.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe4k51k4.exeIExplorer.exeWINLOGON.EXECSRSS.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CSRSS.EXE -
Disables RegEdit via registry modification 16 IoCs
Processes:
SMSS.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exeIExplorer.exeWINLOGON.EXESERVICES.EXELSASS.EXE4k51k4.exeCSRSS.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 63 IoCs
Processes:
4k51k4.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXE4k51k4.exeIExplorer.exeWINLOGON.EXE4k51k4.exeIExplorer.exeCSRSS.EXESERVICES.EXEWINLOGON.EXELSASS.EXECSRSS.EXESERVICES.EXESMSS.EXELSASS.EXESMSS.EXE4k51k4.exeLSASS.EXEIExplorer.exeSMSS.EXEWINLOGON.EXE4k51k4.exe4k51k4.exeCSRSS.EXEIExplorer.exeWINLOGON.EXEIExplorer.exeSERVICES.EXECSRSS.EXEWINLOGON.EXELSASS.EXECSRSS.EXESERVICES.EXESMSS.EXESERVICES.EXELSASS.EXELSASS.EXESMSS.EXESMSS.EXE4k51k4.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXE4k51k4.exeIExplorer.exeWINLOGON.EXE4k51k4.exeCSRSS.EXEIExplorer.exeSERVICES.EXEWINLOGON.EXELSASS.EXECSRSS.EXESMSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 3728 4k51k4.exe 4944 IExplorer.exe 2060 WINLOGON.EXE 3016 CSRSS.EXE 5040 SERVICES.EXE 1148 4k51k4.exe 2888 IExplorer.exe 1472 WINLOGON.EXE 4004 4k51k4.exe 3976 IExplorer.exe 2380 CSRSS.EXE 3900 SERVICES.EXE 4444 WINLOGON.EXE 3240 LSASS.EXE 4620 CSRSS.EXE 1316 SERVICES.EXE 956 SMSS.EXE 2860 LSASS.EXE 2272 SMSS.EXE 2836 4k51k4.exe 1776 LSASS.EXE 5088 IExplorer.exe 4136 SMSS.EXE 4824 WINLOGON.EXE 3448 4k51k4.exe 1400 4k51k4.exe 780 CSRSS.EXE 860 IExplorer.exe 3524 WINLOGON.EXE 1136 IExplorer.exe 1820 SERVICES.EXE 820 CSRSS.EXE 664 WINLOGON.EXE 4084 LSASS.EXE 1540 CSRSS.EXE 3820 SERVICES.EXE 4908 SMSS.EXE 3912 SERVICES.EXE 3748 LSASS.EXE 5092 LSASS.EXE 2900 SMSS.EXE 1552 SMSS.EXE 2936 4k51k4.exe 4932 IExplorer.exe 1336 WINLOGON.EXE 4868 CSRSS.EXE 2412 SERVICES.EXE 3536 LSASS.EXE 368 SMSS.EXE 4708 4k51k4.exe 1360 IExplorer.exe 4380 WINLOGON.EXE 3280 4k51k4.exe 3608 CSRSS.EXE 392 IExplorer.exe 3644 SERVICES.EXE 1316 WINLOGON.EXE 1340 LSASS.EXE 1588 CSRSS.EXE 3012 SMSS.EXE 2860 SERVICES.EXE 4592 LSASS.EXE 3312 SMSS.EXE -
Loads dropped DLL 8 IoCs
Processes:
4k51k4.exe4k51k4.exe4k51k4.exe4k51k4.exe4k51k4.exe4k51k4.exe4k51k4.exe4k51k4.exepid process 1148 4k51k4.exe 4004 4k51k4.exe 2836 4k51k4.exe 3448 4k51k4.exe 1400 4k51k4.exe 2936 4k51k4.exe 4708 4k51k4.exe 3280 4k51k4.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
Processes:
4k51k4.exeSERVICES.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exeIExplorer.exeCSRSS.EXELSASS.EXESMSS.EXEWINLOGON.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE -
Processes:
resource yara_rule behavioral2/memory/4528-0-0x0000000000400000-0x0000000000423000-memory.dmp upx C:\Users\Admin\AppData\Local\winlogon.exe upx C:\Windows\4k51k4.exe upx C:\Windows\SysWOW64\IExplorer.exe upx C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE upx behavioral2/memory/2060-125-0x0000000000400000-0x0000000000423000-memory.dmp upx C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE upx C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE upx behavioral2/memory/1148-174-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2888-177-0x0000000000400000-0x0000000000423000-memory.dmp upx C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE upx C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif upx behavioral2/memory/4004-213-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4004-221-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1472-223-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2380-226-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3728-225-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4528-219-0x0000000000400000-0x0000000000423000-memory.dmp upx C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.exe upx behavioral2/memory/3976-237-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2380-233-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4944-234-0x0000000000400000-0x0000000000423000-memory.dmp upx C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE upx behavioral2/memory/4444-249-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3016-250-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/5040-254-0x0000000000400000-0x0000000000423000-memory.dmp upx C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE upx behavioral2/memory/1316-275-0x0000000000400000-0x0000000000423000-memory.dmp upx C:\4k51k4.exe upx behavioral2/memory/2272-338-0x0000000000400000-0x0000000000423000-memory.dmp upx C:\Windows\SysWOW64\shell.exe upx C:\Windows\SysWOW64\MrHelloween.scr upx behavioral2/memory/5088-356-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1776-354-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4136-379-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4824-384-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4528-382-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3240-394-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3448-393-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1400-408-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1136-419-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1820-423-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4084-434-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/664-430-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3820-441-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/956-417-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3524-416-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4908-448-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3912-451-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3524-411-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/860-405-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/5092-460-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2900-472-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2936-477-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1552-475-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4932-480-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1336-484-0x0000000000400000-0x0000000000423000-memory.dmp upx C:\Windows\SysWOW64\shell.exe upx behavioral2/memory/4868-487-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2836-336-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3536-493-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2412-490-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2860-294-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/368-501-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Adds Run key to start application 2 TTPs 40 IoCs
Processes:
WINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXE4k51k4.exeSMSS.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exeIExplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" LSASS.EXE -
Drops desktop.ini file(s) 4 IoCs
Processes:
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exedescription ioc process File opened for modification F:\desktop.ini 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File created F:\desktop.ini 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened for modification C:\desktop.ini 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File created C:\desktop.ini 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exeWINLOGON.EXECSRSS.EXE4k51k4.exeSERVICES.EXELSASS.EXEIExplorer.exeSMSS.EXEdescription ioc process File opened (read-only) \??\M: 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened (read-only) \??\K: WINLOGON.EXE File opened (read-only) \??\R: WINLOGON.EXE File opened (read-only) \??\Z: CSRSS.EXE File opened (read-only) \??\J: 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened (read-only) \??\Y: 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened (read-only) \??\O: 4k51k4.exe File opened (read-only) \??\R: 4k51k4.exe File opened (read-only) \??\O: CSRSS.EXE File opened (read-only) \??\V: CSRSS.EXE File opened (read-only) \??\S: SERVICES.EXE File opened (read-only) \??\S: LSASS.EXE File opened (read-only) \??\T: 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened (read-only) \??\U: LSASS.EXE File opened (read-only) \??\T: LSASS.EXE File opened (read-only) \??\G: IExplorer.exe File opened (read-only) \??\K: IExplorer.exe File opened (read-only) \??\T: IExplorer.exe File opened (read-only) \??\U: WINLOGON.EXE File opened (read-only) \??\S: CSRSS.EXE File opened (read-only) \??\E: 4k51k4.exe File opened (read-only) \??\J: IExplorer.exe File opened (read-only) \??\H: LSASS.EXE File opened (read-only) \??\T: SMSS.EXE File opened (read-only) \??\E: 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened (read-only) \??\X: WINLOGON.EXE File opened (read-only) \??\V: 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened (read-only) \??\S: 4k51k4.exe File opened (read-only) \??\Q: IExplorer.exe File opened (read-only) \??\V: IExplorer.exe File opened (read-only) \??\T: WINLOGON.EXE File opened (read-only) \??\Z: WINLOGON.EXE File opened (read-only) \??\Q: CSRSS.EXE File opened (read-only) \??\L: LSASS.EXE File opened (read-only) \??\K: 4k51k4.exe File opened (read-only) \??\X: SMSS.EXE File opened (read-only) \??\W: 4k51k4.exe File opened (read-only) \??\X: 4k51k4.exe File opened (read-only) \??\B: IExplorer.exe File opened (read-only) \??\H: WINLOGON.EXE File opened (read-only) \??\M: WINLOGON.EXE File opened (read-only) \??\B: CSRSS.EXE File opened (read-only) \??\U: CSRSS.EXE File opened (read-only) \??\N: 4k51k4.exe File opened (read-only) \??\L: SMSS.EXE File opened (read-only) \??\W: CSRSS.EXE File opened (read-only) \??\V: SMSS.EXE File opened (read-only) \??\Z: LSASS.EXE File opened (read-only) \??\Y: IExplorer.exe File opened (read-only) \??\I: LSASS.EXE File opened (read-only) \??\B: SMSS.EXE File opened (read-only) \??\H: SMSS.EXE File opened (read-only) \??\R: IExplorer.exe File opened (read-only) \??\Y: CSRSS.EXE File opened (read-only) \??\W: LSASS.EXE File opened (read-only) \??\I: CSRSS.EXE File opened (read-only) \??\Y: 4k51k4.exe File opened (read-only) \??\U: IExplorer.exe File opened (read-only) \??\G: WINLOGON.EXE File opened (read-only) \??\L: WINLOGON.EXE File opened (read-only) \??\J: CSRSS.EXE File opened (read-only) \??\B: LSASS.EXE File opened (read-only) \??\V: LSASS.EXE File opened (read-only) \??\G: 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe -
Drops file in System32 directory 53 IoCs
Processes:
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exeIExplorer.exeWINLOGON.EXEIExplorer.exeIExplorer.exeCSRSS.EXELSASS.EXESMSS.EXE4k51k4.exeSERVICES.EXEIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exedescription ioc process File created C:\Windows\SysWOW64\IExplorer.exe 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe WINLOGON.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe WINLOGON.EXE File created C:\Windows\SysWOW64\shell.exe CSRSS.EXE File created C:\Windows\SysWOW64\IExplorer.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe SMSS.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe 4k51k4.exe File created C:\Windows\SysWOW64\IExplorer.exe SERVICES.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\shell.exe CSRSS.EXE File opened for modification C:\Windows\SysWOW64\shell.exe LSASS.EXE File created C:\Windows\SysWOW64\IExplorer.exe SMSS.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe SERVICES.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\MrHelloween.scr 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe 4k51k4.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe SMSS.EXE File opened for modification C:\Windows\SysWOW64\shell.exe 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe 4k51k4.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe WINLOGON.EXE File opened for modification C:\Windows\SysWOW64\MrHelloween.scr SERVICES.EXE File opened for modification C:\Windows\SysWOW64\MrHelloween.scr IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe CSRSS.EXE File opened for modification C:\Windows\SysWOW64\MrHelloween.scr SMSS.EXE File created C:\Windows\SysWOW64\IExplorer.exe CSRSS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr LSASS.EXE File created C:\Windows\SysWOW64\shell.exe 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr 4k51k4.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr WINLOGON.EXE File opened for modification C:\Windows\SysWOW64\MrHelloween.scr CSRSS.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe SERVICES.EXE -
Drops file in Windows directory 34 IoCs
Processes:
IExplorer.exeSERVICES.EXELSASS.EXEIExplorer.exeWINLOGON.EXECSRSS.EXEIExplorer.exeIExplorer.exeIExplorer.exeIExplorer.exe4k51k4.exeIExplorer.exeIExplorer.exeIExplorer.exeSMSS.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exedescription ioc process File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe SERVICES.EXE File created C:\Windows\4k51k4.exe LSASS.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe WINLOGON.EXE File created C:\Windows\4k51k4.exe CSRSS.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe LSASS.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe 4k51k4.exe File created C:\Windows\4k51k4.exe 4k51k4.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe SMSS.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File created C:\Windows\4k51k4.exe 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe WINLOGON.EXE File opened for modification C:\Windows\4k51k4.exe CSRSS.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe SERVICES.EXE File opened for modification C:\Windows\4k51k4.exe SMSS.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe -
Modifies Control Panel 32 IoCs
Processes:
4k51k4.exeLSASS.EXESMSS.EXEIExplorer.exeCSRSS.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exeSERVICES.EXEWINLOGON.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 4k51k4.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 4k51k4.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SERVICES.EXE -
Modifies registry class 64 IoCs
Processes:
WINLOGON.EXECSRSS.EXE4k51k4.exeIExplorer.exeSERVICES.EXE352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exeLSASS.EXESMSS.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
Notepad.exepid process 2688 Notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exepid process 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 7 IoCs
Processes:
4k51k4.exeCSRSS.EXEWINLOGON.EXEIExplorer.exeSERVICES.EXELSASS.EXESMSS.EXEpid process 3728 4k51k4.exe 3016 CSRSS.EXE 2060 WINLOGON.EXE 4944 IExplorer.exe 5040 SERVICES.EXE 3240 LSASS.EXE 956 SMSS.EXE -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe4k51k4.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXE4k51k4.exeIExplorer.exe4k51k4.exeWINLOGON.EXECSRSS.EXEIExplorer.exeSERVICES.EXEWINLOGON.EXELSASS.EXECSRSS.EXESERVICES.EXESMSS.EXELSASS.EXESMSS.EXE4k51k4.exeIExplorer.exeLSASS.EXESMSS.EXEWINLOGON.EXE4k51k4.exeIExplorer.exeCSRSS.EXE4k51k4.exeWINLOGON.EXEIExplorer.exeSERVICES.EXECSRSS.EXEWINLOGON.EXELSASS.EXECSRSS.EXESERVICES.EXESMSS.EXESERVICES.EXELSASS.EXELSASS.EXESMSS.EXESMSS.EXE4k51k4.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXE4k51k4.exeIExplorer.exeWINLOGON.EXE4k51k4.exeCSRSS.EXEIExplorer.exeSERVICES.EXEWINLOGON.EXELSASS.EXECSRSS.EXESMSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 3728 4k51k4.exe 4944 IExplorer.exe 2060 WINLOGON.EXE 3016 CSRSS.EXE 5040 SERVICES.EXE 1148 4k51k4.exe 2888 IExplorer.exe 4004 4k51k4.exe 1472 WINLOGON.EXE 2380 CSRSS.EXE 3976 IExplorer.exe 3900 SERVICES.EXE 4444 WINLOGON.EXE 3240 LSASS.EXE 4620 CSRSS.EXE 1316 SERVICES.EXE 956 SMSS.EXE 2860 LSASS.EXE 2272 SMSS.EXE 2836 4k51k4.exe 5088 IExplorer.exe 1776 LSASS.EXE 4136 SMSS.EXE 4824 WINLOGON.EXE 3448 4k51k4.exe 860 IExplorer.exe 780 CSRSS.EXE 1400 4k51k4.exe 3524 WINLOGON.EXE 1136 IExplorer.exe 1820 SERVICES.EXE 820 CSRSS.EXE 664 WINLOGON.EXE 4084 LSASS.EXE 1540 CSRSS.EXE 3820 SERVICES.EXE 4908 SMSS.EXE 3912 SERVICES.EXE 3748 LSASS.EXE 5092 LSASS.EXE 2900 SMSS.EXE 1552 SMSS.EXE 2936 4k51k4.exe 4932 IExplorer.exe 1336 WINLOGON.EXE 4868 CSRSS.EXE 2412 SERVICES.EXE 3536 LSASS.EXE 368 SMSS.EXE 4708 4k51k4.exe 1360 IExplorer.exe 4380 WINLOGON.EXE 3280 4k51k4.exe 3608 CSRSS.EXE 392 IExplorer.exe 3644 SERVICES.EXE 1316 WINLOGON.EXE 1340 LSASS.EXE 1588 CSRSS.EXE 3012 SMSS.EXE 2860 SERVICES.EXE 4592 LSASS.EXE 3312 SMSS.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe4k51k4.exeIExplorer.exedescription pid process target process PID 4528 wrote to memory of 3728 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 4k51k4.exe PID 4528 wrote to memory of 3728 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 4k51k4.exe PID 4528 wrote to memory of 3728 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 4k51k4.exe PID 3728 wrote to memory of 2688 3728 4k51k4.exe Notepad.exe PID 3728 wrote to memory of 2688 3728 4k51k4.exe Notepad.exe PID 4528 wrote to memory of 4944 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe IExplorer.exe PID 4528 wrote to memory of 4944 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe IExplorer.exe PID 4528 wrote to memory of 4944 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe IExplorer.exe PID 4528 wrote to memory of 2060 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe WINLOGON.EXE PID 4528 wrote to memory of 2060 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe WINLOGON.EXE PID 4528 wrote to memory of 2060 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe WINLOGON.EXE PID 4528 wrote to memory of 3016 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe CSRSS.EXE PID 4528 wrote to memory of 3016 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe CSRSS.EXE PID 4528 wrote to memory of 3016 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe CSRSS.EXE PID 4528 wrote to memory of 5040 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SERVICES.EXE PID 4528 wrote to memory of 5040 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SERVICES.EXE PID 4528 wrote to memory of 5040 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SERVICES.EXE PID 4528 wrote to memory of 1148 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 4k51k4.exe PID 4528 wrote to memory of 1148 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 4k51k4.exe PID 4528 wrote to memory of 1148 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe 4k51k4.exe PID 4528 wrote to memory of 2888 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe IExplorer.exe PID 4528 wrote to memory of 2888 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe IExplorer.exe PID 4528 wrote to memory of 2888 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe IExplorer.exe PID 4528 wrote to memory of 1472 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe WINLOGON.EXE PID 4528 wrote to memory of 1472 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe WINLOGON.EXE PID 4528 wrote to memory of 1472 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe WINLOGON.EXE PID 3728 wrote to memory of 4004 3728 4k51k4.exe 4k51k4.exe PID 3728 wrote to memory of 4004 3728 4k51k4.exe 4k51k4.exe PID 3728 wrote to memory of 4004 3728 4k51k4.exe 4k51k4.exe PID 3728 wrote to memory of 3976 3728 4k51k4.exe IExplorer.exe PID 3728 wrote to memory of 3976 3728 4k51k4.exe IExplorer.exe PID 3728 wrote to memory of 3976 3728 4k51k4.exe IExplorer.exe PID 4528 wrote to memory of 2380 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe CSRSS.EXE PID 4528 wrote to memory of 2380 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe CSRSS.EXE PID 4528 wrote to memory of 2380 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe CSRSS.EXE PID 4528 wrote to memory of 3900 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SERVICES.EXE PID 4528 wrote to memory of 3900 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SERVICES.EXE PID 4528 wrote to memory of 3900 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SERVICES.EXE PID 3728 wrote to memory of 4444 3728 4k51k4.exe WINLOGON.EXE PID 3728 wrote to memory of 4444 3728 4k51k4.exe WINLOGON.EXE PID 3728 wrote to memory of 4444 3728 4k51k4.exe WINLOGON.EXE PID 4528 wrote to memory of 3240 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe LSASS.EXE PID 4528 wrote to memory of 3240 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe LSASS.EXE PID 4528 wrote to memory of 3240 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe LSASS.EXE PID 3728 wrote to memory of 4620 3728 4k51k4.exe CSRSS.EXE PID 3728 wrote to memory of 4620 3728 4k51k4.exe CSRSS.EXE PID 3728 wrote to memory of 4620 3728 4k51k4.exe CSRSS.EXE PID 3728 wrote to memory of 1316 3728 4k51k4.exe WINLOGON.EXE PID 3728 wrote to memory of 1316 3728 4k51k4.exe WINLOGON.EXE PID 3728 wrote to memory of 1316 3728 4k51k4.exe WINLOGON.EXE PID 4528 wrote to memory of 956 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SMSS.EXE PID 4528 wrote to memory of 956 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SMSS.EXE PID 4528 wrote to memory of 956 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe SMSS.EXE PID 3728 wrote to memory of 2860 3728 4k51k4.exe SERVICES.EXE PID 3728 wrote to memory of 2860 3728 4k51k4.exe SERVICES.EXE PID 3728 wrote to memory of 2860 3728 4k51k4.exe SERVICES.EXE PID 3728 wrote to memory of 2272 3728 4k51k4.exe SMSS.EXE PID 3728 wrote to memory of 2272 3728 4k51k4.exe SMSS.EXE PID 3728 wrote to memory of 2272 3728 4k51k4.exe SMSS.EXE PID 4944 wrote to memory of 2836 4944 IExplorer.exe 4k51k4.exe PID 4944 wrote to memory of 2836 4944 IExplorer.exe 4k51k4.exe PID 4944 wrote to memory of 2836 4944 IExplorer.exe 4k51k4.exe PID 4528 wrote to memory of 1776 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe LSASS.EXE PID 4528 wrote to memory of 1776 4528 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe LSASS.EXE -
System policy modification 1 TTPs 40 IoCs
Processes:
SMSS.EXEWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXE4k51k4.exe352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exeIExplorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer IExplorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\Notepad.exeNotepad.exe C:\Puisi.txt3⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Modify Registry
6Hide Artifacts
2Hidden Files and Directories
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\4k51k4.exeFilesize
91KB
MD5c896b31a412d7ffb5131fc60a9740613
SHA11da741b1654b870c8e80c995874a9de6a6e745fa
SHA256c6166baf3ffbab587c10dd25b05399d8976ac954290e713dd9761f22015b9510
SHA51292382c26bd8e57752992bbb1e8f8aa72f2b178b45da1185287ae10574308a78c198e3d7092aa79dfa2a5baf60541109295f15fa913eedef6a528e6992ca85cce
-
C:\Puisi.txtFilesize
442B
MD5001424d7974b9a3995af292f6fcfe171
SHA1f8201d49d594d712c8450679c856c2e8307d2337
SHA256660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d
SHA51266ec4330b9a9961a2926516ec96d71e3311f67a61e6ac3070303453d26fa4fdc9524296f583c0e2179414f1a0d795cedbd094a83f5ecd3f1faa0cccfe4276657
-
C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXEFilesize
91KB
MD505a359da0220bd90075e3c5696eae200
SHA17ff58871de5528510baffd157d6d2279bec30428
SHA256dd979d7eb25bf86d485b6e36b8cd1194d45824d00b7f087fc5e8775cd965ece8
SHA512edef1687c7f4134bc48d8e51bde83cb3596108993d5ba29734bc730ea5e06ee984f0cabb8235a3986fff1f0c02942a02227c5ac9f295b60b70d3516d21d5ede6
-
C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXEFilesize
91KB
MD58c09475dbdebcee5e244960990914eec
SHA13b6b14292cd7331bfc96f6fafdcb376307374e77
SHA256600c95840f31828ef732b92e34d4543a8f62cb6afb66e6667d0089f343b6cffc
SHA5122c74a7118e64c151d9dbb5d56845f31bfc501bd0b97677cb26182991f6070cda0bed65817ca4af90eff0cc3ea0d65ff938b0c4c4ec18aecdf320138919302505
-
C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXEFilesize
91KB
MD52d3326b7a3887fa220971c5f6508356f
SHA13f5821c7e03ec311633e2da952af5c75a91c6998
SHA25619ff08c0eedcebd6143c99a4393790de4e47d92cfdfd8df2e5c96560b751d502
SHA512a8a84963d1b8a172b35f76ae2a67e8ca9fa62116ad46d0914c2fa80ede624e43a8d0e41e0bec82ef8cf7a0fac17c3d6154931a666a883ee585ba2936de43e604
-
C:\Users\Admin\AppData\Local\winlogon.exeFilesize
91KB
MD58817bdfda92eb788f989aa5305311820
SHA1c02ad0c8f7faaa7510c73796810e9c0e1cbd76e3
SHA256352ee5de7da7becfa320a4ad277e8dfb44d989ce706539302df6c14fbf2d353e
SHA5121ccf67b7b111c0f6d7b2c2025699510c7b3f2e5bc01673808839d5228320adf04c0b0f304730040499265593945f10e3e1f3f2f5c4e4c70273315dcd18f82898
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.exeFilesize
91KB
MD56da6065fc338873c10044c9a252214f8
SHA1a08c305be86b136e620f5f639436107facc269fd
SHA256ab9c5b6f383df2c9ba0dee457b58541dad9946cac5a38ad9b3f2ec9291cc9179
SHA5120156ac1597b84e28560ebda43bc4b27c2b6d60f344b8273b78f7e90fa81494a7e94d41f632ea19214a72e0b2ee1dc5fabdcf05d6c00380a13a74e5a85c388027
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXEFilesize
91KB
MD54f7abb248a5a48f0df44ba9c95069599
SHA1daf85f46ef7674b09f5aa40d701997233d5fe753
SHA2563fca2fa5ecc1bd38de94daa50fc9e9a1a136e53ffb1e64a680d25cb0401a61d7
SHA512be3d292bff23c27f1d2ef5ede658fded010630fbd5c855aa41437b43afc2657af179f080abe71e734b46614f6bfe9c525d8525140afa74bc85b7bd2650fadbaa
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXEFilesize
91KB
MD58d53fd16ad34d8d130ea8b205c425af4
SHA171284904d6fefe8b652eeb941956a83d4a019b20
SHA256c98c7794cc98c12b9d5dc676ce8c523d0a46a79599753805b616c0e5f1969acf
SHA512f27ff3c9a7aea668eb80b19780fa02982bae251d6036f0a5c1f7a7a0e947bec7c7e701f60e0f53f4cd19dd107c38921a35863e013b7491c4818cd91133544c53
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXEFilesize
91KB
MD5d52eed41cdf332d4db2c9e7fbec6300f
SHA1fce4bfac2502ecb17dcf1b57c95d2f63169e5b6e
SHA2565eda23ca78d6a6063453cddc3ef641580a7784bf0058f0c15339dca1531c3bad
SHA512820be5d192656fdf5ae9d45b2b1e7bbb476c5b1ea70d7c1a2cf6e7e7c058ff432f731dfea596d2ba2b94e3d5736b9a185f990cb9625f28317fdbbfda53805813
-
C:\Users\All Users\Start Menu\Programs\Startup\Empty.pifFilesize
91KB
MD56ee28b1857fbb1a5c6dce9ed607c1129
SHA1f80191232e5ab7d985b41a456744d2186db97576
SHA256468f85aaf2cd7195e689e0803781a2fcbf8ffa16d56a18af4c24ed34e6e67aff
SHA51219af1f698e62c7fa0e35b9fb6a252ad6caab5a602e90f9f944c73a0e29a688a362416cffe73057c0105319b7b90a8410b689625f20555f041a94308f63eb5b44
-
C:\Windows\4k51k4.exeFilesize
91KB
MD51289d9791bf532bd9008406dd518af45
SHA11c950ec69b1cd8023759d3eb0a24a938668757f4
SHA2563b2d31191fbf6e0f90bc1eefb2c61deb14b0a0467c1e88557478864ee14d2354
SHA51250995e21816559579adbaaf0fa00afb7036f6e66e958a3c26b2536d23fb61033b19caaaa980b1d05d1cb3ff751452445edf71cbae404d6f228fd554af3037a77
-
C:\Windows\MSVBVM60.DLLFilesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
C:\Windows\SysWOW64\IExplorer.exeFilesize
91KB
MD53232345390d40bf633b247a68a09a2cd
SHA14c516dc4f6bfae0a643a6a5730e1f1b8759ed7d5
SHA256fbb83fe1bfa3b2e2eae55cd06187523a6f784629aeede17b8e9502e4845b92e9
SHA512c7fd79519731402b72da46f527466928219f02a03eb801aa6dc22f447bb3ed4ab20dadbf6f663cdcbc6daa2b0d03e250428d17e2f764aa73508c032efeb5198f
-
C:\Windows\SysWOW64\MrHelloween.scrFilesize
91KB
MD5001caf3fb6b9889e5aa195a399c15ee0
SHA10f68c03031770ce5c81b1df7f35f0ce1fb30dc69
SHA256fe948d5a6a71eaa21297ae74becb95399bf2f8cc23dd84127732792effb09f64
SHA5126cecaca7a4ca86b1c3339a0deeda71ab8e5f8d55d6f892d495c92665a914632ef2c357a6ef9766e2171d64220f70666ec199c7e97da476f5bdef854a0142679d
-
C:\Windows\SysWOW64\shell.exeFilesize
91KB
MD582a465ee3815377a57c4122b1006a3f7
SHA1795c762ab1edde96a7cc6c50d6a54d2ccbddcbdf
SHA25642958b462d2d6a6d8a6ea6d9e294add5ba55635e2307a596027daf41beb95355
SHA5125d9beae24c20b608c8e27c461890867924d182f25d82cb22b29c6db52d1304c1b500b8e1420ea7da1a4220940f9c770be18fb0a0648106561ee2c993d013cc6b
-
C:\Windows\SysWOW64\shell.exeFilesize
91KB
MD569799760b9c6cfbe55039340fe6ab4e2
SHA1ca9da6390c774aedf86051379870a154cfcd6f62
SHA256dbf9e43bc269051c15a6a9ca7045c476cdc90e7dd41785ef648f245273208919
SHA5121dcbe36a680f116ef17b5bd62047ccb737c58b797122bc0b3b0eecc050c09f6ef95e9595e9bb22164155fb2d27c4397779da16a9c3dbbe076e5317f3449e85fc
-
memory/368-501-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/392-550-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/664-430-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/860-405-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/956-417-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/956-587-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1136-419-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1148-174-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1316-558-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1316-275-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1336-484-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1360-529-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1400-408-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1472-223-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1552-475-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1588-567-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1776-354-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1820-423-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2060-241-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2060-583-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2060-125-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2272-338-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2380-233-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2380-226-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2412-490-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2836-336-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2860-573-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2860-294-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2888-177-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2900-472-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2936-477-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3012-571-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3016-250-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3016-584-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3240-394-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3240-586-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3280-542-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3312-580-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3448-393-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3524-411-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3524-416-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3536-493-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3608-548-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3644-556-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3728-225-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3728-581-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3820-441-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3900-242-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3912-451-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3976-237-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4004-213-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4004-221-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4084-434-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4136-379-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4380-540-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4444-249-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4528-0-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4528-382-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4528-219-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4592-577-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4620-258-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4708-514-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4824-384-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4868-487-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4908-448-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4932-480-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4944-234-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/4944-582-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/5040-254-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/5040-585-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/5088-356-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/5092-460-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB