Analysis
-
max time kernel
149s -
max time network
68s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 03:44
Static task
static1
Behavioral task
behavioral1
Sample
3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe
-
Size
79KB
-
MD5
30f794a31659eaa8fab0b44b4b62e920
-
SHA1
33f4072791196d52f5138b484721cdb9e24c8404
-
SHA256
3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b
-
SHA512
e215685424d555f02dd94c1de03f0e0e63e8ad14007e4e291e60d3b5eb7dda336aec0e590462b96c86e8737b0655a248d7f9fbfd757c187350e7bd5be493acb6
-
SSDEEP
768:4vw9816vhKQLroX4/wQpWMZ3XOQ69zbjlAAX5e9zz:wEGh0oXloWMZ3izbR9Xwzz
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
{DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe{917BEDF7-A9F6-4002-813B-A34985696207}.exe{1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe{3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exe3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe{7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe{73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe{71D87664-75BB-4110-B7A2-A7B079161377}.exe{A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe{31B89CD1-5987-44a8-9676-A7E2B003A772}.exe{C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe{F1D91755-1CD8-4731-A202-FB7059980A64}.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F1D91755-1CD8-4731-A202-FB7059980A64}\stubpath = "C:\\Windows\\{F1D91755-1CD8-4731-A202-FB7059980A64}.exe" {DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7EF6EA86-54FC-460b-80AF-8408941F6E80} {917BEDF7-A9F6-4002-813B-A34985696207}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C86C31D2-003D-4282-87A1-C4DFE9AE279C} {1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C86C31D2-003D-4282-87A1-C4DFE9AE279C}\stubpath = "C:\\Windows\\{C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe" {1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69E833F7-13B7-442b-ADBE-1547A7DBD8F9}\stubpath = "C:\\Windows\\{69E833F7-13B7-442b-ADBE-1547A7DBD8F9}.exe" {3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DFFA42A0-0759-43d7-BFB6-E1EE294D514E}\stubpath = "C:\\Windows\\{DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe" 3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7EF6EA86-54FC-460b-80AF-8408941F6E80}\stubpath = "C:\\Windows\\{7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe" {917BEDF7-A9F6-4002-813B-A34985696207}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{73F0AB07-9C5B-41a0-A034-73ED948B0642} {7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{31B89CD1-5987-44a8-9676-A7E2B003A772} {73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{31B89CD1-5987-44a8-9676-A7E2B003A772}\stubpath = "C:\\Windows\\{31B89CD1-5987-44a8-9676-A7E2B003A772}.exe" {73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A3CAB53F-5E38-47bf-9914-E1510BB9B05E} {71D87664-75BB-4110-B7A2-A7B079161377}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3EE329E8-84DA-4ca6-A9C7-124BB93EB83C} {A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}\stubpath = "C:\\Windows\\{3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exe" {A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DFFA42A0-0759-43d7-BFB6-E1EE294D514E} 3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}\stubpath = "C:\\Windows\\{1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe" {31B89CD1-5987-44a8-9676-A7E2B003A772}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{71D87664-75BB-4110-B7A2-A7B079161377}\stubpath = "C:\\Windows\\{71D87664-75BB-4110-B7A2-A7B079161377}.exe" {C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A3CAB53F-5E38-47bf-9914-E1510BB9B05E}\stubpath = "C:\\Windows\\{A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe" {71D87664-75BB-4110-B7A2-A7B079161377}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69E833F7-13B7-442b-ADBE-1547A7DBD8F9} {3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F1D91755-1CD8-4731-A202-FB7059980A64} {DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{917BEDF7-A9F6-4002-813B-A34985696207}\stubpath = "C:\\Windows\\{917BEDF7-A9F6-4002-813B-A34985696207}.exe" {F1D91755-1CD8-4731-A202-FB7059980A64}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{73F0AB07-9C5B-41a0-A034-73ED948B0642}\stubpath = "C:\\Windows\\{73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe" {7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F} {31B89CD1-5987-44a8-9676-A7E2B003A772}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{71D87664-75BB-4110-B7A2-A7B079161377} {C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{917BEDF7-A9F6-4002-813B-A34985696207} {F1D91755-1CD8-4731-A202-FB7059980A64}.exe -
Executes dropped EXE 12 IoCs
Processes:
{DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe{F1D91755-1CD8-4731-A202-FB7059980A64}.exe{917BEDF7-A9F6-4002-813B-A34985696207}.exe{7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe{73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe{31B89CD1-5987-44a8-9676-A7E2B003A772}.exe{1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe{C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe{71D87664-75BB-4110-B7A2-A7B079161377}.exe{A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe{3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exe{69E833F7-13B7-442b-ADBE-1547A7DBD8F9}.exepid process 1596 {DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe 4572 {F1D91755-1CD8-4731-A202-FB7059980A64}.exe 3000 {917BEDF7-A9F6-4002-813B-A34985696207}.exe 2724 {7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe 1844 {73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe 2920 {31B89CD1-5987-44a8-9676-A7E2B003A772}.exe 4920 {1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe 2948 {C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe 388 {71D87664-75BB-4110-B7A2-A7B079161377}.exe 3368 {A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe 3776 {3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exe 4476 {69E833F7-13B7-442b-ADBE-1547A7DBD8F9}.exe -
Drops file in Windows directory 12 IoCs
Processes:
{73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe{1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe{C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe{A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe{DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe{F1D91755-1CD8-4731-A202-FB7059980A64}.exe{917BEDF7-A9F6-4002-813B-A34985696207}.exe{3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exe{7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe{31B89CD1-5987-44a8-9676-A7E2B003A772}.exe{71D87664-75BB-4110-B7A2-A7B079161377}.exedescription ioc process File created C:\Windows\{31B89CD1-5987-44a8-9676-A7E2B003A772}.exe {73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe File created C:\Windows\{C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe {1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe File created C:\Windows\{71D87664-75BB-4110-B7A2-A7B079161377}.exe {C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe File created C:\Windows\{3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exe {A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe File created C:\Windows\{DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe 3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe File created C:\Windows\{F1D91755-1CD8-4731-A202-FB7059980A64}.exe {DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe File created C:\Windows\{917BEDF7-A9F6-4002-813B-A34985696207}.exe {F1D91755-1CD8-4731-A202-FB7059980A64}.exe File created C:\Windows\{7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe {917BEDF7-A9F6-4002-813B-A34985696207}.exe File created C:\Windows\{69E833F7-13B7-442b-ADBE-1547A7DBD8F9}.exe {3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exe File created C:\Windows\{73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe {7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe File created C:\Windows\{1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe {31B89CD1-5987-44a8-9676-A7E2B003A772}.exe File created C:\Windows\{A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe {71D87664-75BB-4110-B7A2-A7B079161377}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe{DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe{F1D91755-1CD8-4731-A202-FB7059980A64}.exe{917BEDF7-A9F6-4002-813B-A34985696207}.exe{7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe{73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe{31B89CD1-5987-44a8-9676-A7E2B003A772}.exe{1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe{C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe{71D87664-75BB-4110-B7A2-A7B079161377}.exe{A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe{3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exedescription pid process Token: SeIncBasePriorityPrivilege 1808 3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe Token: SeIncBasePriorityPrivilege 1596 {DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe Token: SeIncBasePriorityPrivilege 4572 {F1D91755-1CD8-4731-A202-FB7059980A64}.exe Token: SeIncBasePriorityPrivilege 3000 {917BEDF7-A9F6-4002-813B-A34985696207}.exe Token: SeIncBasePriorityPrivilege 2724 {7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe Token: SeIncBasePriorityPrivilege 1844 {73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe Token: SeIncBasePriorityPrivilege 2920 {31B89CD1-5987-44a8-9676-A7E2B003A772}.exe Token: SeIncBasePriorityPrivilege 4920 {1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe Token: SeIncBasePriorityPrivilege 2948 {C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe Token: SeIncBasePriorityPrivilege 388 {71D87664-75BB-4110-B7A2-A7B079161377}.exe Token: SeIncBasePriorityPrivilege 3368 {A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe Token: SeIncBasePriorityPrivilege 3776 {3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe{DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe{F1D91755-1CD8-4731-A202-FB7059980A64}.exe{917BEDF7-A9F6-4002-813B-A34985696207}.exe{7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe{73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe{31B89CD1-5987-44a8-9676-A7E2B003A772}.exe{1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe{C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe{71D87664-75BB-4110-B7A2-A7B079161377}.exe{A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exedescription pid process target process PID 1808 wrote to memory of 1596 1808 3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe {DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe PID 1808 wrote to memory of 1596 1808 3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe {DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe PID 1808 wrote to memory of 1596 1808 3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe {DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe PID 1808 wrote to memory of 3708 1808 3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe cmd.exe PID 1808 wrote to memory of 3708 1808 3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe cmd.exe PID 1808 wrote to memory of 3708 1808 3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe cmd.exe PID 1596 wrote to memory of 4572 1596 {DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe {F1D91755-1CD8-4731-A202-FB7059980A64}.exe PID 1596 wrote to memory of 4572 1596 {DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe {F1D91755-1CD8-4731-A202-FB7059980A64}.exe PID 1596 wrote to memory of 4572 1596 {DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe {F1D91755-1CD8-4731-A202-FB7059980A64}.exe PID 1596 wrote to memory of 3088 1596 {DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe cmd.exe PID 1596 wrote to memory of 3088 1596 {DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe cmd.exe PID 1596 wrote to memory of 3088 1596 {DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe cmd.exe PID 4572 wrote to memory of 3000 4572 {F1D91755-1CD8-4731-A202-FB7059980A64}.exe {917BEDF7-A9F6-4002-813B-A34985696207}.exe PID 4572 wrote to memory of 3000 4572 {F1D91755-1CD8-4731-A202-FB7059980A64}.exe {917BEDF7-A9F6-4002-813B-A34985696207}.exe PID 4572 wrote to memory of 3000 4572 {F1D91755-1CD8-4731-A202-FB7059980A64}.exe {917BEDF7-A9F6-4002-813B-A34985696207}.exe PID 4572 wrote to memory of 1996 4572 {F1D91755-1CD8-4731-A202-FB7059980A64}.exe cmd.exe PID 4572 wrote to memory of 1996 4572 {F1D91755-1CD8-4731-A202-FB7059980A64}.exe cmd.exe PID 4572 wrote to memory of 1996 4572 {F1D91755-1CD8-4731-A202-FB7059980A64}.exe cmd.exe PID 3000 wrote to memory of 2724 3000 {917BEDF7-A9F6-4002-813B-A34985696207}.exe {7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe PID 3000 wrote to memory of 2724 3000 {917BEDF7-A9F6-4002-813B-A34985696207}.exe {7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe PID 3000 wrote to memory of 2724 3000 {917BEDF7-A9F6-4002-813B-A34985696207}.exe {7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe PID 3000 wrote to memory of 3064 3000 {917BEDF7-A9F6-4002-813B-A34985696207}.exe cmd.exe PID 3000 wrote to memory of 3064 3000 {917BEDF7-A9F6-4002-813B-A34985696207}.exe cmd.exe PID 3000 wrote to memory of 3064 3000 {917BEDF7-A9F6-4002-813B-A34985696207}.exe cmd.exe PID 2724 wrote to memory of 1844 2724 {7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe {73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe PID 2724 wrote to memory of 1844 2724 {7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe {73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe PID 2724 wrote to memory of 1844 2724 {7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe {73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe PID 2724 wrote to memory of 3656 2724 {7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe cmd.exe PID 2724 wrote to memory of 3656 2724 {7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe cmd.exe PID 2724 wrote to memory of 3656 2724 {7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe cmd.exe PID 1844 wrote to memory of 2920 1844 {73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe {31B89CD1-5987-44a8-9676-A7E2B003A772}.exe PID 1844 wrote to memory of 2920 1844 {73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe {31B89CD1-5987-44a8-9676-A7E2B003A772}.exe PID 1844 wrote to memory of 2920 1844 {73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe {31B89CD1-5987-44a8-9676-A7E2B003A772}.exe PID 1844 wrote to memory of 1168 1844 {73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe cmd.exe PID 1844 wrote to memory of 1168 1844 {73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe cmd.exe PID 1844 wrote to memory of 1168 1844 {73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe cmd.exe PID 2920 wrote to memory of 4920 2920 {31B89CD1-5987-44a8-9676-A7E2B003A772}.exe {1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe PID 2920 wrote to memory of 4920 2920 {31B89CD1-5987-44a8-9676-A7E2B003A772}.exe {1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe PID 2920 wrote to memory of 4920 2920 {31B89CD1-5987-44a8-9676-A7E2B003A772}.exe {1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe PID 2920 wrote to memory of 1764 2920 {31B89CD1-5987-44a8-9676-A7E2B003A772}.exe cmd.exe PID 2920 wrote to memory of 1764 2920 {31B89CD1-5987-44a8-9676-A7E2B003A772}.exe cmd.exe PID 2920 wrote to memory of 1764 2920 {31B89CD1-5987-44a8-9676-A7E2B003A772}.exe cmd.exe PID 4920 wrote to memory of 2948 4920 {1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe {C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe PID 4920 wrote to memory of 2948 4920 {1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe {C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe PID 4920 wrote to memory of 2948 4920 {1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe {C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe PID 4920 wrote to memory of 864 4920 {1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe cmd.exe PID 4920 wrote to memory of 864 4920 {1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe cmd.exe PID 4920 wrote to memory of 864 4920 {1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe cmd.exe PID 2948 wrote to memory of 388 2948 {C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe {71D87664-75BB-4110-B7A2-A7B079161377}.exe PID 2948 wrote to memory of 388 2948 {C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe {71D87664-75BB-4110-B7A2-A7B079161377}.exe PID 2948 wrote to memory of 388 2948 {C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe {71D87664-75BB-4110-B7A2-A7B079161377}.exe PID 2948 wrote to memory of 4344 2948 {C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe cmd.exe PID 2948 wrote to memory of 4344 2948 {C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe cmd.exe PID 2948 wrote to memory of 4344 2948 {C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe cmd.exe PID 388 wrote to memory of 3368 388 {71D87664-75BB-4110-B7A2-A7B079161377}.exe {A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe PID 388 wrote to memory of 3368 388 {71D87664-75BB-4110-B7A2-A7B079161377}.exe {A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe PID 388 wrote to memory of 3368 388 {71D87664-75BB-4110-B7A2-A7B079161377}.exe {A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe PID 388 wrote to memory of 2068 388 {71D87664-75BB-4110-B7A2-A7B079161377}.exe cmd.exe PID 388 wrote to memory of 2068 388 {71D87664-75BB-4110-B7A2-A7B079161377}.exe cmd.exe PID 388 wrote to memory of 2068 388 {71D87664-75BB-4110-B7A2-A7B079161377}.exe cmd.exe PID 3368 wrote to memory of 3776 3368 {A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe {3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exe PID 3368 wrote to memory of 3776 3368 {A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe {3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exe PID 3368 wrote to memory of 3776 3368 {A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe {3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exe PID 3368 wrote to memory of 3176 3368 {A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3307bdebd55d47753e1ee05fdf7d8df4452eb7eea54136f144ff25c1ea6a295b_NeikiAnalytics.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exeC:\Windows\{DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{F1D91755-1CD8-4731-A202-FB7059980A64}.exeC:\Windows\{F1D91755-1CD8-4731-A202-FB7059980A64}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{917BEDF7-A9F6-4002-813B-A34985696207}.exeC:\Windows\{917BEDF7-A9F6-4002-813B-A34985696207}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{7EF6EA86-54FC-460b-80AF-8408941F6E80}.exeC:\Windows\{7EF6EA86-54FC-460b-80AF-8408941F6E80}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{73F0AB07-9C5B-41a0-A034-73ED948B0642}.exeC:\Windows\{73F0AB07-9C5B-41a0-A034-73ED948B0642}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{31B89CD1-5987-44a8-9676-A7E2B003A772}.exeC:\Windows\{31B89CD1-5987-44a8-9676-A7E2B003A772}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exeC:\Windows\{1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exeC:\Windows\{C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{71D87664-75BB-4110-B7A2-A7B079161377}.exeC:\Windows\{71D87664-75BB-4110-B7A2-A7B079161377}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exeC:\Windows\{A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exeC:\Windows\{3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\{69E833F7-13B7-442b-ADBE-1547A7DBD8F9}.exeC:\Windows\{69E833F7-13B7-442b-ADBE-1547A7DBD8F9}.exe13⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3EE32~1.EXE > nul13⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A3CAB~1.EXE > nul12⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{71D87~1.EXE > nul11⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C86C3~1.EXE > nul10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1BBFF~1.EXE > nul9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{31B89~1.EXE > nul8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{73F0A~1.EXE > nul7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7EF6E~1.EXE > nul6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{917BE~1.EXE > nul5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F1D91~1.EXE > nul4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DFFA4~1.EXE > nul3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\3307BD~1.EXE > nul2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\{1BBFF7E4-BB12-4b03-85D9-3FDFED49F98F}.exeFilesize
79KB
MD58174911a2d88c0221db5b034c5c7c8c4
SHA184eb7dc484810edc4fc18f80ced7615422f84415
SHA25600ad69e39a2924310e3178af5f0280b82420b943ca0d3ba3c4ad0a75253199ff
SHA5123450367bc08d9b85aa1b2ae06df402f5540feccf088f67866676c6c6916ac98d246edb534d178c39c67f19d64d238a21e05c6cc7896f8c68a45d1c15dc96d27a
-
C:\Windows\{31B89CD1-5987-44a8-9676-A7E2B003A772}.exeFilesize
79KB
MD59ac5400cf3b708b654eb8cf964cdffc8
SHA1af1c82d75e8f9fc3fb99f3b9f0877959eca63315
SHA25653cb831ae0771c4c699270a15d71a869312ae4476302746c1b4cee2e6d24edd8
SHA512f09d0c569926bd1d1d3f194a1b17986ce88136fadf660cf34b37a16109c4c8f6726750bf695c0168c323f8d2972884b1182988d566204f6992575f5021ce4e8b
-
C:\Windows\{3EE329E8-84DA-4ca6-A9C7-124BB93EB83C}.exeFilesize
79KB
MD5035740a6a00db83e51f30d9623e7e71f
SHA175d5022eefe7c29e8bb2c8a2089f58bfc0ee18d1
SHA256c3019deae35d082c3127a6767228d81645b7a99f4e5f15683f5f63482a63561a
SHA512ff3e01cd5ae8a598ab63ae539a2ea60c99bd27a34c637d02c0459f691fb87d4b62a78ddda08897d685a36ad49ceb6ab83734ce79033a242cf99182dd3edf2607
-
C:\Windows\{69E833F7-13B7-442b-ADBE-1547A7DBD8F9}.exeFilesize
79KB
MD5102c78294f8a1c9ba678df217db431bb
SHA1dee80cafbeaac1beeef1dcaccee0f8d2c4c45560
SHA256d48e9dca9a2bf3c7a572e6c136bf926d622a559755e4c46b439680b3456ebd55
SHA512d6ccbe0b5b94c559f18209276b6bf82f96f3cbc6fe7d371c88303370781dcc3c6e8a1332dcf04b9b3832242b8a22b34654501ab3df844ac7b7958e097faaf0b7
-
C:\Windows\{71D87664-75BB-4110-B7A2-A7B079161377}.exeFilesize
79KB
MD5887f4c7105d6ac1680d0f54aa8c68676
SHA1bce98b6c0e2279daf2c8a47a391d93e577fbfc73
SHA2562af0167622662df4c6d401140259d0a63e4a6146f945aa30b621b42d168238a1
SHA5122d2215c563a0748276d999e37eb6dd46e331b56395d53d1c5c7e2e3da4c0c95ce53cd1b0dc69d13ab888b323ea86fa652dbc3757bc2c3c8b3d04ee28f14621a9
-
C:\Windows\{73F0AB07-9C5B-41a0-A034-73ED948B0642}.exeFilesize
79KB
MD5ef7425ec635523e37d94ee88547e6427
SHA169b6a4ecee2fa10689034bc69177be37f192d62b
SHA256ca101206813123a5565ce5d9c4381b6830ea66d336627c50141199f3952a6dd5
SHA512ee31d6bdfe20a60ad03a3a5a3dd888c18457c84a37c7f6f13577b5ec3796826efe74ef25182ae1d0a77dc1f240b974d9ffb1c886b423d9a8eca65f15881acbf1
-
C:\Windows\{7EF6EA86-54FC-460b-80AF-8408941F6E80}.exeFilesize
79KB
MD5a4b11685867090a976dbcd36ef52953f
SHA12863a972e978a15ebe8b5c8c2a8b94767753fbbe
SHA256d5cede21041d011283533dc77a39dd926b2fb68e452c0c61ccb487f64dbf590b
SHA512965569556fb2a1af2ddd6030d88824a510b153a5d51461059ccd14872255c018d4878c4444c4bc0faee4f63024dfb7a1add7e539b5844d1ac28b209a8d603c88
-
C:\Windows\{917BEDF7-A9F6-4002-813B-A34985696207}.exeFilesize
79KB
MD5d4165d871c41cec417cf2386af74f7eb
SHA159dfba4f36f5b43575f971febe2aa4025116ee0c
SHA256484e26f0105bd3f3099b3ea8d8d58f9738b1d247de9eaad03e0b5ba89769399a
SHA512777521543fa3ddf738b192a16a17bb1525f998c8021d64830285e6ec4e9749080559ab2e53aa481572d738d13161904ae0447f22068a0d8af8182b4f0642058e
-
C:\Windows\{A3CAB53F-5E38-47bf-9914-E1510BB9B05E}.exeFilesize
79KB
MD5b3b2d124c9a76100ad6f271e859973a6
SHA136069267dd67ecb51980c068b9274a4d241fc8d5
SHA2568a331808358d4284eb41fe02a42a1f98f3a03072dbc8e559be7498a674aa0ddd
SHA512223034acfa6b7e965445d3030c74cdb84ff62ca305cb175c6595e12f82d5cab4335217014bace10ac82bb7702bea411f5482012345bc6c8cca1ddf85157eac46
-
C:\Windows\{C86C31D2-003D-4282-87A1-C4DFE9AE279C}.exeFilesize
79KB
MD55c0faab48be426d831b943fa80260b49
SHA16e9f673f26dbe37181e76cc51d4c4d171c28df39
SHA2565a0e6f3739ee4740a4341716f7c8943d2b83098000167118b78e84e654c6e1f0
SHA512c8338c0575b20ad673f17861135caad749872ed291f751ebac6ac7f4b0c51a8a5162a0c56994bbe338b9933c30d44f3f11bb2bf0eb037d4233cc16b22693ec6e
-
C:\Windows\{DFFA42A0-0759-43d7-BFB6-E1EE294D514E}.exeFilesize
79KB
MD51a9f4d66de0dd7b9f68545a56705ccee
SHA1573070b83d205de5f0fba172ebef06331df536d8
SHA2563a8c5134be66cfcdbd401d62a65b664afa36af73a9f1cb6f188268c0dd5a8561
SHA512cf0f035a2e6824c88e175e17df9ed194adb8b284524d371115f7500c18fd07cb4ebda9219f12e29cdc2d8717c923f4b8becffd51a412fd1ba80aec836b773417
-
C:\Windows\{F1D91755-1CD8-4731-A202-FB7059980A64}.exeFilesize
79KB
MD5bb8b9ec29260dbacb6f63e813c1d124b
SHA144222f353de1e7f713e4b8ef06062ed0dfddfb72
SHA2561c7c0077bc9a6e6cb71f0a307bc9766ec5d7f164adbfe66d840d151aa17a4b0d
SHA512f89d8709f0f75b6c213b7c26792358d89544fd8ea14df0fcd5b575cc7fd25e4c3999e107a5e1898e68cd7a8e2c11c9a63ef43d7a450a0fcd39c13ad8749cba58