Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 04:03
Static task
static1
Behavioral task
behavioral1
Sample
33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe
-
Size
118KB
-
MD5
b07c37d92fbbd0260dc27363bd099860
-
SHA1
0f80fe9fafd74a5d61857a0d4a8d034746c15569
-
SHA256
33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec
-
SHA512
6c35faf191f9b8d79358e349cbd423c38a6f8163126c1976c2233a5def7a59f793ac429529e7c506aeaa21a7936e7a187dabcdbd717df70ba7d27576046eb674
-
SSDEEP
1536:nEGh0oCl2unMxVS3HgdoKjhLJh731xvsr:nEGh0oClvMUyNjhLJh731xvsr
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
{C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe{6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe{629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe{6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}.exe{E5CE3D72-54EA-4a55-B164-D584511C43F3}.exe33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe{5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe{9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe{D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe{D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe{0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5EFD8045-688E-4f9c-B325-47A850A6AB79}\stubpath = "C:\\Windows\\{5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe" {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9CB859F4-9395-4621-8CD2-17F0A142D10E}\stubpath = "C:\\Windows\\{9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe" {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D1859B4D-BC13-468a-A44F-88F7BCB2BABA} {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E5CE3D72-54EA-4a55-B164-D584511C43F3}\stubpath = "C:\\Windows\\{E5CE3D72-54EA-4a55-B164-D584511C43F3}.exe" {6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D1859B4D-BC13-468a-A44F-88F7BCB2BABA}\stubpath = "C:\\Windows\\{D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe" {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7BEBEC04-84DE-4043-BD1F-2636544B4804} {E5CE3D72-54EA-4a55-B164-D584511C43F3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7BEBEC04-84DE-4043-BD1F-2636544B4804}\stubpath = "C:\\Windows\\{7BEBEC04-84DE-4043-BD1F-2636544B4804}.exe" {E5CE3D72-54EA-4a55-B164-D584511C43F3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}\stubpath = "C:\\Windows\\{0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe" 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E176AF5-3C6F-4cda-B954-E110563FF5D2}\stubpath = "C:\\Windows\\{6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe" {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9CB859F4-9395-4621-8CD2-17F0A142D10E} {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{629F71D6-70D8-497a-A64C-0A57C37DA5AC} {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E5CE3D72-54EA-4a55-B164-D584511C43F3} {6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5EFD8045-688E-4f9c-B325-47A850A6AB79} {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{629F71D6-70D8-497a-A64C-0A57C37DA5AC}\stubpath = "C:\\Windows\\{629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe" {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9} {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}\stubpath = "C:\\Windows\\{6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}.exe" {D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}\stubpath = "C:\\Windows\\{D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe" {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D} {D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0161E694-3DC6-44d6-8ECC-F8A62A72ECD4} 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C698A9B4-D949-4c29-A074-B61A1F2EC2AE} {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C698A9B4-D949-4c29-A074-B61A1F2EC2AE}\stubpath = "C:\\Windows\\{C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe" {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E176AF5-3C6F-4cda-B954-E110563FF5D2} {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1852 cmd.exe -
Executes dropped EXE 11 IoCs
Processes:
{0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe{C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe{5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe{6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe{9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe{629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe{D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe{D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe{6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}.exe{E5CE3D72-54EA-4a55-B164-D584511C43F3}.exe{7BEBEC04-84DE-4043-BD1F-2636544B4804}.exepid process 1708 {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe 2684 {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe 2636 {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe 1180 {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe 2780 {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe 288 {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe 872 {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe 556 {D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe 2092 {6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}.exe 1252 {E5CE3D72-54EA-4a55-B164-D584511C43F3}.exe 1028 {7BEBEC04-84DE-4043-BD1F-2636544B4804}.exe -
Drops file in Windows directory 11 IoCs
Processes:
{6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}.exe33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe{6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe{629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe{9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe{D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe{D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe{E5CE3D72-54EA-4a55-B164-D584511C43F3}.exe{0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe{C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe{5EFD8045-688E-4f9c-B325-47A850A6AB79}.exedescription ioc process File created C:\Windows\{E5CE3D72-54EA-4a55-B164-D584511C43F3}.exe {6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}.exe File created C:\Windows\{0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe File created C:\Windows\{9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe File created C:\Windows\{D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe File created C:\Windows\{629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe File created C:\Windows\{D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe File created C:\Windows\{6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}.exe {D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe File created C:\Windows\{7BEBEC04-84DE-4043-BD1F-2636544B4804}.exe {E5CE3D72-54EA-4a55-B164-D584511C43F3}.exe File created C:\Windows\{C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe File created C:\Windows\{5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe File created C:\Windows\{6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe{0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe{C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe{5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe{6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe{9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe{629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe{D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe{D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe{6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}.exe{E5CE3D72-54EA-4a55-B164-D584511C43F3}.exedescription pid process Token: SeIncBasePriorityPrivilege 1276 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe Token: SeIncBasePriorityPrivilege 1708 {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe Token: SeIncBasePriorityPrivilege 2684 {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe Token: SeIncBasePriorityPrivilege 2636 {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe Token: SeIncBasePriorityPrivilege 1180 {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe Token: SeIncBasePriorityPrivilege 2780 {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe Token: SeIncBasePriorityPrivilege 288 {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe Token: SeIncBasePriorityPrivilege 872 {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe Token: SeIncBasePriorityPrivilege 556 {D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe Token: SeIncBasePriorityPrivilege 2092 {6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}.exe Token: SeIncBasePriorityPrivilege 1252 {E5CE3D72-54EA-4a55-B164-D584511C43F3}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe{0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe{C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe{5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe{6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe{9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe{629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe{D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exedescription pid process target process PID 1276 wrote to memory of 1708 1276 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe PID 1276 wrote to memory of 1708 1276 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe PID 1276 wrote to memory of 1708 1276 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe PID 1276 wrote to memory of 1708 1276 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe PID 1276 wrote to memory of 1852 1276 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe cmd.exe PID 1276 wrote to memory of 1852 1276 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe cmd.exe PID 1276 wrote to memory of 1852 1276 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe cmd.exe PID 1276 wrote to memory of 1852 1276 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe cmd.exe PID 1708 wrote to memory of 2684 1708 {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe PID 1708 wrote to memory of 2684 1708 {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe PID 1708 wrote to memory of 2684 1708 {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe PID 1708 wrote to memory of 2684 1708 {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe PID 1708 wrote to memory of 2572 1708 {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe cmd.exe PID 1708 wrote to memory of 2572 1708 {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe cmd.exe PID 1708 wrote to memory of 2572 1708 {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe cmd.exe PID 1708 wrote to memory of 2572 1708 {0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe cmd.exe PID 2684 wrote to memory of 2636 2684 {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe PID 2684 wrote to memory of 2636 2684 {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe PID 2684 wrote to memory of 2636 2684 {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe PID 2684 wrote to memory of 2636 2684 {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe PID 2684 wrote to memory of 1868 2684 {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe cmd.exe PID 2684 wrote to memory of 1868 2684 {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe cmd.exe PID 2684 wrote to memory of 1868 2684 {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe cmd.exe PID 2684 wrote to memory of 1868 2684 {C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe cmd.exe PID 2636 wrote to memory of 1180 2636 {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe PID 2636 wrote to memory of 1180 2636 {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe PID 2636 wrote to memory of 1180 2636 {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe PID 2636 wrote to memory of 1180 2636 {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe PID 2636 wrote to memory of 1636 2636 {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe cmd.exe PID 2636 wrote to memory of 1636 2636 {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe cmd.exe PID 2636 wrote to memory of 1636 2636 {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe cmd.exe PID 2636 wrote to memory of 1636 2636 {5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe cmd.exe PID 1180 wrote to memory of 2780 1180 {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe PID 1180 wrote to memory of 2780 1180 {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe PID 1180 wrote to memory of 2780 1180 {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe PID 1180 wrote to memory of 2780 1180 {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe PID 1180 wrote to memory of 2912 1180 {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe cmd.exe PID 1180 wrote to memory of 2912 1180 {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe cmd.exe PID 1180 wrote to memory of 2912 1180 {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe cmd.exe PID 1180 wrote to memory of 2912 1180 {6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe cmd.exe PID 2780 wrote to memory of 288 2780 {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe PID 2780 wrote to memory of 288 2780 {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe PID 2780 wrote to memory of 288 2780 {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe PID 2780 wrote to memory of 288 2780 {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe PID 2780 wrote to memory of 2032 2780 {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe cmd.exe PID 2780 wrote to memory of 2032 2780 {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe cmd.exe PID 2780 wrote to memory of 2032 2780 {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe cmd.exe PID 2780 wrote to memory of 2032 2780 {9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe cmd.exe PID 288 wrote to memory of 872 288 {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe PID 288 wrote to memory of 872 288 {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe PID 288 wrote to memory of 872 288 {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe PID 288 wrote to memory of 872 288 {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe PID 288 wrote to memory of 2184 288 {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe cmd.exe PID 288 wrote to memory of 2184 288 {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe cmd.exe PID 288 wrote to memory of 2184 288 {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe cmd.exe PID 288 wrote to memory of 2184 288 {629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe cmd.exe PID 872 wrote to memory of 556 872 {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe {D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe PID 872 wrote to memory of 556 872 {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe {D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe PID 872 wrote to memory of 556 872 {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe {D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe PID 872 wrote to memory of 556 872 {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe {D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe PID 872 wrote to memory of 1520 872 {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe cmd.exe PID 872 wrote to memory of 1520 872 {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe cmd.exe PID 872 wrote to memory of 1520 872 {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe cmd.exe PID 872 wrote to memory of 1520 872 {D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exeC:\Windows\{0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exeC:\Windows\{C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{5EFD8045-688E-4f9c-B325-47A850A6AB79}.exeC:\Windows\{5EFD8045-688E-4f9c-B325-47A850A6AB79}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exeC:\Windows\{6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{9CB859F4-9395-4621-8CD2-17F0A142D10E}.exeC:\Windows\{9CB859F4-9395-4621-8CD2-17F0A142D10E}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exeC:\Windows\{629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exeC:\Windows\{D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exeC:\Windows\{D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\{6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}.exeC:\Windows\{6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\{E5CE3D72-54EA-4a55-B164-D584511C43F3}.exeC:\Windows\{E5CE3D72-54EA-4a55-B164-D584511C43F3}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\{7BEBEC04-84DE-4043-BD1F-2636544B4804}.exeC:\Windows\{7BEBEC04-84DE-4043-BD1F-2636544B4804}.exe12⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E5CE3~1.EXE > nul12⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6BC8B~1.EXE > nul11⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D2CF1~1.EXE > nul10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D1859~1.EXE > nul9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{629F7~1.EXE > nul8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9CB85~1.EXE > nul7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6E176~1.EXE > nul6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5EFD8~1.EXE > nul5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C698A~1.EXE > nul4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0161E~1.EXE > nul3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\33F9D8~1.EXE > nul2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\{0161E694-3DC6-44d6-8ECC-F8A62A72ECD4}.exeFilesize
118KB
MD5e7c9d4ea9f7614120ac62dafbea79c25
SHA182a424ac348e161fd6f5e5cfd5030e29b759e54e
SHA256af2e6b1a74906a4ea9d5239d8ad60dbb786a5c60241a5730b027e845a80ea30e
SHA5129ec0dcd8a66174acfdc99bb8b641467a49c70e586587eb058e1095aff2305e2f90c9b6872d5430232a3683f0eb4bcf7e96d48c0d1ec394984490703b449e7e29
-
C:\Windows\{5EFD8045-688E-4f9c-B325-47A850A6AB79}.exeFilesize
118KB
MD5b92bb8dfa536afd50a2ab48a1b55940c
SHA1edd4bb15ae58c05528b5b66e8af4c8b53eaef997
SHA256cce13b0204b170a2ddc6bf4e14e6e64a3fa97221ef614b586bad3d43999bcc64
SHA512a3b2a2f3fe56f364fc58d13330e760e4c0d001251f1517a57cef83b88e3738ebb6f4316b0e1547070241be28185c4256ca775d1e72ce598654415d91b3fdd63a
-
C:\Windows\{629F71D6-70D8-497a-A64C-0A57C37DA5AC}.exeFilesize
118KB
MD5d590794c6fa09b8000700e5927f26c8c
SHA1d0a1d2e111dec588dadfa85f4ab3930f684d29c2
SHA2560be14104418e2d37dd1ff2ac2debac0dcc4cfdba638d4d4c5d24f037dff1e734
SHA512d97f19590069304544944bf4d1f5fb0c1c85321a835ddf0c03cd2a5739bf369de9197c64b30f0027525a884dacb5f809c20132b74eb5dbdc0d608dc1ee74ca6e
-
C:\Windows\{6BC8B3B5-96F1-4cf9-BB13-C39C09A1586D}.exeFilesize
118KB
MD52a2b1dfbbba0998c0a2244456676c1e6
SHA15e7166e8d1f47a9a5328d3711919e06db88d7b2a
SHA2562d6a407251c540b7fc19ecb8dae7d0a50a7b4652eb06652982fbbfde7b47d3f6
SHA512b01d759be8fafed6ecdb0e2ef9a4f1ffeb25221a28640861c2dae213c7c427757fe9a305bfdece8a7f866269f122789b7de265c8a62af02672e638c8e9086e76
-
C:\Windows\{6E176AF5-3C6F-4cda-B954-E110563FF5D2}.exeFilesize
118KB
MD59c64a3ff338fa93ab8994e8dfd97297b
SHA1c222ebb9630f171cf7b21cb59a9baee62222f69d
SHA256a989b5773ee73b1cce5818f0acae29c00e2063ef2288801f6ebd1797acd9cca5
SHA51227541c0b390d17834f23f26d9864061943fb399df1d5431935721ed01334d93d096257c1a334924296f04c29e41c2ef82245eafe01ce2066bcfe00413b0d1be4
-
C:\Windows\{7BEBEC04-84DE-4043-BD1F-2636544B4804}.exeFilesize
118KB
MD561b5591820d51643be26b97171c06fdc
SHA13d52ba0998db3a5ef655d8e6021f1c85d8464f2a
SHA25678bab34fadb22556c0d9578dca88be9b369fe60fdfc3d93ac6899ec427b7fe40
SHA512d552d95f6fb8f20c7af59e1bc95a8336d990700ec8961989d8e0df706c14a751a0af440ef9788409dd2098ebca8da7978e71e22deb5beab76cfe1e9bcfab9468
-
C:\Windows\{9CB859F4-9395-4621-8CD2-17F0A142D10E}.exeFilesize
118KB
MD5a33a889e4e2503826658d20d95d732d5
SHA1895ee5264302d6d98f0d6dd7f93d7b6b1ea951c2
SHA256d3dc7cdf5f98dbecf90737cabd243bf9a5139c87433e325b9e45ab0a50aeaacc
SHA512873effbc2f3eef6b21014f58e6a6bcc36a55c8b00d6ca686493e5de799c9881b9097b0e27cc17d233e6ced0736d9661105e903b60a3e7ebd2e1daede87d4eabf
-
C:\Windows\{C698A9B4-D949-4c29-A074-B61A1F2EC2AE}.exeFilesize
118KB
MD5d2a0b4e7f2f95aea4900af13588d9aaa
SHA1391a44d32ad29a59956d663976c4fdd9b6751f01
SHA256f4bc8e96f10b8daaddb73caffc50d9250644113926dca0a80253651293d287b1
SHA5129c1b214c41ee0e8b88d7b49fb6f3c81e15c7869ce76a1e49f729e4755e7379c02284c68e7e192fad3fc41dcf8e708de47213e9d59c03253e8272d902a0119902
-
C:\Windows\{D1859B4D-BC13-468a-A44F-88F7BCB2BABA}.exeFilesize
118KB
MD5771ea192c9aa6733810ac8fadc0be11e
SHA103a6236002480d47d9750f3ae0b5021b74154ffc
SHA2568c33ff7678c71a528cd56aa553fbfbf9a97308f78ab0b5d666dd30bef5c24352
SHA51242b6c2d523dd5c0f7c2548be873c1fb78533531df223bbae4775226a2d3f9c9857e948e3ef5292fc77c7a2af0efbc6565ce864dcdd1293476933b5a550d4bc57
-
C:\Windows\{D2CF19A7-FF7C-4bcb-938B-F7D7899C00B9}.exeFilesize
118KB
MD56b8fc5c520b6da8bf3a474f3a7843e2f
SHA194b8304a5fbaf8df8b9af760227ad80b1008b0d0
SHA2563f7b450355a6e7a220f42b859bb3ad278afcf3a900611aa7a043061383ef4b48
SHA5128ef57b2efe4fef9636cd13da0be6feba8ac94c5050ff279bcbbb55664832b10c2cace3664e88e4f0d7f6555bef8ed71030500c455d5501e49fec06d438b34309
-
C:\Windows\{E5CE3D72-54EA-4a55-B164-D584511C43F3}.exeFilesize
118KB
MD5a65fc60e65c46ff8badc0282da16f704
SHA159c1a6823479e44fe638198c7812241e218ed43c
SHA25631a298f50e030577f1a523ff0643aa560f32c719515d2b65140b97948b71e64e
SHA512ccc481263b605d132eb49f63efc22fcc5ee391572e28efe4103928b6c6577891e21509ebff061803a64e5c3909aff545462b993f2d3dcca22715b44cc595d1a5