Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 04:03
Static task
static1
Behavioral task
behavioral1
Sample
33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe
-
Size
118KB
-
MD5
b07c37d92fbbd0260dc27363bd099860
-
SHA1
0f80fe9fafd74a5d61857a0d4a8d034746c15569
-
SHA256
33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec
-
SHA512
6c35faf191f9b8d79358e349cbd423c38a6f8163126c1976c2233a5def7a59f793ac429529e7c506aeaa21a7936e7a187dabcdbd717df70ba7d27576046eb674
-
SSDEEP
1536:nEGh0oCl2unMxVS3HgdoKjhLJh731xvsr:nEGh0oClvMUyNjhLJh731xvsr
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
{7ABF06E2-866A-4b69-9663-32664E161AE2}.exe{1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe{20135404-3A61-47f8-BD1B-181CB17C29B6}.exe{98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe{D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe{CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exe{D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe{FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe{69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe{BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe{FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1A208E81-C007-4e5f-A409-3CA56BAFDF28} {7ABF06E2-866A-4b69-9663-32664E161AE2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D348EAA9-08C5-422a-BF73-7A54B9F57313} {1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FE86BB34-7489-404b-A7F9-5E15BF1186A4} {20135404-3A61-47f8-BD1B-181CB17C29B6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D34771F5-FBF8-4305-966C-15DCF39F44A5}\stubpath = "C:\\Windows\\{D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe" {98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D34771F5-FBF8-4305-966C-15DCF39F44A5} {98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}\stubpath = "C:\\Windows\\{CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exe" {D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{503222B0-35D1-43dd-9FB5-FB2EFA13F0BD}\stubpath = "C:\\Windows\\{503222B0-35D1-43dd-9FB5-FB2EFA13F0BD}.exe" {CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{20135404-3A61-47f8-BD1B-181CB17C29B6}\stubpath = "C:\\Windows\\{20135404-3A61-47f8-BD1B-181CB17C29B6}.exe" {D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69CB939E-CAA5-488c-A26F-F1A05CF5D100}\stubpath = "C:\\Windows\\{69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe" {FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BFFC7CBD-6BD1-4320-9464-55D3DBB603A7} {69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}\stubpath = "C:\\Windows\\{BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe" {69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69CB939E-CAA5-488c-A26F-F1A05CF5D100} {FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FDE6F9CC-4668-481f-8116-CF8AB0A1B500} {BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FDE6F9CC-4668-481f-8116-CF8AB0A1B500}\stubpath = "C:\\Windows\\{FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe" {BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{98187EB9-E44B-448a-83BA-EF331B0A2EC3}\stubpath = "C:\\Windows\\{98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe" {FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7ABF06E2-866A-4b69-9663-32664E161AE2} 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7ABF06E2-866A-4b69-9663-32664E161AE2}\stubpath = "C:\\Windows\\{7ABF06E2-866A-4b69-9663-32664E161AE2}.exe" 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D348EAA9-08C5-422a-BF73-7A54B9F57313}\stubpath = "C:\\Windows\\{D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe" {1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FE86BB34-7489-404b-A7F9-5E15BF1186A4}\stubpath = "C:\\Windows\\{FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe" {20135404-3A61-47f8-BD1B-181CB17C29B6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C} {D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{503222B0-35D1-43dd-9FB5-FB2EFA13F0BD} {CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1A208E81-C007-4e5f-A409-3CA56BAFDF28}\stubpath = "C:\\Windows\\{1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe" {7ABF06E2-866A-4b69-9663-32664E161AE2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{20135404-3A61-47f8-BD1B-181CB17C29B6} {D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{98187EB9-E44B-448a-83BA-EF331B0A2EC3} {FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe -
Executes dropped EXE 12 IoCs
Processes:
{7ABF06E2-866A-4b69-9663-32664E161AE2}.exe{1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe{D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe{20135404-3A61-47f8-BD1B-181CB17C29B6}.exe{FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe{69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe{BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe{FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe{98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe{D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe{CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exe{503222B0-35D1-43dd-9FB5-FB2EFA13F0BD}.exepid process 2540 {7ABF06E2-866A-4b69-9663-32664E161AE2}.exe 3460 {1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe 4660 {D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe 1608 {20135404-3A61-47f8-BD1B-181CB17C29B6}.exe 5052 {FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe 5060 {69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe 2476 {BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe 4604 {FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe 1320 {98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe 3244 {D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe 4320 {CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exe 4804 {503222B0-35D1-43dd-9FB5-FB2EFA13F0BD}.exe -
Drops file in Windows directory 12 IoCs
Processes:
{CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exe33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe{7ABF06E2-866A-4b69-9663-32664E161AE2}.exe{1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe{D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe{FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe{98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe{D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe{20135404-3A61-47f8-BD1B-181CB17C29B6}.exe{69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe{BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe{FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exedescription ioc process File created C:\Windows\{503222B0-35D1-43dd-9FB5-FB2EFA13F0BD}.exe {CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exe File created C:\Windows\{7ABF06E2-866A-4b69-9663-32664E161AE2}.exe 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe File created C:\Windows\{1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe {7ABF06E2-866A-4b69-9663-32664E161AE2}.exe File created C:\Windows\{D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe {1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe File created C:\Windows\{20135404-3A61-47f8-BD1B-181CB17C29B6}.exe {D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe File created C:\Windows\{69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe {FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe File created C:\Windows\{D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe {98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe File created C:\Windows\{CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exe {D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe File created C:\Windows\{FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe {20135404-3A61-47f8-BD1B-181CB17C29B6}.exe File created C:\Windows\{BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe {69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe File created C:\Windows\{FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe {BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe File created C:\Windows\{98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe {FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe{7ABF06E2-866A-4b69-9663-32664E161AE2}.exe{1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe{D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe{20135404-3A61-47f8-BD1B-181CB17C29B6}.exe{FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe{69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe{BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe{FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe{98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe{D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe{CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exedescription pid process Token: SeIncBasePriorityPrivilege 4060 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe Token: SeIncBasePriorityPrivilege 2540 {7ABF06E2-866A-4b69-9663-32664E161AE2}.exe Token: SeIncBasePriorityPrivilege 3460 {1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe Token: SeIncBasePriorityPrivilege 4660 {D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe Token: SeIncBasePriorityPrivilege 1608 {20135404-3A61-47f8-BD1B-181CB17C29B6}.exe Token: SeIncBasePriorityPrivilege 5052 {FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe Token: SeIncBasePriorityPrivilege 5060 {69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe Token: SeIncBasePriorityPrivilege 2476 {BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe Token: SeIncBasePriorityPrivilege 4604 {FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe Token: SeIncBasePriorityPrivilege 1320 {98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe Token: SeIncBasePriorityPrivilege 3244 {D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe Token: SeIncBasePriorityPrivilege 4320 {CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe{7ABF06E2-866A-4b69-9663-32664E161AE2}.exe{1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe{D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe{20135404-3A61-47f8-BD1B-181CB17C29B6}.exe{FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe{69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe{BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe{FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe{98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe{D34771F5-FBF8-4305-966C-15DCF39F44A5}.exedescription pid process target process PID 4060 wrote to memory of 2540 4060 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe {7ABF06E2-866A-4b69-9663-32664E161AE2}.exe PID 4060 wrote to memory of 2540 4060 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe {7ABF06E2-866A-4b69-9663-32664E161AE2}.exe PID 4060 wrote to memory of 2540 4060 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe {7ABF06E2-866A-4b69-9663-32664E161AE2}.exe PID 4060 wrote to memory of 3136 4060 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe cmd.exe PID 4060 wrote to memory of 3136 4060 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe cmd.exe PID 4060 wrote to memory of 3136 4060 33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe cmd.exe PID 2540 wrote to memory of 3460 2540 {7ABF06E2-866A-4b69-9663-32664E161AE2}.exe {1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe PID 2540 wrote to memory of 3460 2540 {7ABF06E2-866A-4b69-9663-32664E161AE2}.exe {1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe PID 2540 wrote to memory of 3460 2540 {7ABF06E2-866A-4b69-9663-32664E161AE2}.exe {1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe PID 2540 wrote to memory of 4476 2540 {7ABF06E2-866A-4b69-9663-32664E161AE2}.exe cmd.exe PID 2540 wrote to memory of 4476 2540 {7ABF06E2-866A-4b69-9663-32664E161AE2}.exe cmd.exe PID 2540 wrote to memory of 4476 2540 {7ABF06E2-866A-4b69-9663-32664E161AE2}.exe cmd.exe PID 3460 wrote to memory of 4660 3460 {1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe {D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe PID 3460 wrote to memory of 4660 3460 {1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe {D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe PID 3460 wrote to memory of 4660 3460 {1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe {D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe PID 3460 wrote to memory of 920 3460 {1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe cmd.exe PID 3460 wrote to memory of 920 3460 {1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe cmd.exe PID 3460 wrote to memory of 920 3460 {1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe cmd.exe PID 4660 wrote to memory of 1608 4660 {D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe {20135404-3A61-47f8-BD1B-181CB17C29B6}.exe PID 4660 wrote to memory of 1608 4660 {D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe {20135404-3A61-47f8-BD1B-181CB17C29B6}.exe PID 4660 wrote to memory of 1608 4660 {D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe {20135404-3A61-47f8-BD1B-181CB17C29B6}.exe PID 4660 wrote to memory of 2684 4660 {D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe cmd.exe PID 4660 wrote to memory of 2684 4660 {D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe cmd.exe PID 4660 wrote to memory of 2684 4660 {D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe cmd.exe PID 1608 wrote to memory of 5052 1608 {20135404-3A61-47f8-BD1B-181CB17C29B6}.exe {FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe PID 1608 wrote to memory of 5052 1608 {20135404-3A61-47f8-BD1B-181CB17C29B6}.exe {FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe PID 1608 wrote to memory of 5052 1608 {20135404-3A61-47f8-BD1B-181CB17C29B6}.exe {FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe PID 1608 wrote to memory of 4636 1608 {20135404-3A61-47f8-BD1B-181CB17C29B6}.exe cmd.exe PID 1608 wrote to memory of 4636 1608 {20135404-3A61-47f8-BD1B-181CB17C29B6}.exe cmd.exe PID 1608 wrote to memory of 4636 1608 {20135404-3A61-47f8-BD1B-181CB17C29B6}.exe cmd.exe PID 5052 wrote to memory of 5060 5052 {FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe {69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe PID 5052 wrote to memory of 5060 5052 {FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe {69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe PID 5052 wrote to memory of 5060 5052 {FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe {69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe PID 5052 wrote to memory of 928 5052 {FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe cmd.exe PID 5052 wrote to memory of 928 5052 {FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe cmd.exe PID 5052 wrote to memory of 928 5052 {FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe cmd.exe PID 5060 wrote to memory of 2476 5060 {69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe {BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe PID 5060 wrote to memory of 2476 5060 {69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe {BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe PID 5060 wrote to memory of 2476 5060 {69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe {BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe PID 5060 wrote to memory of 3688 5060 {69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe cmd.exe PID 5060 wrote to memory of 3688 5060 {69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe cmd.exe PID 5060 wrote to memory of 3688 5060 {69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe cmd.exe PID 2476 wrote to memory of 4604 2476 {BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe {FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe PID 2476 wrote to memory of 4604 2476 {BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe {FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe PID 2476 wrote to memory of 4604 2476 {BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe {FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe PID 2476 wrote to memory of 3792 2476 {BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe cmd.exe PID 2476 wrote to memory of 3792 2476 {BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe cmd.exe PID 2476 wrote to memory of 3792 2476 {BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe cmd.exe PID 4604 wrote to memory of 1320 4604 {FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe {98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe PID 4604 wrote to memory of 1320 4604 {FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe {98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe PID 4604 wrote to memory of 1320 4604 {FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe {98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe PID 4604 wrote to memory of 2244 4604 {FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe cmd.exe PID 4604 wrote to memory of 2244 4604 {FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe cmd.exe PID 4604 wrote to memory of 2244 4604 {FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe cmd.exe PID 1320 wrote to memory of 3244 1320 {98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe {D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe PID 1320 wrote to memory of 3244 1320 {98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe {D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe PID 1320 wrote to memory of 3244 1320 {98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe {D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe PID 1320 wrote to memory of 980 1320 {98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe cmd.exe PID 1320 wrote to memory of 980 1320 {98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe cmd.exe PID 1320 wrote to memory of 980 1320 {98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe cmd.exe PID 3244 wrote to memory of 4320 3244 {D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe {CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exe PID 3244 wrote to memory of 4320 3244 {D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe {CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exe PID 3244 wrote to memory of 4320 3244 {D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe {CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exe PID 3244 wrote to memory of 744 3244 {D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\33f9d819fbac4666447640038bbb1a0f95051001d2e54b8fd236a5d366fa28ec_NeikiAnalytics.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{7ABF06E2-866A-4b69-9663-32664E161AE2}.exeC:\Windows\{7ABF06E2-866A-4b69-9663-32664E161AE2}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exeC:\Windows\{1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{D348EAA9-08C5-422a-BF73-7A54B9F57313}.exeC:\Windows\{D348EAA9-08C5-422a-BF73-7A54B9F57313}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{20135404-3A61-47f8-BD1B-181CB17C29B6}.exeC:\Windows\{20135404-3A61-47f8-BD1B-181CB17C29B6}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exeC:\Windows\{FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exeC:\Windows\{69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exeC:\Windows\{BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exeC:\Windows\{FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exeC:\Windows\{98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{D34771F5-FBF8-4305-966C-15DCF39F44A5}.exeC:\Windows\{D34771F5-FBF8-4305-966C-15DCF39F44A5}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exeC:\Windows\{CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\{503222B0-35D1-43dd-9FB5-FB2EFA13F0BD}.exeC:\Windows\{503222B0-35D1-43dd-9FB5-FB2EFA13F0BD}.exe13⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CEB8A~1.EXE > nul13⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D3477~1.EXE > nul12⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{98187~1.EXE > nul11⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FDE6F~1.EXE > nul10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BFFC7~1.EXE > nul9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{69CB9~1.EXE > nul8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FE86B~1.EXE > nul7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{20135~1.EXE > nul6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D348E~1.EXE > nul5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1A208~1.EXE > nul4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7ABF0~1.EXE > nul3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\33F9D8~1.EXE > nul2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\{1A208E81-C007-4e5f-A409-3CA56BAFDF28}.exeFilesize
118KB
MD5f11e36a4cab2eff21454e76d4e0da2d6
SHA17967c48c432a6e0a498411b861d8d5a806f20dfd
SHA256c1bb021563193de7642e19f98490e10a5d573e8d1ea6b5628224496547e221e7
SHA512c1f61a204b424b2a79bfb303c251ed5b36a5587d9ad013f86a788cd8a67126693310ce80f36f3052cbcffdbbdda628c00aec8c8226ed363ce00a4f62c2b542ce
-
C:\Windows\{20135404-3A61-47f8-BD1B-181CB17C29B6}.exeFilesize
118KB
MD5129933cdd6a6cd3f06692e4cee6d4bd0
SHA13b82cfbc42a6e8ec3adef3b99117eb396e8a678c
SHA256f90a2db88dab98b9312af730b29fa02980a289f5587044018ddbc5872a3dd1d1
SHA51201555cd323053c29b72eb18000bdb2c348abc68185e0ef9a2cd49f8eb655665d39bd20fbbae79bbf71af18407cfac78f9cd6f5393cb43217ca42bfbb7169fce6
-
C:\Windows\{503222B0-35D1-43dd-9FB5-FB2EFA13F0BD}.exeFilesize
118KB
MD57606657fc20ddcf9b54b5e6fbd1c7d98
SHA1906842f04d769992888b2e22db58990bb0a4b66f
SHA2561c1c6c39dc4f6997cd296f3299b5a1b085c298b8f5f96d066800a831f57eba8f
SHA512e51bc10e572b0e3ec4eb8d601e44c3f0a0a4bab971960b04c1e4c7e931e1fffe6baa140894d8e127c63537ccb8ec7c6203bb1723d9b67074b696314fee6bda26
-
C:\Windows\{69CB939E-CAA5-488c-A26F-F1A05CF5D100}.exeFilesize
118KB
MD590750f88efea6ae91032ac90b1e51659
SHA1c6261e89ffa8f50d01313b8ea21534fc8d5506a3
SHA256577968af078b64dfe681204028e05ccbe6611014ce60060573a095075bb0e0db
SHA512d52a855ba8b76650659d472ef4c284d9536f281b92b5d552db147806010015d10bf5b1fb7fa673ea709c563e5efb7d9fd90b9e503e31a29d58d988922f54b742
-
C:\Windows\{7ABF06E2-866A-4b69-9663-32664E161AE2}.exeFilesize
118KB
MD51e7db37368605b0be0340cb85e1e9b26
SHA1342bb390ba59fc25576dd4cdbb90b6048b5c3b2d
SHA2560d9cb11ffa2bcb3cc2db9eab951b8afaf4175e5d489c129aae5822e1c322d083
SHA512b443cd6e329796a5ded17b7db85719a4f015ef6f97e6863f5e32e635d081189a0bfcc045acdeeabaecab9d9f9d3771d3a9326e9456b83c73bfd0110a563f919f
-
C:\Windows\{98187EB9-E44B-448a-83BA-EF331B0A2EC3}.exeFilesize
118KB
MD5a8d2782945c16f2dd096aea0152f87db
SHA1313f2267b6c4575c97c176c45364904de7b6277d
SHA25672f6697ff30b9cba588bdc3295b62c6477715a8a275ffc125f6690797fa7191c
SHA5128e999c7b2eec706bfc2b13b01dcf0d9961dcc334457f23831e76714d7489c9fe50200faa13d7983341e4326412fe1e174664d7fd081eaeb8f91bcdb90dd7792f
-
C:\Windows\{BFFC7CBD-6BD1-4320-9464-55D3DBB603A7}.exeFilesize
118KB
MD55cb4a6bac1997a2a8274f270fa3e9ffe
SHA15f2c116441cd8a39021614bee92a85a2645a06fa
SHA25681a4c051a4da6d79ae2772f2064e0d4d81472b52223d8ab5857aa6cb7539d318
SHA512ed112b7ca0cae0f6aec81024d588f05b2d8dde1f891c87b2f081e9cf404d850beef91af4bd8d8b8ac1cc21461aaacd520734509a446270fb75f1bdbed65cd981
-
C:\Windows\{CEB8AEBD-C4F0-412f-97A1-DB45AEE7FD5C}.exeFilesize
118KB
MD54f89c6a16277a16423b4820219d0d26f
SHA1ad5e07cfaad00f791856b2b8d06a8e117a02dcfb
SHA256e7161f74b19a3d384988d32c2fa82eedaa4bc8c656f29a35cc4452a4673e868f
SHA5124b07c71c6daeae6d506ea04f284fd27069fb9e950679ac862f36399ffe3d6b8f799dcb43193a61e3728b6ebc9dcf76664242719a768d52677e31ecc94360f03a
-
C:\Windows\{D34771F5-FBF8-4305-966C-15DCF39F44A5}.exeFilesize
118KB
MD5c158498f97fa582af7fa0b0cee062d0b
SHA19b5aba69fb0886fd75ddbe911e827be4c89e741e
SHA2566d8b5c7ba122b1dab91a802d1964a1c15731447f0f88d6a897d20bf15f5b96c2
SHA5127296ec98fed796377d7a632bf66df98ca1b82a8bed21a43ae803772a31dc8c28da1f0df1b3553365f5a313f30fffba9a9a4d7f7e1b8714e8df2b5c171fa74fd5
-
C:\Windows\{D348EAA9-08C5-422a-BF73-7A54B9F57313}.exeFilesize
118KB
MD567883a4fe5cc15b7b57eda2b15505604
SHA14705b22512fe5c6490167cac9c6ec3a991740a37
SHA25666cf2fe7477f9d16aea94525eb40d2083af30ac73efb4b0ba07747f3d3bb26ce
SHA512d6488d810cb91fe9b384f9d6d2153a8988f837cb7190ee9d2ce6b82cd45289042a4b2c5a868184261e59b4eb62a26d34da21d0caaccda403d23ec5225f0e931f
-
C:\Windows\{FDE6F9CC-4668-481f-8116-CF8AB0A1B500}.exeFilesize
118KB
MD5714ecbb4f6e7845cc5fdf3bdd125e2cc
SHA146a71f639a6aa27fa65eeb20f69ffd40c1b72fbf
SHA256c8080325ff23d3039125f20c098db44d756cbedc345d1af7bc3941190279529c
SHA512469ae3cd10bca4a0986ef9fdeffc6b858506a4e5f9b29a347efe4a319db71e366e5485b389fce1c14029e1ec05d17ca9d0282acea8018d0de53b5cd62a81c4a9
-
C:\Windows\{FE86BB34-7489-404b-A7F9-5E15BF1186A4}.exeFilesize
118KB
MD52ae87d53b4f25d523c3d0a99ed184e34
SHA1e7326fe43b4971416ee22de6fa21f95483e6cee3
SHA256028ceb1f56bcd765ab6908853a64f56eae2efb2f1b6221e523db9a8e0ad0d55f
SHA5129a68cead10422230fe778b9c145d92a0f8aa5fd76834ee3945e97a03f1d813a35ca3878ca705b077d5149ad8690606ba599da01c76538d5f5e02c56d34e11402