Analysis
-
max time kernel
130s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 13:05
Static task
static1
Behavioral task
behavioral1
Sample
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe
-
Size
97KB
-
MD5
2689be36ab7c5f95c0015239cf314140
-
SHA1
51550abd9d3336757f5bded1b7f973f4c4ceaa70
-
SHA256
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b
-
SHA512
204f13d3f140d576a26d43618940362dc87fdde7f3df0a8aa65729fad364aabb05f304e40d1500174d8336f3a4a386fc7ee2ec5daa5d0c7789234f202ef33b9b
-
SSDEEP
1536:yAbdWXLdl1vLNTovWdc5X33Xb4ZF0sss/CuEiKzmgcW3Q5Nj6:LRW7/Hoedc5XHXb5LaCuYc8Qrj
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe -
Processes:
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe -
Processes:
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
Processes:
msedge.exepid process 3616 msedge.exe -
Processes:
resource yara_rule behavioral2/memory/1244-2-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-4-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-5-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-9-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-7-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-6-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-12-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-8-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-11-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-10-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-23-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-22-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-24-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-25-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-26-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-28-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-29-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-31-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-32-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-33-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-35-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-36-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-39-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-42-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-44-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-46-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-47-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-51-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-50-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-54-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-56-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-58-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-59-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-62-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-64-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-72-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-71-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-75-0x00000000007E0000-0x000000000189A000-memory.dmp upx behavioral2/memory/1244-76-0x00000000007E0000-0x000000000189A000-memory.dmp upx -
Processes:
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe -
Processes:
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exedescription ioc process File opened (read-only) \??\W: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\X: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\Y: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\E: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\I: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\M: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\R: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\T: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\Z: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\G: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\H: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\N: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\O: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\V: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\L: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\P: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\J: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\K: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\Q: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\S: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened (read-only) \??\U: 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exedescription ioc process File opened for modification C:\autorun.inf 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened for modification F:\autorun.inf 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe -
Drops file in Program Files directory 12 IoCs
Processes:
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7zG.exe 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\7z.exe 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exedescription ioc process File created C:\Windows\e581817 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe File opened for modification C:\Windows\SYSTEM.INI 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exepid process 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Token: SeDebugPrivilege 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exedescription pid process target process PID 1244 wrote to memory of 772 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe fontdrvhost.exe PID 1244 wrote to memory of 780 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe fontdrvhost.exe PID 1244 wrote to memory of 1000 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe dwm.exe PID 1244 wrote to memory of 2528 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe sihost.exe PID 1244 wrote to memory of 2548 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe svchost.exe PID 1244 wrote to memory of 2816 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe taskhostw.exe PID 1244 wrote to memory of 3360 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Explorer.EXE PID 1244 wrote to memory of 3536 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe svchost.exe PID 1244 wrote to memory of 3716 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe DllHost.exe PID 1244 wrote to memory of 3856 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1244 wrote to memory of 3936 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe RuntimeBroker.exe PID 1244 wrote to memory of 4048 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe SearchApp.exe PID 1244 wrote to memory of 4116 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe RuntimeBroker.exe PID 1244 wrote to memory of 4504 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe RuntimeBroker.exe PID 1244 wrote to memory of 4488 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe TextInputHost.exe PID 1244 wrote to memory of 2652 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 4648 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 3420 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 2840 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 728 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 1864 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 4548 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 772 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe fontdrvhost.exe PID 1244 wrote to memory of 780 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe fontdrvhost.exe PID 1244 wrote to memory of 1000 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe dwm.exe PID 1244 wrote to memory of 2528 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe sihost.exe PID 1244 wrote to memory of 2548 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe svchost.exe PID 1244 wrote to memory of 2816 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe taskhostw.exe PID 1244 wrote to memory of 3360 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Explorer.EXE PID 1244 wrote to memory of 3536 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe svchost.exe PID 1244 wrote to memory of 3716 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe DllHost.exe PID 1244 wrote to memory of 3856 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1244 wrote to memory of 3936 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe RuntimeBroker.exe PID 1244 wrote to memory of 4048 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe SearchApp.exe PID 1244 wrote to memory of 4116 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe RuntimeBroker.exe PID 1244 wrote to memory of 4504 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe RuntimeBroker.exe PID 1244 wrote to memory of 4488 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe TextInputHost.exe PID 1244 wrote to memory of 2652 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 4648 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 3420 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 2840 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 728 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 1864 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 4548 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 772 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe fontdrvhost.exe PID 1244 wrote to memory of 780 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe fontdrvhost.exe PID 1244 wrote to memory of 1000 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe dwm.exe PID 1244 wrote to memory of 2528 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe sihost.exe PID 1244 wrote to memory of 2548 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe svchost.exe PID 1244 wrote to memory of 2816 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe taskhostw.exe PID 1244 wrote to memory of 3360 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe Explorer.EXE PID 1244 wrote to memory of 3536 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe svchost.exe PID 1244 wrote to memory of 3716 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe DllHost.exe PID 1244 wrote to memory of 3856 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1244 wrote to memory of 3936 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe RuntimeBroker.exe PID 1244 wrote to memory of 4048 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe SearchApp.exe PID 1244 wrote to memory of 4116 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe RuntimeBroker.exe PID 1244 wrote to memory of 4504 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe RuntimeBroker.exe PID 1244 wrote to memory of 4488 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe TextInputHost.exe PID 1244 wrote to memory of 2652 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 4648 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 3420 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 2840 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe PID 1244 wrote to memory of 728 1244 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe msedge.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\54713f59b24397900abec10923ecd65d559cc697f76a50006978e912e11bd61b_NeikiAnalytics.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x238,0x23c,0x240,0x234,0x24c,0x7ffae3442e98,0x7ffae3442ea4,0x7ffae3442eb02⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2248 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2176 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:32⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3464 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5320 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5408 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3704 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:82⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeFilesize
3.9MB
MD5faf79a48399d502194e87a5ad1ba7b8e
SHA109cd9d783ac126d33ec37de781beedce9ce6aa51
SHA2563d1266025af95bdb7b92d17debbf88a1386b19b7f7c2eeb9ced77debb9748e14
SHA512d84f8e25179e2cee6f95dc95c94a4a70dc56814aaf7f95e38f24f9828e64629cab0c184f5fddd67d834f419703f65d9d0e3a93e54d2730ed63d3d89644babb84
-
C:\cucf.pifFilesize
97KB
MD59af969e83cd1e4df243ae74c9649e86e
SHA1c40a664edadbdf9f77b0695a0494468a070d4456
SHA256bac0a801c7ae9f3c8cda3269b66cdf1f99ac0bdb457a98ea0330efbb53050320
SHA51260da6128731f13576f73c2484312f8bb151ed01b5d68519908586990fb7e7a73e77b854352175a87daaf77277ad7c903fe0840d5c623ed9ee53e26db0714d83b
-
memory/1244-31-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-4-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-9-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-33-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-6-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-18-0x00000000048A0000-0x00000000048A2000-memory.dmpFilesize
8KB
-
memory/1244-21-0x00000000049F0000-0x00000000049F1000-memory.dmpFilesize
4KB
-
memory/1244-20-0x00000000048A0000-0x00000000048A2000-memory.dmpFilesize
8KB
-
memory/1244-12-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-19-0x00000000048A0000-0x00000000048A2000-memory.dmpFilesize
8KB
-
memory/1244-8-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-11-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-10-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-23-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-22-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-24-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-25-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-36-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-28-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-29-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-0-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1244-32-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-7-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-5-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-26-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-39-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-42-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-44-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-46-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-47-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-51-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-50-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-54-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-56-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-58-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-59-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-62-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-64-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-72-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-71-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-75-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-76-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-79-0x00000000048A0000-0x00000000048A2000-memory.dmpFilesize
8KB
-
memory/1244-35-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB
-
memory/1244-2-0x00000000007E0000-0x000000000189A000-memory.dmpFilesize
16.7MB