Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 02:29
Behavioral task
behavioral1
Sample
a859f0dfbadc69d84bb0ed1daee183d0_NEIKI.exe
Resource
win7-20231129-en
General
-
Target
a859f0dfbadc69d84bb0ed1daee183d0_NEIKI.exe
-
Size
1.1MB
-
MD5
a859f0dfbadc69d84bb0ed1daee183d0
-
SHA1
7bb797ab83eea823e0c04d065647f10474a5f29e
-
SHA256
46eca7889c0abd85af01f01727a0fab7a942a11d9f52fa135d06fb484abf0569
-
SHA512
6f4061f2353364b710fe71c215859afe4170ea2bd56501aafa2d8e4a030016dca38aa8f15e5f71d206d06fd6423a2c3cd49ae04b75980d7a3bf7a2e66589e03a
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1StE10/ZcnDP1:E5aIwC+Agr6S/FFC+L1
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023419-22.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2944-15-0x0000000002BE0000-0x0000000002C09000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 4372 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe Token: SeTcbPrivilege 4372 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2944 a859f0dfbadc69d84bb0ed1daee183d0_NEIKI.exe 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 4372 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2884 2944 a859f0dfbadc69d84bb0ed1daee183d0_NEIKI.exe 83 PID 2944 wrote to memory of 2884 2944 a859f0dfbadc69d84bb0ed1daee183d0_NEIKI.exe 83 PID 2944 wrote to memory of 2884 2944 a859f0dfbadc69d84bb0ed1daee183d0_NEIKI.exe 83 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2884 wrote to memory of 1704 2884 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 85 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 2980 wrote to memory of 2440 2980 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 102 PID 4372 wrote to memory of 2372 4372 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 110 PID 4372 wrote to memory of 2372 4372 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 110 PID 4372 wrote to memory of 2372 4372 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 110 PID 4372 wrote to memory of 2372 4372 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 110 PID 4372 wrote to memory of 2372 4372 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 110 PID 4372 wrote to memory of 2372 4372 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 110 PID 4372 wrote to memory of 2372 4372 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 110 PID 4372 wrote to memory of 2372 4372 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 110 PID 4372 wrote to memory of 2372 4372 a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a859f0dfbadc69d84bb0ed1daee183d0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\a859f0dfbadc69d84bb0ed1daee183d0_NEIKI.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\WinSocket\a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1704
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2440
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\a969f0dfbadc79d94bb0ed1daee193d0_NFJLJ.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5a859f0dfbadc69d84bb0ed1daee183d0
SHA17bb797ab83eea823e0c04d065647f10474a5f29e
SHA25646eca7889c0abd85af01f01727a0fab7a942a11d9f52fa135d06fb484abf0569
SHA5126f4061f2353364b710fe71c215859afe4170ea2bd56501aafa2d8e4a030016dca38aa8f15e5f71d206d06fd6423a2c3cd49ae04b75980d7a3bf7a2e66589e03a
-
Filesize
74KB
MD5557e02d09bdeec7d09f8ec98e4822a6e
SHA14869b6ace5ee3e20a874dd1d0e59f182e35e6fbe
SHA2562b5d0d341d7de4cf26433f7144172d3d9c726351458f0d84a12660e5bdace27e
SHA512f4571b1b92f7a93c0393941064cf28dec32193dcec08d4fbdb43c6abd3081a98493c0e03b1955076b9575a7a9a60a1187a16d7771501c2ba2eb6e221054d9139