Analysis
-
max time kernel
138s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 12:54
Behavioral task
behavioral1
Sample
b474a43ea56fc721cf27927b4915fc80_NEIKI.exe
Resource
win7-20240221-en
General
-
Target
b474a43ea56fc721cf27927b4915fc80_NEIKI.exe
-
Size
1.3MB
-
MD5
b474a43ea56fc721cf27927b4915fc80
-
SHA1
7bcaac40f65c0b6a779e7c7a433e5e3c573a71ca
-
SHA256
41b15bae142cbf857b319a0251055e6d085bf48c18d19acc7f272bea2a9d7b9a
-
SHA512
f57ccb09635bdc792342bb6a4089e8ec4d89b1f6cec6a69c07c0b95122f5d6604d94acbf73edd1c10c6ae6009f2b047286beae03afd0ebb02d27b1065370637c
-
SSDEEP
24576:zQ5aILMCfmAUjzX6gfU1pjwjbsXhmvZssrD+nRgnf4NvlOS5:E5aIwC+Agr6g81p1vsrNi5
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002342e-22.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2292-15-0x0000000002AF0000-0x0000000002B19000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 1512 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe Token: SeTcbPrivilege 1512 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2292 b474a43ea56fc721cf27927b4915fc80_NEIKI.exe 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 1512 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1468 2292 b474a43ea56fc721cf27927b4915fc80_NEIKI.exe 83 PID 2292 wrote to memory of 1468 2292 b474a43ea56fc721cf27927b4915fc80_NEIKI.exe 83 PID 2292 wrote to memory of 1468 2292 b474a43ea56fc721cf27927b4915fc80_NEIKI.exe 83 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 1468 wrote to memory of 2992 1468 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 85 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 5116 wrote to memory of 4524 5116 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 103 PID 1512 wrote to memory of 816 1512 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 113 PID 1512 wrote to memory of 816 1512 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 113 PID 1512 wrote to memory of 816 1512 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 113 PID 1512 wrote to memory of 816 1512 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 113 PID 1512 wrote to memory of 816 1512 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 113 PID 1512 wrote to memory of 816 1512 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 113 PID 1512 wrote to memory of 816 1512 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 113 PID 1512 wrote to memory of 816 1512 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 113 PID 1512 wrote to memory of 816 1512 b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b474a43ea56fc721cf27927b4915fc80_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\b474a43ea56fc721cf27927b4915fc80_NEIKI.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Roaming\WinSocket\b484a43ea67fc821cf28928b4916fc90_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2992
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\b484a43ea67fc821cf28928b4916fc90_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4524
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\b484a43ea67fc821cf28928b4916fc90_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\b484a43ea67fc821cf28928b4916fc90_NFJLJ.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b474a43ea56fc721cf27927b4915fc80
SHA17bcaac40f65c0b6a779e7c7a433e5e3c573a71ca
SHA25641b15bae142cbf857b319a0251055e6d085bf48c18d19acc7f272bea2a9d7b9a
SHA512f57ccb09635bdc792342bb6a4089e8ec4d89b1f6cec6a69c07c0b95122f5d6604d94acbf73edd1c10c6ae6009f2b047286beae03afd0ebb02d27b1065370637c
-
Filesize
20KB
MD5849400c1d8d2c07b198ee910a9870320
SHA1731b9f4f95189a9cf6bd61044a4de4b4fd9d9f59
SHA256244f34d0ba99a2a7cfd483daa40ecd367a1e9faaa93e2b197d9fe66e0da0f250
SHA5121a366024663f5794079968e1ba52f136694f6f3d7d1a34bf942fcf7dfcba7658842b79f6c29004d81c605c3108311c945d8fd35b0c8d058ae0c5e61a34e1559e