Analysis
-
max time kernel
140s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 18:50
Behavioral task
behavioral1
Sample
0f3410be43bd9139997b53dc571304b0_NEIKI.exe
Resource
win7-20240215-en
General
-
Target
0f3410be43bd9139997b53dc571304b0_NEIKI.exe
-
Size
1002KB
-
MD5
0f3410be43bd9139997b53dc571304b0
-
SHA1
cb2e743d8254185d7bec6b3ae6af6312d4e0e835
-
SHA256
be8e046a55140023cef54bd6bdd1c8a089be2abd0375265e0c110c58a0874a83
-
SHA512
96140ab4e9c10cf81d55060c9a58d49338e60d0caf11a1a55d21f97a9e901541acb6bfaed5dfbcbf1c2050407b10ce88b08bda478be98b820c9849f140701c05
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsfUhQEsBLKR0ox5r93g1aKs2lyLU:zQ5aILMCfmAUjzX6xQtNBMtOFsXS
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000800000002325a-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/824-17-0x0000000002A90000-0x0000000002AB9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 2168 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 824 0f3410be43bd9139997b53dc571304b0_NEIKI.exe 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 2168 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 824 wrote to memory of 4236 824 0f3410be43bd9139997b53dc571304b0_NEIKI.exe 90 PID 824 wrote to memory of 4236 824 0f3410be43bd9139997b53dc571304b0_NEIKI.exe 90 PID 824 wrote to memory of 4236 824 0f3410be43bd9139997b53dc571304b0_NEIKI.exe 90 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 4236 wrote to memory of 4740 4236 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 91 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 PID 2524 wrote to memory of 3712 2524 0f3410be43bd9139998b63dc681304b0_NFJLJ.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f3410be43bd9139997b53dc571304b0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\0f3410be43bd9139997b53dc571304b0_NEIKI.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Roaming\WinSocket\0f3410be43bd9139998b63dc681304b0_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\0f3410be43bd9139998b63dc681304b0_NFJLJ.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4740
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1316 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:2212
-
C:\Users\Admin\AppData\Roaming\WinSocket\0f3410be43bd9139998b63dc681304b0_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\0f3410be43bd9139998b63dc681304b0_NFJLJ.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3712
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\0f3410be43bd9139998b63dc681304b0_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\0f3410be43bd9139998b63dc681304b0_NFJLJ.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2168 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1002KB
MD50f3410be43bd9139997b53dc571304b0
SHA1cb2e743d8254185d7bec6b3ae6af6312d4e0e835
SHA256be8e046a55140023cef54bd6bdd1c8a089be2abd0375265e0c110c58a0874a83
SHA51296140ab4e9c10cf81d55060c9a58d49338e60d0caf11a1a55d21f97a9e901541acb6bfaed5dfbcbf1c2050407b10ce88b08bda478be98b820c9849f140701c05
-
Filesize
374KB
MD52c28ba45f5aec7f1fc064d5dec208627
SHA1e2b69d7af94d23aea6052472741b2d7c694a563f
SHA2562c08317b6fd8d4c48bf8aafd86c7361a253124ed0492b76b87629f8cf8a0032f
SHA5120826a08a556a728110ae94d95f9612a7fa477b940501b16290f651dda3ab1873f19ad3bf4a3c8e33f45599cc99796d919b6eaf34e40255ebad0180f69174b5a3
-
Filesize
57KB
MD50d9fb8e416ee9563c0cd29ddbcfb25ce
SHA102d592be0a07fb5d02676b1880f1199a33553ec2
SHA25697503ef71fef8020c80e7ec1ccec1ecb31f4de95fe1d81c609ed2553d82f2b2b
SHA512cb57727185bb436a134de7c1c300417d1bcf14562bbd0f7514bf179f63514b1ad44aa3f783b31afa2bfe1fe0feb9f0231bef6349f5bd2800e22cde2bc55c0f94