Analysis
-
max time kernel
140s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 19:00
Behavioral task
behavioral1
Sample
12846998624532f99e5b2875a3b0c4f0_NEIKI.exe
Resource
win7-20240508-en
General
-
Target
12846998624532f99e5b2875a3b0c4f0_NEIKI.exe
-
Size
1.0MB
-
MD5
12846998624532f99e5b2875a3b0c4f0
-
SHA1
812aecefdb659ef8e31e85f31bbd6eba7a36c509
-
SHA256
941e0bcaee7af2826dfecd626a9bc95f507e41cbeac913abd0299cc89dad1480
-
SHA512
981b2f74780a2908adf506f9ee31021bc265086b810568298fe206f10843178cca19eb283b8cfbf21828f337afa123774261336349a3c531513c65d249d42200
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQtpj/Yz6XVSvmHaZ9uvCB4NQb:E5aIwC+Agr6St1lOqIugMQb
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002340d-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/764-15-0x0000000002C00000-0x0000000002C29000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 2864 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe Token: SeTcbPrivilege 2864 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 764 12846998624532f99e5b2875a3b0c4f0_NEIKI.exe 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 2864 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 764 wrote to memory of 1452 764 12846998624532f99e5b2875a3b0c4f0_NEIKI.exe 82 PID 764 wrote to memory of 1452 764 12846998624532f99e5b2875a3b0c4f0_NEIKI.exe 82 PID 764 wrote to memory of 1452 764 12846998624532f99e5b2875a3b0c4f0_NEIKI.exe 82 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 1452 wrote to memory of 3804 1452 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 83 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 4560 wrote to memory of 1720 4560 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 100 PID 2864 wrote to memory of 3132 2864 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 110 PID 2864 wrote to memory of 3132 2864 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 110 PID 2864 wrote to memory of 3132 2864 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 110 PID 2864 wrote to memory of 3132 2864 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 110 PID 2864 wrote to memory of 3132 2864 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 110 PID 2864 wrote to memory of 3132 2864 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 110 PID 2864 wrote to memory of 3132 2864 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 110 PID 2864 wrote to memory of 3132 2864 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 110 PID 2864 wrote to memory of 3132 2864 12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\12846998624532f99e5b2875a3b0c4f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\12846998624532f99e5b2875a3b0c4f0_NEIKI.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Roaming\WinSocket\12947999724632f99e6b2986a3b0c4f0_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3804
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\12947999724632f99e6b2986a3b0c4f0_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1720
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\12947999724632f99e6b2986a3b0c4f0_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\12947999724632f99e6b2986a3b0c4f0_NFJLJ.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD512846998624532f99e5b2875a3b0c4f0
SHA1812aecefdb659ef8e31e85f31bbd6eba7a36c509
SHA256941e0bcaee7af2826dfecd626a9bc95f507e41cbeac913abd0299cc89dad1480
SHA512981b2f74780a2908adf506f9ee31021bc265086b810568298fe206f10843178cca19eb283b8cfbf21828f337afa123774261336349a3c531513c65d249d42200
-
Filesize
42KB
MD5f31b8117359a63daf64b950738627b5b
SHA1f12b661535180cea20077e0246e887dca61fec83
SHA2561e83a1cc227d1904f19644ce0b03a09a4f779e45e006710d6622e1e6f55e860b
SHA51279da3534223f7ab36300d278e420ee41270a77e9c9a9fdc995d2f57d43f9e9610f4ec344aa8cb0b37a342f046c217973a37ef6577884fbfd7c1948a0944a45f3