Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 22:03
Behavioral task
behavioral1
Sample
0a334198512183b06eeee1994d5e06b0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
0a334198512183b06eeee1994d5e06b0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
0a334198512183b06eeee1994d5e06b0
-
SHA1
03d068afda3232ad055a278e4559436d7b277f25
-
SHA256
5ac9f80842b118118048639af99d471547a4cf2f515a2430eeac04b2c8984336
-
SHA512
2dcde422a6689aef65f4adb5e188eb7ac4dc59b6387fa6b2494639408e5829e826d68544cd97ac3aa2a6c7a4c5175554d80f3c76cebe6c8cde6d5ca85774692c
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsA7svY3qbuoVikIXeq1H3K:E5aIwC+Agr6SNv/Ikeeya
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000800000002340d-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/848-15-0x00000000022F0000-0x0000000002319000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 4092 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe Token: SeTcbPrivilege 4092 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 848 0a334198512183b06eeee1994d5e06b0_NeikiAnalytics.exe 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 4092 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 848 wrote to memory of 4904 848 0a334198512183b06eeee1994d5e06b0_NeikiAnalytics.exe 82 PID 848 wrote to memory of 4904 848 0a334198512183b06eeee1994d5e06b0_NeikiAnalytics.exe 82 PID 848 wrote to memory of 4904 848 0a334198512183b06eeee1994d5e06b0_NeikiAnalytics.exe 82 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4904 wrote to memory of 3564 4904 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 83 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4952 wrote to memory of 1004 4952 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 97 PID 4092 wrote to memory of 3472 4092 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 107 PID 4092 wrote to memory of 3472 4092 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 107 PID 4092 wrote to memory of 3472 4092 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 107 PID 4092 wrote to memory of 3472 4092 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 107 PID 4092 wrote to memory of 3472 4092 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 107 PID 4092 wrote to memory of 3472 4092 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 107 PID 4092 wrote to memory of 3472 4092 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 107 PID 4092 wrote to memory of 3472 4092 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 107 PID 4092 wrote to memory of 3472 4092 0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a334198512183b06eeee1994d5e06b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0a334198512183b06eeee1994d5e06b0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Roaming\WinSocket\0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3564
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1004
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0a334199612193b07eeee1994d6e07b0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD50a334198512183b06eeee1994d5e06b0
SHA103d068afda3232ad055a278e4559436d7b277f25
SHA2565ac9f80842b118118048639af99d471547a4cf2f515a2430eeac04b2c8984336
SHA5122dcde422a6689aef65f4adb5e188eb7ac4dc59b6387fa6b2494639408e5829e826d68544cd97ac3aa2a6c7a4c5175554d80f3c76cebe6c8cde6d5ca85774692c
-
Filesize
52KB
MD5a9abb04e463c61ecc2753f504335da2b
SHA12d4d8553e26fb14a55e34fa156053821d3db3009
SHA256daedd136841cf905a5e20e8ff3bb676f4d0b02f57c076ad372525193bf2bf143
SHA5121364fc813d4f65e7d83b74bdefe2d5cf4047adc6b73906af83625eca0e60e081f720396059f950147ffcfa2fa69d98fee4a3539ec7e7bfc02a5a90c3fc65a45e