Analysis
-
max time kernel
139s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 23:08
Behavioral task
behavioral1
Sample
1a3be439bc5fe965e533da94201bbc90_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
1a3be439bc5fe965e533da94201bbc90_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
1a3be439bc5fe965e533da94201bbc90
-
SHA1
3970a6ead6acf8de69be6c2d321e4ebbe0607cb0
-
SHA256
697472b5fafa374cfa9764eeba960dcb3187e53b721a5a8345e2bb3edd4acae2
-
SHA512
80cec20a9e29a025b90543cf90a4d8e7d42ea9006f8629ce46c0e1431748d115b41444423810eb8ba485073801919c77934697053c0283b1d21c7a4b2871b310
-
SSDEEP
24576:zQ5aILMCfmAUjzX677WOMc7qzz1IojVD0FV:E5aIwC+Agr6twjVDu
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023440-22.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1516-15-0x0000000002360000-0x0000000002389000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 4412 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe Token: SeTcbPrivilege 4412 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1516 1a3be439bc5fe965e533da94201bbc90_NeikiAnalytics.exe 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 4412 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1516 wrote to memory of 4900 1516 1a3be439bc5fe965e533da94201bbc90_NeikiAnalytics.exe 83 PID 1516 wrote to memory of 4900 1516 1a3be439bc5fe965e533da94201bbc90_NeikiAnalytics.exe 83 PID 1516 wrote to memory of 4900 1516 1a3be439bc5fe965e533da94201bbc90_NeikiAnalytics.exe 83 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4900 wrote to memory of 2572 4900 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 84 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4596 wrote to memory of 4060 4596 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 103 PID 4412 wrote to memory of 1712 4412 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 112 PID 4412 wrote to memory of 1712 4412 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 112 PID 4412 wrote to memory of 1712 4412 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 112 PID 4412 wrote to memory of 1712 4412 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 112 PID 4412 wrote to memory of 1712 4412 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 112 PID 4412 wrote to memory of 1712 4412 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 112 PID 4412 wrote to memory of 1712 4412 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 112 PID 4412 wrote to memory of 1712 4412 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 112 PID 4412 wrote to memory of 1712 4412 1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a3be439bc5fe965e533da94201bbc90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1a3be439bc5fe965e533da94201bbc90_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Roaming\WinSocket\1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2572
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4060
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\1a3be439bc6fe976e633da94201bbc90_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD51a3be439bc5fe965e533da94201bbc90
SHA13970a6ead6acf8de69be6c2d321e4ebbe0607cb0
SHA256697472b5fafa374cfa9764eeba960dcb3187e53b721a5a8345e2bb3edd4acae2
SHA51280cec20a9e29a025b90543cf90a4d8e7d42ea9006f8629ce46c0e1431748d115b41444423810eb8ba485073801919c77934697053c0283b1d21c7a4b2871b310
-
Filesize
34KB
MD5d82aa1668fd1e1cd271da4f2f7a65f78
SHA1c83590048fa31aedf24d67562485ef024f40edb9
SHA25669c51644e1d5014b16ce08941e8d52f0b7192d9108cc5b1d5deb67a05be16586
SHA5120d19f05aa8c5261371418334e11b7e313304dad9ec35b2d6879a40035f2547ca08fb496ec8442c0d4c0162145f91ca3422c7644d6260820cd48628d24a6eb610