Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 03:29
Static task
static1
Behavioral task
behavioral1
Sample
df7d957c02423b804f18b71df13669e0_NEIKI.exe
Resource
win7-20240221-en
General
-
Target
df7d957c02423b804f18b71df13669e0_NEIKI.exe
-
Size
798KB
-
MD5
df7d957c02423b804f18b71df13669e0
-
SHA1
6b036e51d20995c61d83bba899ef10ae8cf557b5
-
SHA256
96311437bea32a92b838984c075facdf86beed77376eac5dcd81c2ed671823dc
-
SHA512
d5f40b234e3906c7ed18a8d83b893c3a6d27374c1b0afbdcee7f09dbdd2d9ba7c16267b84884fc92ad1da3f598bd154a681e108a02bc1a478b09c9c20eaa9a51
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUt3r4DwpRrKO1YYVhiiNdvrsymrs:zQ5aILMCfmAUhrSO1YNWdvKrs
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2372-15-0x0000000002AC0000-0x0000000002AE9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 4764 df8d968c02423b904f19b81df13779e0_NFJLJ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe Token: SeTcbPrivilege 4764 df8d968c02423b904f19b81df13779e0_NFJLJ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2372 df7d957c02423b804f18b71df13669e0_NEIKI.exe 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 4764 df8d968c02423b904f19b81df13779e0_NFJLJ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 4044 2372 df7d957c02423b804f18b71df13669e0_NEIKI.exe 82 PID 2372 wrote to memory of 4044 2372 df7d957c02423b804f18b71df13669e0_NEIKI.exe 82 PID 2372 wrote to memory of 4044 2372 df7d957c02423b804f18b71df13669e0_NEIKI.exe 82 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 4044 wrote to memory of 1952 4044 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 83 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 3456 wrote to memory of 3812 3456 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 87 PID 4764 wrote to memory of 2040 4764 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 89 PID 4764 wrote to memory of 2040 4764 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 89 PID 4764 wrote to memory of 2040 4764 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 89 PID 4764 wrote to memory of 2040 4764 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 89 PID 4764 wrote to memory of 2040 4764 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 89 PID 4764 wrote to memory of 2040 4764 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 89 PID 4764 wrote to memory of 2040 4764 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 89 PID 4764 wrote to memory of 2040 4764 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 89 PID 4764 wrote to memory of 2040 4764 df8d968c02423b904f19b81df13779e0_NFJLJ.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\df7d957c02423b804f18b71df13669e0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\df7d957c02423b804f18b71df13669e0_NEIKI.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\WinSocket\df8d968c02423b904f19b81df13779e0_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\df8d968c02423b904f19b81df13779e0_NFJLJ.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1952
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\df8d968c02423b904f19b81df13779e0_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\df8d968c02423b904f19b81df13779e0_NFJLJ.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3812
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\df8d968c02423b904f19b81df13779e0_NFJLJ.exeC:\Users\Admin\AppData\Roaming\WinSocket\df8d968c02423b904f19b81df13779e0_NFJLJ.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
798KB
MD5df7d957c02423b804f18b71df13669e0
SHA16b036e51d20995c61d83bba899ef10ae8cf557b5
SHA25696311437bea32a92b838984c075facdf86beed77376eac5dcd81c2ed671823dc
SHA512d5f40b234e3906c7ed18a8d83b893c3a6d27374c1b0afbdcee7f09dbdd2d9ba7c16267b84884fc92ad1da3f598bd154a681e108a02bc1a478b09c9c20eaa9a51
-
Filesize
43KB
MD5a8a905b2ee60cf9503a5995a86232a19
SHA103889afd099ad6a24629a241ed7910c338ea6412
SHA256592b110f4da9da9302c5bdb750cef55374d4991d8fe5868ec2875782dd8b2c53
SHA51281df832be330e669522d85860a4c5ede682ae3bff0840110ec56b7e430c9df019f4fb4946759d9ee4ba75cb0fea150a266ace98f1fde117c6cf336f399a45a87