Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 13:09
Behavioral task
behavioral1
Sample
3f71ccce471588c4c2f449a5e7c37e60_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
3f71ccce471588c4c2f449a5e7c37e60_NeikiAnalytics.exe
-
Size
1.0MB
-
MD5
3f71ccce471588c4c2f449a5e7c37e60
-
SHA1
08be5741eb28c10959e4dae7c56aa4e85c81d559
-
SHA256
75d1c7bb492f0216d3179542365a57744157143607d064fe5016374a0b78a230
-
SHA512
d026555c1eee554fc47aa2d29d72c60233bbd2ddc1fab885d478a27c414501488c28a16ceb0752ee4a0614407f10509f4c5b445dffa22999639b930ebff3380d
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUkhmZ9skb:E5aIwC+Agr6SNbp
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002342c-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2876-16-0x0000000002AD0000-0x0000000002AF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 2456 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe Token: SeTcbPrivilege 2456 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2876 3f71ccce471588c4c2f449a5e7c37e60_NeikiAnalytics.exe 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 2456 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2876 wrote to memory of 4252 2876 3f71ccce471588c4c2f449a5e7c37e60_NeikiAnalytics.exe 85 PID 2876 wrote to memory of 4252 2876 3f71ccce471588c4c2f449a5e7c37e60_NeikiAnalytics.exe 85 PID 2876 wrote to memory of 4252 2876 3f71ccce471588c4c2f449a5e7c37e60_NeikiAnalytics.exe 85 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 4252 wrote to memory of 4488 4252 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 86 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 3812 wrote to memory of 4596 3812 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 102 PID 2456 wrote to memory of 2248 2456 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 111 PID 2456 wrote to memory of 2248 2456 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 111 PID 2456 wrote to memory of 2248 2456 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 111 PID 2456 wrote to memory of 2248 2456 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 111 PID 2456 wrote to memory of 2248 2456 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 111 PID 2456 wrote to memory of 2248 2456 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 111 PID 2456 wrote to memory of 2248 2456 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 111 PID 2456 wrote to memory of 2248 2456 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 111 PID 2456 wrote to memory of 2248 2456 3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f71ccce471588c4c2f449a5e7c37e60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3f71ccce471588c4c2f449a5e7c37e60_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Roaming\WinSocket\3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4488
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4596
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3f81ccce481699c4c2f449a6e8c38e70_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD53f71ccce471588c4c2f449a5e7c37e60
SHA108be5741eb28c10959e4dae7c56aa4e85c81d559
SHA25675d1c7bb492f0216d3179542365a57744157143607d064fe5016374a0b78a230
SHA512d026555c1eee554fc47aa2d29d72c60233bbd2ddc1fab885d478a27c414501488c28a16ceb0752ee4a0614407f10509f4c5b445dffa22999639b930ebff3380d
-
Filesize
33KB
MD5058e11ccebafac80bfe4e43009d3fdc0
SHA18a3d538efc79c4ec67d6aad40c15afb2b189ee41
SHA256e87fcfd23689aae7245cf018f51310fc909f3c5dcfcf3d41bc059eb344f4f4e4
SHA5127476c8bfe37ad94550f017f3d4d404718525e3a4870c89ff77a5a36c858c1e68739abae8b704936e5c6693114084080f23c88312174f053ad40f641e710def63