Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 20:20
Behavioral task
behavioral1
Sample
eb2bb9df20395e49df2ddd2fabd40b60_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
eb2bb9df20395e49df2ddd2fabd40b60_NeikiAnalytics.exe
-
Size
912KB
-
MD5
eb2bb9df20395e49df2ddd2fabd40b60
-
SHA1
b4d07606fc61b8aa01157429d4437c6e46f44381
-
SHA256
021963f3c5510d0bebd59ba4e9adb52207c18833f71d873e6bbdcb337070bcec
-
SHA512
d84812197075f51d169f0511a600685aea2e7411db1416cb6226f4148e76505993e4a8abd1891ec12131a7c0d8d2b36d106a66f7a14d7f6c1137e53b61453e37
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4EnpZgkJOSSkW:E5aIwC+Agr6StVEn0ksb
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002341d-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3260-15-0x0000000002AC0000-0x0000000002AE9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 4424 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe Token: SeTcbPrivilege 4424 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3260 eb2bb9df20395e49df2ddd2fabd40b60_NeikiAnalytics.exe 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 4424 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3260 wrote to memory of 2664 3260 eb2bb9df20395e49df2ddd2fabd40b60_NeikiAnalytics.exe 84 PID 3260 wrote to memory of 2664 3260 eb2bb9df20395e49df2ddd2fabd40b60_NeikiAnalytics.exe 84 PID 3260 wrote to memory of 2664 3260 eb2bb9df20395e49df2ddd2fabd40b60_NeikiAnalytics.exe 84 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 2664 wrote to memory of 1056 2664 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 86 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 1652 wrote to memory of 4308 1652 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 94 PID 4424 wrote to memory of 4688 4424 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 96 PID 4424 wrote to memory of 4688 4424 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 96 PID 4424 wrote to memory of 4688 4424 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 96 PID 4424 wrote to memory of 4688 4424 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 96 PID 4424 wrote to memory of 4688 4424 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 96 PID 4424 wrote to memory of 4688 4424 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 96 PID 4424 wrote to memory of 4688 4424 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 96 PID 4424 wrote to memory of 4688 4424 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 96 PID 4424 wrote to memory of 4688 4424 eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb2bb9df20395e49df2ddd2fabd40b60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\eb2bb9df20395e49df2ddd2fabd40b60_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Roaming\WinSocket\eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1056
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4308
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\eb2bb9df20396e49df2ddd2fabd40b70_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
912KB
MD5eb2bb9df20395e49df2ddd2fabd40b60
SHA1b4d07606fc61b8aa01157429d4437c6e46f44381
SHA256021963f3c5510d0bebd59ba4e9adb52207c18833f71d873e6bbdcb337070bcec
SHA512d84812197075f51d169f0511a600685aea2e7411db1416cb6226f4148e76505993e4a8abd1891ec12131a7c0d8d2b36d106a66f7a14d7f6c1137e53b61453e37
-
Filesize
29KB
MD58627d290fd601e2befe4703b746cafc5
SHA16a79cec92888e36a7a16f01e76c48ccf7c743c9c
SHA2569919ea2f0ed29e4af0558734df1fd288291f35962e41c010bc784f96de2991b2
SHA5122438d6a75ba892be8c2f07661a068f66914eac4b5f1ba56c5e016992afce0d57b886f832b3fa6e8fd53b9031c49659c88f900536bd22bc57b16f551949808ada