Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 03:30
Behavioral task
behavioral1
Sample
5d93928ccf09c20d6522d816ca227780_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
5d93928ccf09c20d6522d816ca227780_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
5d93928ccf09c20d6522d816ca227780
-
SHA1
d32641d0f7348e1978b1956be04604203c276a01
-
SHA256
646c23196f898c83cfd2572e8a9de6c543f927b85267352ebe0d394b65f211c6
-
SHA512
9487aad0558ca456e2d499e92139b52519a45dbd1dc4aebd7d82ff6fe15c1252dbd77474bd751db1387244214a19305f61275e24fb36061b2ebcf302885aaeb8
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsA7svY3qbuoVikIXyN9B9:E5aIwC+Agr6SNv/IkeyND9
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023432-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3208-15-0x0000000002210000-0x0000000002239000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 4032 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe Token: SeTcbPrivilege 4032 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3208 5d93928ccf09c20d6522d816ca227780_NeikiAnalytics.exe 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 4032 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3208 wrote to memory of 5020 3208 5d93928ccf09c20d6522d816ca227780_NeikiAnalytics.exe 83 PID 3208 wrote to memory of 5020 3208 5d93928ccf09c20d6522d816ca227780_NeikiAnalytics.exe 83 PID 3208 wrote to memory of 5020 3208 5d93928ccf09c20d6522d816ca227780_NeikiAnalytics.exe 83 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 5020 wrote to memory of 1308 5020 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 84 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4624 wrote to memory of 3460 4624 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 90 PID 4032 wrote to memory of 1280 4032 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 92 PID 4032 wrote to memory of 1280 4032 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 92 PID 4032 wrote to memory of 1280 4032 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 92 PID 4032 wrote to memory of 1280 4032 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 92 PID 4032 wrote to memory of 1280 4032 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 92 PID 4032 wrote to memory of 1280 4032 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 92 PID 4032 wrote to memory of 1280 4032 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 92 PID 4032 wrote to memory of 1280 4032 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 92 PID 4032 wrote to memory of 1280 4032 6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d93928ccf09c20d6522d816ca227780_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5d93928ccf09c20d6522d816ca227780_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Roaming\WinSocket\6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1308
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3460
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\6d93929ccf09c20d7622d917ca228890_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD55d93928ccf09c20d6522d816ca227780
SHA1d32641d0f7348e1978b1956be04604203c276a01
SHA256646c23196f898c83cfd2572e8a9de6c543f927b85267352ebe0d394b65f211c6
SHA5129487aad0558ca456e2d499e92139b52519a45dbd1dc4aebd7d82ff6fe15c1252dbd77474bd751db1387244214a19305f61275e24fb36061b2ebcf302885aaeb8
-
Filesize
56KB
MD563e97288c17d7be6de558d1d2c704122
SHA13fb99f78e893e68da0993af5e5586309ec3ab061
SHA256ae2c06c4f9ff664fdd226a0d2d23d209ade11e234ecd0a606dec905e0afddd7c
SHA5120033f8646dc3123f5337501e926bf381a11250127033338512e98544b988b42f4c0bf7a8c1ff3baf406eb34621214990b3764e9900f2c368012cf9bedbecf59c