Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 06:11
Behavioral task
behavioral1
Sample
8a5a8ad4f10c8aa72e40fdee32d95cf0_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
8a5a8ad4f10c8aa72e40fdee32d95cf0_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
8a5a8ad4f10c8aa72e40fdee32d95cf0
-
SHA1
74d486634a04867ef0b390bfc82d800aa2848e86
-
SHA256
d5149996a46d07e6db57bc863e9c608df0e95d48d647a7e33e0c59ce2b9c87fd
-
SHA512
850e56c79c780831c8249aa79e51ed07d9c8c6e07e29512ff96cbfbe2078bdfcd1a5e70927715e0dc02760f54504dfcf439f5cc93df3c56812a2e5324021f1d4
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMAOxA5zYlQvmp8RxAb5J6iHsl5TwnD4qL:E5aIwC+Agr6StVEnmcKxYDvZThTwn7L
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002340d-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1040-15-0x00000000022A0000-0x00000000022C9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 3492 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe Token: SeTcbPrivilege 3492 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1040 8a5a8ad4f10c8aa72e40fdee32d95cf0_NeikiAnalytics.exe 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 3492 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1040 wrote to memory of 1576 1040 8a5a8ad4f10c8aa72e40fdee32d95cf0_NeikiAnalytics.exe 82 PID 1040 wrote to memory of 1576 1040 8a5a8ad4f10c8aa72e40fdee32d95cf0_NeikiAnalytics.exe 82 PID 1040 wrote to memory of 1576 1040 8a5a8ad4f10c8aa72e40fdee32d95cf0_NeikiAnalytics.exe 82 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 1576 wrote to memory of 1928 1576 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 83 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3792 wrote to memory of 4640 3792 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 99 PID 3492 wrote to memory of 4676 3492 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 109 PID 3492 wrote to memory of 4676 3492 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 109 PID 3492 wrote to memory of 4676 3492 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 109 PID 3492 wrote to memory of 4676 3492 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 109 PID 3492 wrote to memory of 4676 3492 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 109 PID 3492 wrote to memory of 4676 3492 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 109 PID 3492 wrote to memory of 4676 3492 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 109 PID 3492 wrote to memory of 4676 3492 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 109 PID 3492 wrote to memory of 4676 3492 9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a5a8ad4f10c8aa72e40fdee32d95cf0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8a5a8ad4f10c8aa72e40fdee32d95cf0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Roaming\WinSocket\9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1928
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4640
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\9a6a9ad4f10c9aa82e40fdee32d96cf0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58a5a8ad4f10c8aa72e40fdee32d95cf0
SHA174d486634a04867ef0b390bfc82d800aa2848e86
SHA256d5149996a46d07e6db57bc863e9c608df0e95d48d647a7e33e0c59ce2b9c87fd
SHA512850e56c79c780831c8249aa79e51ed07d9c8c6e07e29512ff96cbfbe2078bdfcd1a5e70927715e0dc02760f54504dfcf439f5cc93df3c56812a2e5324021f1d4
-
Filesize
46KB
MD58392f4f3f9b4386cd73db175b2281f36
SHA120c53e9e4c7939187bb352f5234cb2204f29d476
SHA256d5712eccccb8f5ab30bdaf39e8e556d5f3fb985d922148e421e3f8f234326a4e
SHA5125384ad7176bc4a08e83a28b3b67732b7eadc06f13cda7aa4826b03eaf7771ebe67a06ff63bd33f4a9ff83b02d258211b21627e342ff4542f3cc0dae60f89a814