Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 07:18
Behavioral task
behavioral1
Sample
9e4c13e338b107a623c37832a114df80_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
9e4c13e338b107a623c37832a114df80_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
9e4c13e338b107a623c37832a114df80
-
SHA1
95c99d23b7d2d5bd2a6c7b46d660794d4ae4f693
-
SHA256
591fc7aae67312cbec763b3c97140d812e49a492a66c4f25068897a85b34ff3c
-
SHA512
13fafb62156ddae44673028b50fe03650697dc1daf978cbfaa3dc4ea7e0df075b38848aaee68a3eaaf6df5fa3ff1c57407b176e3969d6f70e8726e0f71f518b4
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsA7svY3qbuoVikIXe:E5aIwC+Agr6SNv/Ikee
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023447-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1476-15-0x0000000002C00000-0x0000000002C29000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 448 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe Token: SeTcbPrivilege 448 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1476 9e4c13e338b107a623c37832a114df80_NeikiAnalytics.exe 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 448 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1236 1476 9e4c13e338b107a623c37832a114df80_NeikiAnalytics.exe 83 PID 1476 wrote to memory of 1236 1476 9e4c13e338b107a623c37832a114df80_NeikiAnalytics.exe 83 PID 1476 wrote to memory of 1236 1476 9e4c13e338b107a623c37832a114df80_NeikiAnalytics.exe 83 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 1236 wrote to memory of 4664 1236 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 85 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 2780 wrote to memory of 3940 2780 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 102 PID 448 wrote to memory of 2612 448 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 110 PID 448 wrote to memory of 2612 448 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 110 PID 448 wrote to memory of 2612 448 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 110 PID 448 wrote to memory of 2612 448 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 110 PID 448 wrote to memory of 2612 448 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 110 PID 448 wrote to memory of 2612 448 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 110 PID 448 wrote to memory of 2612 448 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 110 PID 448 wrote to memory of 2612 448 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 110 PID 448 wrote to memory of 2612 448 9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e4c13e338b107a623c37832a114df80_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9e4c13e338b107a623c37832a114df80_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Roaming\WinSocket\9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4664
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3940
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\9e4c13e339b108a723c38932a114df90_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD59e4c13e338b107a623c37832a114df80
SHA195c99d23b7d2d5bd2a6c7b46d660794d4ae4f693
SHA256591fc7aae67312cbec763b3c97140d812e49a492a66c4f25068897a85b34ff3c
SHA51213fafb62156ddae44673028b50fe03650697dc1daf978cbfaa3dc4ea7e0df075b38848aaee68a3eaaf6df5fa3ff1c57407b176e3969d6f70e8726e0f71f518b4
-
Filesize
42KB
MD5d760109e2e5b31ebc0fad469d5b1be70
SHA1f7be15ed845cb433027a87d7f2626c632befac4a
SHA2561a33730dbb2bb925f98308c3ab22c8171bed7615e68982071ff13533327ebcb4
SHA512beb52f5ea214204b865d5bddc37ed06fc1fc7eb7da6d8704eb9700b18f3fa09f9f430221cfea64fe7a21908e9c19b348090fa229255578ce37a2cded0f836b69