Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 07:55
Behavioral task
behavioral1
Sample
a76a68e70ed9001d8b8de44ee401f9e0_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
a76a68e70ed9001d8b8de44ee401f9e0_NeikiAnalytics.exe
-
Size
847KB
-
MD5
a76a68e70ed9001d8b8de44ee401f9e0
-
SHA1
405b35db4cc02bff42ae2b3d1dfb01ec5ebc8a34
-
SHA256
ab33a217d08d3824233cbed661bf4a294838ed246fa0a43d8c0e52d25bc53924
-
SHA512
62fe7905e87696e56ca715fe88b250aeaa088d01ccaf223228cc8dc6ddd8f3c326b5e8a2b1f3cc751fa92fe55b5256aa8eacc7251f735e0ea84c73a0c2fe7eab
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSs9U3NL9WEEoLPw9IUMOKg:zQ5aILMCfmAUjzX6xQt9U3917Lw/zx
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000233ff-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4664-15-0x0000000002FD0000-0x0000000002FF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 4476 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe Token: SeTcbPrivilege 4476 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4664 a76a68e70ed9001d8b8de44ee401f9e0_NeikiAnalytics.exe 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 4476 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4664 wrote to memory of 2680 4664 a76a68e70ed9001d8b8de44ee401f9e0_NeikiAnalytics.exe 83 PID 4664 wrote to memory of 2680 4664 a76a68e70ed9001d8b8de44ee401f9e0_NeikiAnalytics.exe 83 PID 4664 wrote to memory of 2680 4664 a76a68e70ed9001d8b8de44ee401f9e0_NeikiAnalytics.exe 83 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 2680 wrote to memory of 1224 2680 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 85 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4760 wrote to memory of 4568 4760 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 93 PID 4476 wrote to memory of 3012 4476 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 95 PID 4476 wrote to memory of 3012 4476 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 95 PID 4476 wrote to memory of 3012 4476 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 95 PID 4476 wrote to memory of 3012 4476 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 95 PID 4476 wrote to memory of 3012 4476 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 95 PID 4476 wrote to memory of 3012 4476 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 95 PID 4476 wrote to memory of 3012 4476 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 95 PID 4476 wrote to memory of 3012 4476 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 95 PID 4476 wrote to memory of 3012 4476 a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a76a68e70ed9001d8b8de44ee401f9e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a76a68e70ed9001d8b8de44ee401f9e0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Roaming\WinSocket\a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1224
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4568
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\a87a79e80ed9001d9b9de44ee401f9e0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
847KB
MD5a76a68e70ed9001d8b8de44ee401f9e0
SHA1405b35db4cc02bff42ae2b3d1dfb01ec5ebc8a34
SHA256ab33a217d08d3824233cbed661bf4a294838ed246fa0a43d8c0e52d25bc53924
SHA51262fe7905e87696e56ca715fe88b250aeaa088d01ccaf223228cc8dc6ddd8f3c326b5e8a2b1f3cc751fa92fe55b5256aa8eacc7251f735e0ea84c73a0c2fe7eab
-
Filesize
63KB
MD5529a9fd0d1717c65907474335d75dded
SHA14861b168007a90922e5a805beb13018660c00261
SHA25634d1cbbf158b610f22420be5b5e3cbd76c8d88006990b4b917ff448409e19f96
SHA51287134ec405cdfa220f907cd24227304a9bf02ccf4b2e9c12f7186284589e565a304c6b57e7b974a9ee4324c229d71edeed18fefb0faed6fa360311bfd09bcc5c