Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 08:51
Behavioral task
behavioral1
Sample
add356a1dbfcd8e43eded85c710f0c50_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
add356a1dbfcd8e43eded85c710f0c50_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
add356a1dbfcd8e43eded85c710f0c50
-
SHA1
22bf6fe1511d7a92d4c7690547f3424c13f7def4
-
SHA256
8a497d7a96c6382c7c5c68db1c252bb14a43e0fe2cb450bed61693d08e22244e
-
SHA512
d838cdd61636a0268626a4b488787dcab52c2a4759a42812dd5cd83fc253e56fbb65124b4b81f2e35bca8932c03575dab0c09e95d1e3aa1b33d0ca9d81bf5545
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMAOxA5zYlQvmp8RxAb5J6iHsl5TwnD4sn:E5aIwC+Agr6StVEnmcKxYDvZThTwnD
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023438-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2420-15-0x0000000002FD0000-0x0000000002FF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 3900 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe Token: SeTcbPrivilege 3900 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2420 add356a1dbfcd8e43eded85c710f0c50_NeikiAnalytics.exe 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 3900 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3628 2420 add356a1dbfcd8e43eded85c710f0c50_NeikiAnalytics.exe 83 PID 2420 wrote to memory of 3628 2420 add356a1dbfcd8e43eded85c710f0c50_NeikiAnalytics.exe 83 PID 2420 wrote to memory of 3628 2420 add356a1dbfcd8e43eded85c710f0c50_NeikiAnalytics.exe 83 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 3628 wrote to memory of 464 3628 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 84 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 2280 wrote to memory of 1624 2280 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 100 PID 3900 wrote to memory of 4896 3900 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 109 PID 3900 wrote to memory of 4896 3900 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 109 PID 3900 wrote to memory of 4896 3900 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 109 PID 3900 wrote to memory of 4896 3900 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 109 PID 3900 wrote to memory of 4896 3900 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 109 PID 3900 wrote to memory of 4896 3900 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 109 PID 3900 wrote to memory of 4896 3900 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 109 PID 3900 wrote to memory of 4896 3900 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 109 PID 3900 wrote to memory of 4896 3900 add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\add356a1dbfcd8e43eded85c710f0c50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\add356a1dbfcd8e43eded85c710f0c50_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Roaming\WinSocket\add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:464
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1624
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\add367a1dbfcd9e43eded96c810f0c60_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5add356a1dbfcd8e43eded85c710f0c50
SHA122bf6fe1511d7a92d4c7690547f3424c13f7def4
SHA2568a497d7a96c6382c7c5c68db1c252bb14a43e0fe2cb450bed61693d08e22244e
SHA512d838cdd61636a0268626a4b488787dcab52c2a4759a42812dd5cd83fc253e56fbb65124b4b81f2e35bca8932c03575dab0c09e95d1e3aa1b33d0ca9d81bf5545
-
Filesize
52KB
MD57c34994097a65c4671f6d5f1ec039a87
SHA175bd359a55e6079ec467ebce36571dbc82536480
SHA256d722e1a99ae3dc8bed9fb57504d72e0700f80a562d1249fa2fd7d4bd06a60b25
SHA512f4391d754c8cd4b9b1abef670a059d059b4faf4c235ed82998d6f86acd1c368e58716d4e3864c833ebbd4f3513026f45507a2e5b1a080b5296d03ea2eadbd18f