Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 11:13
Behavioral task
behavioral1
Sample
cec1be5717b74cf8124b3177cf2c33a0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
cec1be5717b74cf8124b3177cf2c33a0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
cec1be5717b74cf8124b3177cf2c33a0
-
SHA1
e17d176179c94ea5684de9ab0425510e820a2b95
-
SHA256
ced5a8c4c984bd914c14b5db8193fc5dba297e1c41fd47760becd2d192d6e8a7
-
SHA512
6fca490a3054dead6da6c54fae784c7b7e22c03528cbe397461172d386eb3b8fd9947478bab8eeede680b8f5fca5eacb56ade040dcea1d93367e3265db01dc38
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1SdrzRjVYaQ/n2lbcMfcFoe:E5aIwC+Agr6S/FYqOc25e
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000233e3-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2528-15-0x00000000021E0000-0x0000000002209000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 4336 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe Token: SeTcbPrivilege 4336 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2528 cec1be5717b74cf8124b3177cf2c33a0_NeikiAnalytics.exe 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 4336 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 3320 2528 cec1be5717b74cf8124b3177cf2c33a0_NeikiAnalytics.exe 84 PID 2528 wrote to memory of 3320 2528 cec1be5717b74cf8124b3177cf2c33a0_NeikiAnalytics.exe 84 PID 2528 wrote to memory of 3320 2528 cec1be5717b74cf8124b3177cf2c33a0_NeikiAnalytics.exe 84 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 3320 wrote to memory of 4204 3320 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 86 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 2020 wrote to memory of 4904 2020 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 93 PID 4336 wrote to memory of 2264 4336 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 95 PID 4336 wrote to memory of 2264 4336 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 95 PID 4336 wrote to memory of 2264 4336 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 95 PID 4336 wrote to memory of 2264 4336 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 95 PID 4336 wrote to memory of 2264 4336 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 95 PID 4336 wrote to memory of 2264 4336 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 95 PID 4336 wrote to memory of 2264 4336 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 95 PID 4336 wrote to memory of 2264 4336 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 95 PID 4336 wrote to memory of 2264 4336 cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cec1be5717b74cf8124b3177cf2c33a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\cec1be5717b74cf8124b3177cf2c33a0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Roaming\WinSocket\cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4204
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4904
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\cec1be6818b84cf9124b3188cf2c33a0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5cec1be5717b74cf8124b3177cf2c33a0
SHA1e17d176179c94ea5684de9ab0425510e820a2b95
SHA256ced5a8c4c984bd914c14b5db8193fc5dba297e1c41fd47760becd2d192d6e8a7
SHA5126fca490a3054dead6da6c54fae784c7b7e22c03528cbe397461172d386eb3b8fd9947478bab8eeede680b8f5fca5eacb56ade040dcea1d93367e3265db01dc38
-
Filesize
33KB
MD5478835a7ca905e1a7b7195cdb212779c
SHA1781c1adcbd1ee7345909ce553a35e6a96ed6a902
SHA256c47a00d8c6e38411efcb70362bcf29f9baa74f51ee5b63b6f3f0202c9d756682
SHA5125d112dc7c1e1635cfca641ed2d886fc092b783e7092427ec58a99913dd743fb769bc8b6c8d60112b94cb6183f9e676a295b6f20e4b63a26a9e30ced68bbf1b73