Analysis
-
max time kernel
136s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 11:38
Behavioral task
behavioral1
Sample
d45a19e13760a991dc3e7b6c20b888f0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
d45a19e13760a991dc3e7b6c20b888f0_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
d45a19e13760a991dc3e7b6c20b888f0
-
SHA1
07d5bba02610e6004259b125b8a61dff4d135af4
-
SHA256
43fa6abc93c5fc2638954f466e03ce9486d01db9110aecce5de5a8fbfbbe4f75
-
SHA512
96eacfff7478fa0e4f8bd676edbfb31f6537b07386f1ccf75acbc442f9e3cae8044cb67c5a4f88673387f7e7f6431127b417a85a5d3b834da0e22de1025efb4a
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1SdrzRjVYaQ/n2lbcMfcFRt:E5aIwC+Agr6S/FYqOc20
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023418-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4100-15-0x0000000003010000-0x0000000003039000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 1136 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe Token: SeTcbPrivilege 1136 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4100 d45a19e13760a991dc3e7b6c20b888f0_NeikiAnalytics.exe 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 1136 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4100 wrote to memory of 3924 4100 d45a19e13760a991dc3e7b6c20b888f0_NeikiAnalytics.exe 83 PID 4100 wrote to memory of 3924 4100 d45a19e13760a991dc3e7b6c20b888f0_NeikiAnalytics.exe 83 PID 4100 wrote to memory of 3924 4100 d45a19e13760a991dc3e7b6c20b888f0_NeikiAnalytics.exe 83 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 3924 wrote to memory of 1260 3924 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 84 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 2628 wrote to memory of 3488 2628 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 102 PID 1136 wrote to memory of 4284 1136 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 110 PID 1136 wrote to memory of 4284 1136 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 110 PID 1136 wrote to memory of 4284 1136 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 110 PID 1136 wrote to memory of 4284 1136 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 110 PID 1136 wrote to memory of 4284 1136 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 110 PID 1136 wrote to memory of 4284 1136 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 110 PID 1136 wrote to memory of 4284 1136 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 110 PID 1136 wrote to memory of 4284 1136 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 110 PID 1136 wrote to memory of 4284 1136 d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d45a19e13760a991dc3e7b6c20b888f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d45a19e13760a991dc3e7b6c20b888f0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Roaming\WinSocket\d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1260
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3488
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\d46a19e13870a991dc3e8b7c20b999f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5d45a19e13760a991dc3e7b6c20b888f0
SHA107d5bba02610e6004259b125b8a61dff4d135af4
SHA25643fa6abc93c5fc2638954f466e03ce9486d01db9110aecce5de5a8fbfbbe4f75
SHA51296eacfff7478fa0e4f8bd676edbfb31f6537b07386f1ccf75acbc442f9e3cae8044cb67c5a4f88673387f7e7f6431127b417a85a5d3b834da0e22de1025efb4a
-
Filesize
60KB
MD5e78451207f6823fb91901fc22d9ae9f9
SHA1c4aed98a105f93f0096abeb326994c709f557811
SHA256a42543c9c414290a4a49ddd04fb64387dab3e4e8ba6a7bc08d3102c59103eec0
SHA512051184f8434263d1bb7ef06cedce522733149dfc3c1e5ecd55b6bb993df434b7f5611dbb6bc86e61b8121137614825e02eaa02a70702c4fdf0c61d67e730f4f7