Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 03:12
Behavioral task
behavioral1
Sample
67f44c99cb965cb09a57f34219574980_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
67f44c99cb965cb09a57f34219574980_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
67f44c99cb965cb09a57f34219574980
-
SHA1
300f912bb44ca16f3fd0a1178099b8f096874063
-
SHA256
f6ccfbafa1708d75fdec85aa70fd3359a58eadfe21583eb0e85f4b694d78eaff
-
SHA512
6e23cc6cb1c8b556cd928d42d0d6f28ce129b9ed7cdfbed36ffd157371d3f346c8f6e590a3aa70c6f399beebe6486f6ec499b4c6ca51fc73cf7e32c758668762
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1SdrzRjVYaQ/n2lbcMfcF/LO:E5aIwC+Agr6S/FYqOc2J
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000233bf-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1652-15-0x00000000021F0000-0x0000000002219000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 1460 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe Token: SeTcbPrivilege 1460 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1652 67f44c99cb965cb09a57f34219574980_NeikiAnalytics.exe 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 1460 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1652 wrote to memory of 3648 1652 67f44c99cb965cb09a57f34219574980_NeikiAnalytics.exe 83 PID 1652 wrote to memory of 3648 1652 67f44c99cb965cb09a57f34219574980_NeikiAnalytics.exe 83 PID 1652 wrote to memory of 3648 1652 67f44c99cb965cb09a57f34219574980_NeikiAnalytics.exe 83 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 3648 wrote to memory of 2776 3648 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 85 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 464 wrote to memory of 3532 464 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 92 PID 1460 wrote to memory of 1464 1460 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 94 PID 1460 wrote to memory of 1464 1460 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 94 PID 1460 wrote to memory of 1464 1460 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 94 PID 1460 wrote to memory of 1464 1460 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 94 PID 1460 wrote to memory of 1464 1460 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 94 PID 1460 wrote to memory of 1464 1460 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 94 PID 1460 wrote to memory of 1464 1460 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 94 PID 1460 wrote to memory of 1464 1460 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 94 PID 1460 wrote to memory of 1464 1460 78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\67f44c99cb965cb09a57f34219574980_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\67f44c99cb965cb09a57f34219574980_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Roaming\WinSocket\78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2776
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3532
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\78f44c99cb976cb09a68f34219684990_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD567f44c99cb965cb09a57f34219574980
SHA1300f912bb44ca16f3fd0a1178099b8f096874063
SHA256f6ccfbafa1708d75fdec85aa70fd3359a58eadfe21583eb0e85f4b694d78eaff
SHA5126e23cc6cb1c8b556cd928d42d0d6f28ce129b9ed7cdfbed36ffd157371d3f346c8f6e590a3aa70c6f399beebe6486f6ec499b4c6ca51fc73cf7e32c758668762
-
Filesize
8KB
MD55024ec61dde3d778891cff02c3481be2
SHA1446ab994173b559e0275201dc3bcdc6f212a7199
SHA2566898946376cf5d5a6683cadddac6f233f88be6920d6dc33ea03bc701a7ad9081
SHA512f7c32bb7f794355470aa33579d23bc5d715402015c14754a49d00ded59319c98eb6e1cee4b264c9f3966468bb6d9fc07ac25f0fc3f6b9700cfd58fd368ea741a