Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 07:01
Behavioral task
behavioral1
Sample
99429684149d9c8a06e7ab4e1874c180_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
99429684149d9c8a06e7ab4e1874c180_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
99429684149d9c8a06e7ab4e1874c180
-
SHA1
024103b0de1bdb5f04a2f7472d3fa93a0f3150fd
-
SHA256
20aadfdd78f20a3e5f05bbd2b523d20effb62590fd465608ff9819aa807eb768
-
SHA512
7390353a065d921e77c484eb806546f78116168a62d66ee8a14486dce465ae18118d6d29b9c6110494b1ad1d0210a35f699ff5ec58d7a9a0a86c1c6ed436c161
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQtpj/Yz6XVSvmHaZkI+oq6dTnHv5yIi734DHrPyFX7o:E5aIwC+Agr6St1lOqq+jCpLPQo
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1304-15-0x0000000002FD0000-0x0000000002FF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exepid process 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe 4428 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe Token: SeTcbPrivilege 4428 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
99429684149d9c8a06e7ab4e1874c180_NeikiAnalytics.exe99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exepid process 1304 99429684149d9c8a06e7ab4e1874c180_NeikiAnalytics.exe 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe 4428 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
99429684149d9c8a06e7ab4e1874c180_NeikiAnalytics.exe99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exedescription pid process target process PID 1304 wrote to memory of 512 1304 99429684149d9c8a06e7ab4e1874c180_NeikiAnalytics.exe 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe PID 1304 wrote to memory of 512 1304 99429684149d9c8a06e7ab4e1874c180_NeikiAnalytics.exe 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe PID 1304 wrote to memory of 512 1304 99429684149d9c8a06e7ab4e1874c180_NeikiAnalytics.exe 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 512 wrote to memory of 3708 512 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 3384 wrote to memory of 4000 3384 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 4428 wrote to memory of 4800 4428 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 4428 wrote to memory of 4800 4428 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 4428 wrote to memory of 4800 4428 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 4428 wrote to memory of 4800 4428 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 4428 wrote to memory of 4800 4428 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 4428 wrote to memory of 4800 4428 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 4428 wrote to memory of 4800 4428 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 4428 wrote to memory of 4800 4428 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe PID 4428 wrote to memory of 4800 4428 99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\99429684149d9c8a06e7ab4e1874c180_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\99429684149d9c8a06e7ab4e1874c180_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Roaming\WinSocket\99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3708
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4000
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\99429794149d9c9a07e8ab4e1984c190_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD599429684149d9c8a06e7ab4e1874c180
SHA1024103b0de1bdb5f04a2f7472d3fa93a0f3150fd
SHA25620aadfdd78f20a3e5f05bbd2b523d20effb62590fd465608ff9819aa807eb768
SHA5127390353a065d921e77c484eb806546f78116168a62d66ee8a14486dce465ae18118d6d29b9c6110494b1ad1d0210a35f699ff5ec58d7a9a0a86c1c6ed436c161
-
Filesize
24KB
MD51456a9c9f9fe53c10a405519d63744fc
SHA19e2ceb93de55330ff9518867420ef63acef1e3e7
SHA25630153e54adeb5485e8d27c33135422120f94f0d956e85d856b159f4725286ebe
SHA5127f9dc615d4a1bf67c15a11f008fad17128fd36ff4021932ccef2f7212193ec3b2c3410fdf506a4afd8be3fc6901eed89e2322a132fca0e468edc5b6ec559b175