Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 15:34
Behavioral task
behavioral1
Sample
14f75789c2bcff0d8e8152d22e80ded0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
14f75789c2bcff0d8e8152d22e80ded0_NeikiAnalytics.exe
-
Size
904KB
-
MD5
14f75789c2bcff0d8e8152d22e80ded0
-
SHA1
ffac48b665739eb7322bc8ee8a8d74fd7f4d1e28
-
SHA256
8cd7a0b9288d7871050a26d856e8cf36bffab3c5cf2ef8c38d5c9220d80334e2
-
SHA512
910c1c9e8b79c57a2ca1b3d22dedcdf2690bb7fcb6514a05bac5f3b898c21dfca481a88598e635a287662e011efb1bd84aeabba3e2828f9077f132ca779af185
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnmas:zQ5aILMCfmAUjzX6xQtjmssv
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4424-15-0x0000000002FF0000-0x0000000003019000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exepid process 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe 220 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe Token: SeTcbPrivilege 220 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
14f75789c2bcff0d8e8152d22e80ded0_NeikiAnalytics.exe14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exepid process 4424 14f75789c2bcff0d8e8152d22e80ded0_NeikiAnalytics.exe 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe 220 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
14f75789c2bcff0d8e8152d22e80ded0_NeikiAnalytics.exe14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exedescription pid process target process PID 4424 wrote to memory of 2128 4424 14f75789c2bcff0d8e8152d22e80ded0_NeikiAnalytics.exe 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe PID 4424 wrote to memory of 2128 4424 14f75789c2bcff0d8e8152d22e80ded0_NeikiAnalytics.exe 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe PID 4424 wrote to memory of 2128 4424 14f75789c2bcff0d8e8152d22e80ded0_NeikiAnalytics.exe 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2128 wrote to memory of 3548 2128 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 2788 wrote to memory of 1376 2788 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 220 wrote to memory of 4356 220 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 220 wrote to memory of 4356 220 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 220 wrote to memory of 4356 220 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 220 wrote to memory of 4356 220 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 220 wrote to memory of 4356 220 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 220 wrote to memory of 4356 220 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 220 wrote to memory of 4356 220 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 220 wrote to memory of 4356 220 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe PID 220 wrote to memory of 4356 220 14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\14f75789c2bcff0d8e8152d22e80ded0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\14f75789c2bcff0d8e8152d22e80ded0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Roaming\WinSocket\14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3548
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1376
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\14f86899c2bcff0d9e9162d22e90ded0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
904KB
MD514f75789c2bcff0d8e8152d22e80ded0
SHA1ffac48b665739eb7322bc8ee8a8d74fd7f4d1e28
SHA2568cd7a0b9288d7871050a26d856e8cf36bffab3c5cf2ef8c38d5c9220d80334e2
SHA512910c1c9e8b79c57a2ca1b3d22dedcdf2690bb7fcb6514a05bac5f3b898c21dfca481a88598e635a287662e011efb1bd84aeabba3e2828f9077f132ca779af185
-
Filesize
53KB
MD51e8f6ea9ee985729c0073b391741cddb
SHA1410e31c32330ee95d1d94f156730812b53ecf39e
SHA2564b11b764e569ed3ff68fb3f743cf73e813b9b816f7920f0ccef2501e9462ecea
SHA5128581e100811a35778966608edbf2d4bed8353a52343b12edc629443c940f0514ee470377dc462bceef0185aacd8103a827d71af5d9f7618b98ae6c5a40a332bf