Analysis
-
max time kernel
137s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 20:03
Behavioral task
behavioral1
Sample
3304af626301c7559bcd937ce300ecc0_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
3304af626301c7559bcd937ce300ecc0_NeikiAnalytics.exe
-
Size
897KB
-
MD5
3304af626301c7559bcd937ce300ecc0
-
SHA1
2274927afe05e7e9e57b9c3897900a581cf82685
-
SHA256
1a8765f015b8900eef56d9b3a5d983b23f89ff9b824b153038f5b7a3df85b4c6
-
SHA512
0f0869dde252644bb04722a564a7c486d6736549b1c1566353e6859fd0f1131a334571cc6821c1f3b3557f845a2127e64c8d6f314f97bc5736955e03b59c65c4
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnmszgH:zQ5aILMCfmAUjzX6xQtjmssszgH
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023410-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4220-15-0x00000000021F0000-0x0000000002219000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 4532 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe Token: SeTcbPrivilege 4532 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4220 3304af626301c7559bcd937ce300ecc0_NeikiAnalytics.exe 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 4532 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4220 wrote to memory of 3636 4220 3304af626301c7559bcd937ce300ecc0_NeikiAnalytics.exe 82 PID 4220 wrote to memory of 3636 4220 3304af626301c7559bcd937ce300ecc0_NeikiAnalytics.exe 82 PID 4220 wrote to memory of 3636 4220 3304af626301c7559bcd937ce300ecc0_NeikiAnalytics.exe 82 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 3636 wrote to memory of 2016 3636 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 84 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 1124 wrote to memory of 4644 1124 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 103 PID 4532 wrote to memory of 1404 4532 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 113 PID 4532 wrote to memory of 1404 4532 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 113 PID 4532 wrote to memory of 1404 4532 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 113 PID 4532 wrote to memory of 1404 4532 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 113 PID 4532 wrote to memory of 1404 4532 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 113 PID 4532 wrote to memory of 1404 4532 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 113 PID 4532 wrote to memory of 1404 4532 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 113 PID 4532 wrote to memory of 1404 4532 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 113 PID 4532 wrote to memory of 1404 4532 3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3304af626301c7559bcd937ce300ecc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3304af626301c7559bcd937ce300ecc0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Roaming\WinSocket\3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2016
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4644
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3304af727301c8669bcd938ce300ecc0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
897KB
MD53304af626301c7559bcd937ce300ecc0
SHA12274927afe05e7e9e57b9c3897900a581cf82685
SHA2561a8765f015b8900eef56d9b3a5d983b23f89ff9b824b153038f5b7a3df85b4c6
SHA5120f0869dde252644bb04722a564a7c486d6736549b1c1566353e6859fd0f1131a334571cc6821c1f3b3557f845a2127e64c8d6f314f97bc5736955e03b59c65c4
-
Filesize
64KB
MD58b7259eee21daf511229943aebaf77da
SHA136c3a9ad1666aa80a68785d2198e63f4a0286704
SHA256c761fc21290ef60fcde6985da5879426b2b22df3e3db00a60ceb69cdf704a018
SHA5125fe155a7af5f2a1acfaabdfc39dad4684d2c830f11d3e5f4d4c072d905f37871b55e4cf50a054a34561655cbb87fe0bb56be3f94b1a132bffbf98bc8908306ac