Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 20:49
Behavioral task
behavioral1
Sample
381b662e9f82d471b0e275cd8fea9320_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
381b662e9f82d471b0e275cd8fea9320_NeikiAnalytics.exe
-
Size
946KB
-
MD5
381b662e9f82d471b0e275cd8fea9320
-
SHA1
3f9d247d046b22125dfe20f12e249de9f7c360a5
-
SHA256
16b65998292d53e1f656132e730836b8f9c3d3356a01093c0f49e6661cfd8fc2
-
SHA512
08f6c4bff75a447294cb44e49702e482bb930c976eeadc2fe1d3148d3daa7ddefbede71e9d023738fe8e45b77f252ac212b01aae3e373ff4af7e9042d02ed4fc
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUkhmZy:E5aIwC+Agr6SNbo
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4696-15-0x0000000002A50000-0x0000000002A79000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exepid process 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe 4620 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe Token: SeTcbPrivilege 4620 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
381b662e9f82d471b0e275cd8fea9320_NeikiAnalytics.exe391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exepid process 4696 381b662e9f82d471b0e275cd8fea9320_NeikiAnalytics.exe 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe 4620 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
381b662e9f82d471b0e275cd8fea9320_NeikiAnalytics.exe391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exedescription pid process target process PID 4696 wrote to memory of 2640 4696 381b662e9f82d471b0e275cd8fea9320_NeikiAnalytics.exe 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe PID 4696 wrote to memory of 2640 4696 381b662e9f82d471b0e275cd8fea9320_NeikiAnalytics.exe 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe PID 4696 wrote to memory of 2640 4696 381b662e9f82d471b0e275cd8fea9320_NeikiAnalytics.exe 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 1192 2640 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 3540 wrote to memory of 640 3540 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 4620 wrote to memory of 4020 4620 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 4620 wrote to memory of 4020 4620 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 4620 wrote to memory of 4020 4620 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 4620 wrote to memory of 4020 4620 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 4620 wrote to memory of 4020 4620 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 4620 wrote to memory of 4020 4620 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 4620 wrote to memory of 4020 4620 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 4620 wrote to memory of 4020 4620 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe PID 4620 wrote to memory of 4020 4620 391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\381b662e9f82d471b0e275cd8fea9320_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\381b662e9f82d471b0e275cd8fea9320_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Roaming\WinSocket\391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1192
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:640
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\391b772e9f92d481b0e286cd9fea9320_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
946KB
MD5381b662e9f82d471b0e275cd8fea9320
SHA13f9d247d046b22125dfe20f12e249de9f7c360a5
SHA25616b65998292d53e1f656132e730836b8f9c3d3356a01093c0f49e6661cfd8fc2
SHA51208f6c4bff75a447294cb44e49702e482bb930c976eeadc2fe1d3148d3daa7ddefbede71e9d023738fe8e45b77f252ac212b01aae3e373ff4af7e9042d02ed4fc
-
Filesize
44KB
MD5d22bb6bce3c0378d9fe75bbce63b9d65
SHA1e453c8a1434e736e9535ac7315c2126a13270a3c
SHA256aca0d6bc2ad4691dbac3fe59e8299d4e181b10e696043eb5751720804de7378b
SHA512371050d540b833893c460bdf0309f992584eb41bcc6317421feafbd452792a3e9ac47b8acb5e2dc64c612570ce7692f38f2f79b314fc85ca02291b302379cb8d