Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 05:07
Behavioral task
behavioral1
Sample
6e7470ee089f8bd8e0e7eb0306ce8790_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
6e7470ee089f8bd8e0e7eb0306ce8790_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
6e7470ee089f8bd8e0e7eb0306ce8790
-
SHA1
af7eba06c85729fd8f4194a4e4a196ae7b510ad8
-
SHA256
e7d3a2945d64eb3ff944ea04b47b7467338653f7249674c94b99975cef9fc61f
-
SHA512
ec6b63fad70f3ceb2cdd76eefb5b8bcd8cfff56cecb75cfedf338a0946f7a9d0250960209937b3eda71e2c76cf20bcf7a14cd04a4929e92628f09d1103b423ba
-
SSDEEP
24576:zQ5aILMCfmAUjzX677WOMc7qzz1IojVD0nH:E5aIwC+Agr6twjVDOH
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2688-15-0x0000000002170000-0x0000000002199000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exepid process 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe 4844 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe Token: SeTcbPrivilege 4844 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
6e7470ee089f8bd8e0e7eb0306ce8790_NeikiAnalytics.exe7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exepid process 2688 6e7470ee089f8bd8e0e7eb0306ce8790_NeikiAnalytics.exe 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe 4844 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6e7470ee089f8bd8e0e7eb0306ce8790_NeikiAnalytics.exe7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exedescription pid process target process PID 2688 wrote to memory of 796 2688 6e7470ee089f8bd8e0e7eb0306ce8790_NeikiAnalytics.exe 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe PID 2688 wrote to memory of 796 2688 6e7470ee089f8bd8e0e7eb0306ce8790_NeikiAnalytics.exe 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe PID 2688 wrote to memory of 796 2688 6e7470ee089f8bd8e0e7eb0306ce8790_NeikiAnalytics.exe 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 796 wrote to memory of 1756 796 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 2752 wrote to memory of 4736 2752 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4320 4844 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4320 4844 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4320 4844 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4320 4844 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4320 4844 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4320 4844 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4320 4844 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4320 4844 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4320 4844 7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e7470ee089f8bd8e0e7eb0306ce8790_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6e7470ee089f8bd8e0e7eb0306ce8790_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Roaming\WinSocket\7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1756
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4736
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\7e8480ee099f9bd9e0e8eb0307ce9890_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56e7470ee089f8bd8e0e7eb0306ce8790
SHA1af7eba06c85729fd8f4194a4e4a196ae7b510ad8
SHA256e7d3a2945d64eb3ff944ea04b47b7467338653f7249674c94b99975cef9fc61f
SHA512ec6b63fad70f3ceb2cdd76eefb5b8bcd8cfff56cecb75cfedf338a0946f7a9d0250960209937b3eda71e2c76cf20bcf7a14cd04a4929e92628f09d1103b423ba
-
Filesize
52KB
MD502baba3f5639106b2aaa82cd6c6774e0
SHA1d9eb8c7d6d34c08d89c010cc903fa4cdbc62a422
SHA256dcd9711972250688007e0d8e998376da05b75c4951d1a3545a70cb38e12e315d
SHA5124021fc5fce8dba68c1968d2b96b1a3b26490b13393a39f7aa3442a2a621a7ff7b64464107a656b317cdcb740af3dc89101323d8b45acdf2c056421a67d7588bd