Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 06:36
Behavioral task
behavioral1
Sample
7838803abdeb5c86ac8ef0ced18404b0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
7838803abdeb5c86ac8ef0ced18404b0_NeikiAnalytics.exe
-
Size
953KB
-
MD5
7838803abdeb5c86ac8ef0ced18404b0
-
SHA1
afae5313d81010d341e3a04d906a25be270be5e3
-
SHA256
a5a31ace1ff9b22ca763fc85e6927217267d3dbb760e1a53cbf462e63f53ae79
-
SHA512
e71b353a70c71ad00d65f8b24bb0f13147615b22b9a83a3b7af86de30f5871783fd073091104c1d717fd801e64aac17130c9b34f0d888cbfa62589b3e33d04d6
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUkhmZXb+:E5aIwC+Agr6SNbE
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023432-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3512-15-0x0000000002AD0000-0x0000000002AF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 4624 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe Token: SeTcbPrivilege 4624 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3512 7838803abdeb5c86ac8ef0ced18404b0_NeikiAnalytics.exe 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 4624 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3512 wrote to memory of 1344 3512 7838803abdeb5c86ac8ef0ced18404b0_NeikiAnalytics.exe 82 PID 3512 wrote to memory of 1344 3512 7838803abdeb5c86ac8ef0ced18404b0_NeikiAnalytics.exe 82 PID 3512 wrote to memory of 1344 3512 7838803abdeb5c86ac8ef0ced18404b0_NeikiAnalytics.exe 82 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 1344 wrote to memory of 364 1344 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 83 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4908 wrote to memory of 3240 4908 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 109 PID 4624 wrote to memory of 1860 4624 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 119 PID 4624 wrote to memory of 1860 4624 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 119 PID 4624 wrote to memory of 1860 4624 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 119 PID 4624 wrote to memory of 1860 4624 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 119 PID 4624 wrote to memory of 1860 4624 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 119 PID 4624 wrote to memory of 1860 4624 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 119 PID 4624 wrote to memory of 1860 4624 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 119 PID 4624 wrote to memory of 1860 4624 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 119 PID 4624 wrote to memory of 1860 4624 8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7838803abdeb5c86ac8ef0ced18404b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7838803abdeb5c86ac8ef0ced18404b0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Roaming\WinSocket\8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:364
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3240
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\8939903abdeb6c97ac9ef0ced19404b0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
953KB
MD57838803abdeb5c86ac8ef0ced18404b0
SHA1afae5313d81010d341e3a04d906a25be270be5e3
SHA256a5a31ace1ff9b22ca763fc85e6927217267d3dbb760e1a53cbf462e63f53ae79
SHA512e71b353a70c71ad00d65f8b24bb0f13147615b22b9a83a3b7af86de30f5871783fd073091104c1d717fd801e64aac17130c9b34f0d888cbfa62589b3e33d04d6
-
Filesize
54KB
MD5c4330643ee674fb269105121c42c90cc
SHA11801eaa52d981e5fe217132521b0a89ea33cda8c
SHA25606f4edbf30ee38ea05196457a85d438afc10c0b467228a431a212a796b80610b
SHA5126f1437ecd6d277cbb80d2392a059d23085a4f9218a1921dc8408f336050d46cf43b69eac90e9e4e382c260a2626b0b38cea85492d02218397fc31700bb571f2f