Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 06:48
Behavioral task
behavioral1
Sample
79429109e926cc92bbc7a263ac9c73b0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
79429109e926cc92bbc7a263ac9c73b0_NeikiAnalytics.exe
-
Size
958KB
-
MD5
79429109e926cc92bbc7a263ac9c73b0
-
SHA1
c32e62b61a091a7f82c079e8f608d41a821c9ffa
-
SHA256
50906c7f76bacc04a59ad1a42c31fbdb7d809d356480bfc25fc66768ba81c710
-
SHA512
28409af1d53ba0273bf41c4b4e9169f3f836ef1084aefea1fd0fa76b4248643172a99499e3e65cd4a15b92c13ce22d525fa3f183d9ff04cfc47a1af2460c7c0d
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUkhmZh:E5aIwC+Agr6SNbb
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4052-15-0x0000000002230000-0x0000000002259000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exepid process 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe 2192 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe Token: SeTcbPrivilege 2192 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
79429109e926cc92bbc7a263ac9c73b0_NeikiAnalytics.exe89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exepid process 4052 79429109e926cc92bbc7a263ac9c73b0_NeikiAnalytics.exe 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe 2192 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
79429109e926cc92bbc7a263ac9c73b0_NeikiAnalytics.exe89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exedescription pid process target process PID 4052 wrote to memory of 4716 4052 79429109e926cc92bbc7a263ac9c73b0_NeikiAnalytics.exe 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe PID 4052 wrote to memory of 4716 4052 79429109e926cc92bbc7a263ac9c73b0_NeikiAnalytics.exe 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe PID 4052 wrote to memory of 4716 4052 79429109e926cc92bbc7a263ac9c73b0_NeikiAnalytics.exe 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 4716 wrote to memory of 2476 4716 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 1208 wrote to memory of 4896 1208 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 2192 wrote to memory of 4056 2192 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 2192 wrote to memory of 4056 2192 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 2192 wrote to memory of 4056 2192 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 2192 wrote to memory of 4056 2192 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 2192 wrote to memory of 4056 2192 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 2192 wrote to memory of 4056 2192 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 2192 wrote to memory of 4056 2192 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 2192 wrote to memory of 4056 2192 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe PID 2192 wrote to memory of 4056 2192 89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\79429109e926cc92bbc7a263ac9c73b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\79429109e926cc92bbc7a263ac9c73b0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Roaming\WinSocket\89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2476
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4896
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\89429109e927cc92bbc8a273ac9c83b0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
958KB
MD579429109e926cc92bbc7a263ac9c73b0
SHA1c32e62b61a091a7f82c079e8f608d41a821c9ffa
SHA25650906c7f76bacc04a59ad1a42c31fbdb7d809d356480bfc25fc66768ba81c710
SHA51228409af1d53ba0273bf41c4b4e9169f3f836ef1084aefea1fd0fa76b4248643172a99499e3e65cd4a15b92c13ce22d525fa3f183d9ff04cfc47a1af2460c7c0d
-
Filesize
35KB
MD50ebecad44daf28f263a0617b66d58d9e
SHA19b6d031a2826667fcb2908db5d3d27d642240c67
SHA256de78aebcc097979028067fd71fe7146ae5cb1a90b73f9658253ba961c6a53f0a
SHA5129fe7a22c1c0877021635897c5ebf11e7870d020f0077879cd98b8f40e3037c9d0e9a9505dcfaefe7e616dee88d6ec06ea360653a4fb7fcceafcef4dd60d7b9d1