Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 10:02
Behavioral task
behavioral1
Sample
82ec7adf64ec41397626fef58bf406f0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
82ec7adf64ec41397626fef58bf406f0_NeikiAnalytics.exe
-
Size
882KB
-
MD5
82ec7adf64ec41397626fef58bf406f0
-
SHA1
ee05aebec32ce84e6637db1a4d2091bc5712afc1
-
SHA256
f5867344b2bf47820bcdc411f64fb24e6e094fdaa70b0a2e8f4b27c9ec71121f
-
SHA512
28e91633876eeaa840a44a255e9ced2fe9149dc30c4efd56867d486884c1c9fd7ccf83d62ab6ab537b0fb73f0bae6e92eefeb4271421348a4e301c6736b00cc5
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4EnpZgkJOSSkK:E5aIwC+Agr6StVEn0ksL
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023413-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4276-15-0x0000000002D20000-0x0000000002D49000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 3940 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe Token: SeTcbPrivilege 3940 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4276 82ec7adf64ec41397626fef58bf406f0_NeikiAnalytics.exe 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 3940 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4276 wrote to memory of 1580 4276 82ec7adf64ec41397626fef58bf406f0_NeikiAnalytics.exe 82 PID 4276 wrote to memory of 1580 4276 82ec7adf64ec41397626fef58bf406f0_NeikiAnalytics.exe 82 PID 4276 wrote to memory of 1580 4276 82ec7adf64ec41397626fef58bf406f0_NeikiAnalytics.exe 82 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 1580 wrote to memory of 3440 1580 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 83 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 4456 wrote to memory of 2128 4456 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 101 PID 3940 wrote to memory of 4660 3940 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 110 PID 3940 wrote to memory of 4660 3940 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 110 PID 3940 wrote to memory of 4660 3940 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 110 PID 3940 wrote to memory of 4660 3940 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 110 PID 3940 wrote to memory of 4660 3940 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 110 PID 3940 wrote to memory of 4660 3940 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 110 PID 3940 wrote to memory of 4660 3940 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 110 PID 3940 wrote to memory of 4660 3940 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 110 PID 3940 wrote to memory of 4660 3940 92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\82ec7adf64ec41397626fef58bf406f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\82ec7adf64ec41397626fef58bf406f0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Roaming\WinSocket\92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3440
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2128
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\92ec8adf74ec41398727fef69bf407f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882KB
MD582ec7adf64ec41397626fef58bf406f0
SHA1ee05aebec32ce84e6637db1a4d2091bc5712afc1
SHA256f5867344b2bf47820bcdc411f64fb24e6e094fdaa70b0a2e8f4b27c9ec71121f
SHA51228e91633876eeaa840a44a255e9ced2fe9149dc30c4efd56867d486884c1c9fd7ccf83d62ab6ab537b0fb73f0bae6e92eefeb4271421348a4e301c6736b00cc5
-
Filesize
67KB
MD5f646e39a1e245eb48c950a933900aa76
SHA12e23fce303a24a75ca26cc1177be5ccc19e56948
SHA2568a9e5c8dd5639c2eff5b2fb40972747406e4cd4c527914197b30c4e89f115f80
SHA5126fd90a5f2dab0805d4733f743012cecc9b00985b5ddb26e964baecce74027d2d7a9738677728fefe3fe3a5fd96729706b6f095c08fbd5a63d58b4818fd6d6ede