Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 12:00
Behavioral task
behavioral1
Sample
c594f8d0750dc5ee9ac98b0f32fa4c40_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
c594f8d0750dc5ee9ac98b0f32fa4c40_NeikiAnalytics.exe
-
Size
956KB
-
MD5
c594f8d0750dc5ee9ac98b0f32fa4c40
-
SHA1
c1f1c919bdb3182b469098c2489dec9bee6df494
-
SHA256
2e84c1b17cd02290036f9a53f626611ff3a435a512a622d53b807ebd264fd770
-
SHA512
d35e5f42f56bb8133b2fb528e353f5fea8ec8b6f6dd707c476a64f620b1eb5d59ef6f3ed2fac120ab2b7f33675c8b5b2c137ffae78033005853e94992665d3d5
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUkhmZc:E5aIwC+Agr6SNbq
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/3100-15-0x0000000002D00000-0x0000000002D29000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exec694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exec694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exepid process 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe 3148 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exec694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe Token: SeTcbPrivilege 3148 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
c594f8d0750dc5ee9ac98b0f32fa4c40_NeikiAnalytics.exec694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exec694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exec694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exepid process 3100 c594f8d0750dc5ee9ac98b0f32fa4c40_NeikiAnalytics.exe 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe 3148 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c594f8d0750dc5ee9ac98b0f32fa4c40_NeikiAnalytics.exec694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exec694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exec694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exedescription pid process target process PID 3100 wrote to memory of 2364 3100 c594f8d0750dc5ee9ac98b0f32fa4c40_NeikiAnalytics.exe c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe PID 3100 wrote to memory of 2364 3100 c594f8d0750dc5ee9ac98b0f32fa4c40_NeikiAnalytics.exe c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe PID 3100 wrote to memory of 2364 3100 c594f8d0750dc5ee9ac98b0f32fa4c40_NeikiAnalytics.exe c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 2364 wrote to memory of 3428 2364 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 4852 wrote to memory of 1868 4852 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 1984 3148 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 1984 3148 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 1984 3148 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 1984 3148 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 1984 3148 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 1984 3148 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 1984 3148 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 1984 3148 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 1984 3148 c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c594f8d0750dc5ee9ac98b0f32fa4c40_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c594f8d0750dc5ee9ac98b0f32fa4c40_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Roaming\WinSocket\c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3428
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4028,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4196 /prefetch:81⤵PID:4672
-
C:\Users\Admin\AppData\Roaming\WinSocket\c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Modifies data under HKEY_USERS
PID:1868
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\c694f9d0860dc6ee9ac99b0f32fa4c40_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
956KB
MD5c594f8d0750dc5ee9ac98b0f32fa4c40
SHA1c1f1c919bdb3182b469098c2489dec9bee6df494
SHA2562e84c1b17cd02290036f9a53f626611ff3a435a512a622d53b807ebd264fd770
SHA512d35e5f42f56bb8133b2fb528e353f5fea8ec8b6f6dd707c476a64f620b1eb5d59ef6f3ed2fac120ab2b7f33675c8b5b2c137ffae78033005853e94992665d3d5
-
Filesize
37KB
MD53e0bcc1ac0c5af09f1068923a624f8f2
SHA1d15633d2ae7ca9a6b90839450660af9de3492840
SHA25609c0f9fd4e2e91b1dcc549a18ed487296431d27dd9cef725822784b5a137acab
SHA5128c596271cef7d8ba43eadab7ec4e396560b624bee7f8c383a5d8620f830a37ddf9710c22ce495efa6117970fad11f57dd81ebe626a3f1a9e100e3829ece9fff7