Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 11:42
Behavioral task
behavioral1
Sample
c4ff1f815f5b3578bd5b0c1f28124cb0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
c4ff1f815f5b3578bd5b0c1f28124cb0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
c4ff1f815f5b3578bd5b0c1f28124cb0
-
SHA1
797e41b8638da445c77f4c3a6006302878310b10
-
SHA256
576c4e101fec8d64a8c2709c01b01fe0c86d7f688d3660b04ef67ad8fc5df7c8
-
SHA512
3119759336f76de157bb130b6ed861d8eb56f870bf682d0a7a99930f0376e0e631874d83272af9eec5a5663f92e20d67f8fd1b0025c4cb2136d9dd29f87a72d5
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMAOxA5zYlQvmp8RxAb5J6iHsl5TJ0:E5aIwC+Agr6StVEnmcKxYDvZThTO
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1944-15-0x0000000002270000-0x0000000002299000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exec4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exec4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exepid process 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe 1148 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exec4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe Token: SeTcbPrivilege 1148 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
c4ff1f815f5b3578bd5b0c1f28124cb0_NeikiAnalytics.exec4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exec4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exec4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exepid process 1944 c4ff1f815f5b3578bd5b0c1f28124cb0_NeikiAnalytics.exe 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe 1148 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c4ff1f815f5b3578bd5b0c1f28124cb0_NeikiAnalytics.exec4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exec4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exec4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exedescription pid process target process PID 1944 wrote to memory of 2332 1944 c4ff1f815f5b3578bd5b0c1f28124cb0_NeikiAnalytics.exe c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe PID 1944 wrote to memory of 2332 1944 c4ff1f815f5b3578bd5b0c1f28124cb0_NeikiAnalytics.exe c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe PID 1944 wrote to memory of 2332 1944 c4ff1f815f5b3578bd5b0c1f28124cb0_NeikiAnalytics.exe c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 2332 wrote to memory of 4108 2332 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 5000 wrote to memory of 3928 5000 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 1148 wrote to memory of 4676 1148 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 1148 wrote to memory of 4676 1148 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 1148 wrote to memory of 4676 1148 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 1148 wrote to memory of 4676 1148 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 1148 wrote to memory of 4676 1148 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 1148 wrote to memory of 4676 1148 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 1148 wrote to memory of 4676 1148 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 1148 wrote to memory of 4676 1148 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe PID 1148 wrote to memory of 4676 1148 c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4ff1f815f5b3578bd5b0c1f28124cb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c4ff1f815f5b3578bd5b0c1f28124cb0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\WinSocket\c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4108
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4068 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:4548
-
C:\Users\Admin\AppData\Roaming\WinSocket\c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3928
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\c4ff1f916f6b3689bd6b0c1f29124cb0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5c4ff1f815f5b3578bd5b0c1f28124cb0
SHA1797e41b8638da445c77f4c3a6006302878310b10
SHA256576c4e101fec8d64a8c2709c01b01fe0c86d7f688d3660b04ef67ad8fc5df7c8
SHA5123119759336f76de157bb130b6ed861d8eb56f870bf682d0a7a99930f0376e0e631874d83272af9eec5a5663f92e20d67f8fd1b0025c4cb2136d9dd29f87a72d5
-
Filesize
51KB
MD51f141ddddea2fc0e0c934630a6691c6a
SHA1d1eaca600b094bcdcca3917ebbd86a014fda0b57
SHA2564400b2dd2d0b9144bed42f6cc9a772902f09fe2e33af654edd1d5ca02673a17b
SHA512ea8666226e935bad1d654238e7d57ae316ee3b37e37b8d6ea569d2bc77c065fbec0d9ad07b0325d9ec96bea9b0efa1d5f1cd6f4a388f7f163066085efc0d978d