Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 21:01
Behavioral task
behavioral1
Sample
263e906ad0f06d12469bb05958210550_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
263e906ad0f06d12469bb05958210550_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
263e906ad0f06d12469bb05958210550
-
SHA1
0eb5fbda88b113086c9ceb5d8da5588a7f74eb38
-
SHA256
390b57540c7ab3f9bbb500b3adf9f8eb1603a1573cb495ba64059c6e94717fb0
-
SHA512
ec69e247fd15c53b8621f6d358f5c40056881a2c288a59dec730a48e17d0ae33e6b2f427756ec7d32f73163453424b71bb56f1595ec5c9e9ea8296dd2e72b36b
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1Sd8zG7u75+FmVf6IIwQREr0F:E5aIwC+Agr6S/FEAGsjiIIbErg
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1976-15-0x0000000002FD0000-0x0000000002FF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe273e907ad0f07d12479bb06969210660_NeikiAnalytict.exepid process 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe 3060 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe273e907ad0f07d12479bb06969210660_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe Token: SeTcbPrivilege 3060 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
263e906ad0f06d12469bb05958210550_NeikiAnalytics.exe273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe273e907ad0f07d12479bb06969210660_NeikiAnalytict.exepid process 1976 263e906ad0f06d12469bb05958210550_NeikiAnalytics.exe 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe 3060 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
263e906ad0f06d12469bb05958210550_NeikiAnalytics.exe273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe273e907ad0f07d12479bb06969210660_NeikiAnalytict.exedescription pid process target process PID 1976 wrote to memory of 1520 1976 263e906ad0f06d12469bb05958210550_NeikiAnalytics.exe 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe PID 1976 wrote to memory of 1520 1976 263e906ad0f06d12469bb05958210550_NeikiAnalytics.exe 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe PID 1976 wrote to memory of 1520 1976 263e906ad0f06d12469bb05958210550_NeikiAnalytics.exe 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 1520 wrote to memory of 4236 1520 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 4484 wrote to memory of 3188 4484 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 3060 wrote to memory of 756 3060 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 3060 wrote to memory of 756 3060 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 3060 wrote to memory of 756 3060 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 3060 wrote to memory of 756 3060 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 3060 wrote to memory of 756 3060 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 3060 wrote to memory of 756 3060 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 3060 wrote to memory of 756 3060 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 3060 wrote to memory of 756 3060 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe PID 3060 wrote to memory of 756 3060 273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\263e906ad0f06d12469bb05958210550_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\263e906ad0f06d12469bb05958210550_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\WinSocket\273e907ad0f07d12479bb06969210660_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4236
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\273e907ad0f07d12479bb06969210660_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3188
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\273e907ad0f07d12479bb06969210660_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\273e907ad0f07d12479bb06969210660_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5263e906ad0f06d12469bb05958210550
SHA10eb5fbda88b113086c9ceb5d8da5588a7f74eb38
SHA256390b57540c7ab3f9bbb500b3adf9f8eb1603a1573cb495ba64059c6e94717fb0
SHA512ec69e247fd15c53b8621f6d358f5c40056881a2c288a59dec730a48e17d0ae33e6b2f427756ec7d32f73163453424b71bb56f1595ec5c9e9ea8296dd2e72b36b
-
Filesize
29KB
MD504bab62561d421ecc24a5d6e20c96d3c
SHA186843b59ed4863890e7e205a36375919772b9f62
SHA25626e1825ec9b956ca7ae4da1b0977d7b0dd64bb485f373a951e044b413c5c31eb
SHA512ec0084ed19d6f1f195e6a883e0b40f8c3854fa0d57cb3eb48edcd67635edbc13cdf9938490a3addaabe215ee5984691018453ae427dd9674ef805b067f699c03