Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 17:41
Behavioral task
behavioral1
Sample
03194b05c3d6a657af86f29a456cabc0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
03194b05c3d6a657af86f29a456cabc0_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
03194b05c3d6a657af86f29a456cabc0
-
SHA1
0221db455ad68cb960b34e60aea4deb4410a541c
-
SHA256
f133954c26450642c629a261b7a0d6ae5516b40b7eee1e2b1a8132f28aa3f31b
-
SHA512
940cdf459cddec5d10a5171a58116f008279381b485fd36902ee2556dddb5268aafb320bc660b9e3381bf1b026730ff0699ac9d7102c7636d45cedfdf4c95eb6
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQtpj/Yz6XVSvmHaZkI+oq6dTnHv5yIi734DHrPyYj:E5aIwC+Agr6St1lOqq+jCpLPx
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023403-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4200-15-0x0000000002AD0000-0x0000000002AF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 3412 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe Token: SeTcbPrivilege 3412 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4200 03194b05c3d6a657af86f29a456cabc0_NeikiAnalytics.exe 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 3412 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4200 wrote to memory of 1516 4200 03194b05c3d6a657af86f29a456cabc0_NeikiAnalytics.exe 85 PID 4200 wrote to memory of 1516 4200 03194b05c3d6a657af86f29a456cabc0_NeikiAnalytics.exe 85 PID 4200 wrote to memory of 1516 4200 03194b05c3d6a657af86f29a456cabc0_NeikiAnalytics.exe 85 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1516 wrote to memory of 4884 1516 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 87 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 1000 wrote to memory of 3316 1000 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 103 PID 3412 wrote to memory of 3972 3412 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 112 PID 3412 wrote to memory of 3972 3412 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 112 PID 3412 wrote to memory of 3972 3412 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 112 PID 3412 wrote to memory of 3972 3412 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 112 PID 3412 wrote to memory of 3972 3412 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 112 PID 3412 wrote to memory of 3972 3412 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 112 PID 3412 wrote to memory of 3972 3412 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 112 PID 3412 wrote to memory of 3972 3412 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 112 PID 3412 wrote to memory of 3972 3412 03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\03194b05c3d6a657af86f29a456cabc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\03194b05c3d6a657af86f29a456cabc0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Roaming\WinSocket\03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4884
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3316
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\03194b06c3d7a768af97f29a467cabc0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD503194b05c3d6a657af86f29a456cabc0
SHA10221db455ad68cb960b34e60aea4deb4410a541c
SHA256f133954c26450642c629a261b7a0d6ae5516b40b7eee1e2b1a8132f28aa3f31b
SHA512940cdf459cddec5d10a5171a58116f008279381b485fd36902ee2556dddb5268aafb320bc660b9e3381bf1b026730ff0699ac9d7102c7636d45cedfdf4c95eb6
-
Filesize
14KB
MD50ccd9da2b068133b27f0c1c3893a05d4
SHA138a9a20a7b5bfdea6d221ca017f5e622a738f04d
SHA2567d900270884ea44750e790a87a36a1c74b02820344de0ca75cab7afc522fc5e3
SHA51287db81c70eef0110a951778b14b12d8ab0e8fe040bc0c2ed5b6a008e39502a39d065a49f3467244b9788c4429e03a676b61428c20170fb581136a770819f182e