Analysis
-
max time kernel
138s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
2bba5dfc012d4eacb69e411d4314ac30_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
2bba5dfc012d4eacb69e411d4314ac30_NeikiAnalytics.exe
-
Size
1.0MB
-
MD5
2bba5dfc012d4eacb69e411d4314ac30
-
SHA1
a41eef8e3c27032c172fe50ee0b6fdd3969a5188
-
SHA256
e6d62be68e9905426cbf6320af06e22b8fd94badd68e985d4d47eeb5f660a8ea
-
SHA512
1bae40db6bfa51445055b0621f77a4cd35841ea1073f880977628f9fc2adac7269e709e77a2f43fb56130a4fd5bdd99c35567bc9d93bd532a5a09ea801062bab
-
SSDEEP
24576:zQ5aILMCfmAUhrSO1YNWdvCzMPqdUD6dNXfpR:E5aIwC+AUBsWsXN
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1436-15-0x0000000002AD0000-0x0000000002AF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exepid process 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe 3860 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe Token: SeTcbPrivilege 3860 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
2bba5dfc012d4eacb69e411d4314ac30_NeikiAnalytics.exe2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exepid process 1436 2bba5dfc012d4eacb69e411d4314ac30_NeikiAnalytics.exe 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe 3860 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2bba5dfc012d4eacb69e411d4314ac30_NeikiAnalytics.exe2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exedescription pid process target process PID 1436 wrote to memory of 2020 1436 2bba5dfc012d4eacb69e411d4314ac30_NeikiAnalytics.exe 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe PID 1436 wrote to memory of 2020 1436 2bba5dfc012d4eacb69e411d4314ac30_NeikiAnalytics.exe 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe PID 1436 wrote to memory of 2020 1436 2bba5dfc012d4eacb69e411d4314ac30_NeikiAnalytics.exe 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 2020 wrote to memory of 3808 2020 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 4324 wrote to memory of 4488 4324 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 3860 wrote to memory of 3100 3860 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 3860 wrote to memory of 3100 3860 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 3860 wrote to memory of 3100 3860 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 3860 wrote to memory of 3100 3860 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 3860 wrote to memory of 3100 3860 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 3860 wrote to memory of 3100 3860 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 3860 wrote to memory of 3100 3860 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 3860 wrote to memory of 3100 3860 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe PID 3860 wrote to memory of 3100 3860 2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bba5dfc012d4eacb69e411d4314ac30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2bba5dfc012d4eacb69e411d4314ac30_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Roaming\WinSocket\2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3808
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4488
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\2bba6dfc012d4eacb79e411d4314ac30_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD52bba5dfc012d4eacb69e411d4314ac30
SHA1a41eef8e3c27032c172fe50ee0b6fdd3969a5188
SHA256e6d62be68e9905426cbf6320af06e22b8fd94badd68e985d4d47eeb5f660a8ea
SHA5121bae40db6bfa51445055b0621f77a4cd35841ea1073f880977628f9fc2adac7269e709e77a2f43fb56130a4fd5bdd99c35567bc9d93bd532a5a09ea801062bab
-
Filesize
55KB
MD54fbea9b3885f4c1fa875e80de5649d21
SHA1d9128606bd91efcefc5bcca0dc261fa57212f555
SHA256a804b0341dce35410ea8256819e714ed53c12f5eb3d143b0763a85f26e705d03
SHA512d988664239ce5c79c07a2838e87d0d053df2e3e3139d2a476096c2c052056d2e431b4030f43b9b1d4bfd796785c3045a8a9e052d91aff8399916d7570fb15df9