Analysis
-
max time kernel
139s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
217bc5d67ab6285e6d5542e57204bcd0_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
217bc5d67ab6285e6d5542e57204bcd0_NeikiAnalytics.exe
-
Size
1.0MB
-
MD5
217bc5d67ab6285e6d5542e57204bcd0
-
SHA1
508784a64ee264f659c668f95dc2c05308b9edc8
-
SHA256
5ca0483b200f8aa714bef92091563961d7c7a2043a8583e0efe4a1451784f500
-
SHA512
4259fab5d561735f139b1cdf27ad263e1db2819cfdb8ea1c21c20c4a8f3d6667eeb546d963c8165d175c43d2df91dcdab7ceea0ed3feed705e152730c55e5165
-
SSDEEP
24576:zQ5aILMCfmAUhrSO1YNWdvCzMPqdUD6dNXfpF:E5aIwC+AUBsWsXp
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4544-15-0x0000000002AC0000-0x0000000002AE9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exepid process 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe 4884 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe Token: SeTcbPrivilege 4884 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
217bc5d67ab6285e6d5542e57204bcd0_NeikiAnalytics.exe218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exepid process 4544 217bc5d67ab6285e6d5542e57204bcd0_NeikiAnalytics.exe 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe 4884 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
217bc5d67ab6285e6d5542e57204bcd0_NeikiAnalytics.exe218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exedescription pid process target process PID 4544 wrote to memory of 4036 4544 217bc5d67ab6285e6d5542e57204bcd0_NeikiAnalytics.exe 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe PID 4544 wrote to memory of 4036 4544 217bc5d67ab6285e6d5542e57204bcd0_NeikiAnalytics.exe 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe PID 4544 wrote to memory of 4036 4544 217bc5d67ab6285e6d5542e57204bcd0_NeikiAnalytics.exe 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4036 wrote to memory of 4448 4036 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4844 wrote to memory of 4876 4844 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4884 wrote to memory of 1988 4884 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4884 wrote to memory of 1988 4884 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4884 wrote to memory of 1988 4884 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4884 wrote to memory of 1988 4884 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4884 wrote to memory of 1988 4884 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4884 wrote to memory of 1988 4884 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4884 wrote to memory of 1988 4884 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4884 wrote to memory of 1988 4884 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe PID 4884 wrote to memory of 1988 4884 218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\217bc5d67ab6285e6d5542e57204bcd0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\217bc5d67ab6285e6d5542e57204bcd0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Roaming\WinSocket\218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4448
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4876
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\218bc6d78ab7296e7d6642e68204bcd0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5217bc5d67ab6285e6d5542e57204bcd0
SHA1508784a64ee264f659c668f95dc2c05308b9edc8
SHA2565ca0483b200f8aa714bef92091563961d7c7a2043a8583e0efe4a1451784f500
SHA5124259fab5d561735f139b1cdf27ad263e1db2819cfdb8ea1c21c20c4a8f3d6667eeb546d963c8165d175c43d2df91dcdab7ceea0ed3feed705e152730c55e5165
-
Filesize
19KB
MD563a78d89726ab93029b5287f7b7ef54c
SHA15bdeea5ebf6437b835d9368b15d1b55fe8e0f220
SHA2568f43d28401d0feef79ae8e7ce036ab0416216fd7f65b6f739d2a675086e7bc51
SHA51240d4288ded6f177decacd3bfe746708e32d10d215457db65ef660e9d94f0800e3210755240aaa32ebdc260abcc96d3169e35271cb16be1cd50c6131b1ea8ed80