Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 21:35
Behavioral task
behavioral1
Sample
39a7ca488c3f32c4dc62a8193b31b9f0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
39a7ca488c3f32c4dc62a8193b31b9f0_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
39a7ca488c3f32c4dc62a8193b31b9f0
-
SHA1
613128792afecc5dc41217fa056b698fc1d08fd6
-
SHA256
ba9fa5f2a34554e1ef76ca604774ef43e6da71f915cc787f8934b105b096b8a3
-
SHA512
22b5258c170887d0ecee648b907324c4438e60b7b1ea90dc290e043f27739bb0fcfda5d750bfc785f4dbf0fc0af0a60ecdf1ae21bfc3751734036bda38921a2b
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQtpj/Yz6XVSvmHaZkI+oq6dTnHv5yIi734DHrPyYnjI:E5aIwC+Agr6St1lOqq+jCpLPJs
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000233f6-22.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4380-15-0x0000000002FF0000-0x0000000003019000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 3316 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe Token: SeTcbPrivilege 3316 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4380 39a7ca488c3f32c4dc62a8193b31b9f0_NeikiAnalytics.exe 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 3316 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4380 wrote to memory of 4212 4380 39a7ca488c3f32c4dc62a8193b31b9f0_NeikiAnalytics.exe 82 PID 4380 wrote to memory of 4212 4380 39a7ca488c3f32c4dc62a8193b31b9f0_NeikiAnalytics.exe 82 PID 4380 wrote to memory of 4212 4380 39a7ca488c3f32c4dc62a8193b31b9f0_NeikiAnalytics.exe 82 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4212 wrote to memory of 4640 4212 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 83 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 4324 wrote to memory of 1656 4324 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 99 PID 3316 wrote to memory of 2388 3316 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 106 PID 3316 wrote to memory of 2388 3316 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 106 PID 3316 wrote to memory of 2388 3316 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 106 PID 3316 wrote to memory of 2388 3316 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 106 PID 3316 wrote to memory of 2388 3316 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 106 PID 3316 wrote to memory of 2388 3316 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 106 PID 3316 wrote to memory of 2388 3316 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 106 PID 3316 wrote to memory of 2388 3316 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 106 PID 3316 wrote to memory of 2388 3316 39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\39a7ca488c3f32c4dc62a8193b31b9f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\39a7ca488c3f32c4dc62a8193b31b9f0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Roaming\WinSocket\39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4640
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1656
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\39a8ca499c3f32c4dc72a9193b31b9f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD539a7ca488c3f32c4dc62a8193b31b9f0
SHA1613128792afecc5dc41217fa056b698fc1d08fd6
SHA256ba9fa5f2a34554e1ef76ca604774ef43e6da71f915cc787f8934b105b096b8a3
SHA51222b5258c170887d0ecee648b907324c4438e60b7b1ea90dc290e043f27739bb0fcfda5d750bfc785f4dbf0fc0af0a60ecdf1ae21bfc3751734036bda38921a2b
-
Filesize
38KB
MD551052061ce4df0a3fa6c3d539c1fd7a6
SHA1129209902b7a1d021477a6cff484031b02887aaa
SHA25676688994fe5a67af62b8fafe7bc2873f8bde328ed941605bf757fe2e9e8122e0
SHA5122ea5d96208442e5668fe9879dc676fb33dbf574ec210c85e72e35faa7804999c4768cd37cacaac29e9e558052dac9f59df56cbc5279b874e2b42bf4aa2aaa67d