Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 01:18
Behavioral task
behavioral1
Sample
76335d42165b169add1cbad5c7d31810_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
76335d42165b169add1cbad5c7d31810_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
76335d42165b169add1cbad5c7d31810
-
SHA1
12c27851425ea22ec870699099c43cc97882ab66
-
SHA256
74ff2594c9020312892faaafa6c16047b760461a6ed65c0806cdaf4f343b16d6
-
SHA512
00e4dbd0109d79b819c00e0f228b9e158e6c9fc2baab7061d51339246049530a6e4d16a8dfa2837685aa04936896cd65d951d7ffcb9ee7f892478ff4f38cb913
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMHI+rMUx+N43XVZpFy1:E5aIwC+Agr6StVEnmcI+2zTy1
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023244-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2220-17-0x00000000029B0000-0x00000000029D9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 1060 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe Token: SeTcbPrivilege 1060 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2220 76335d42165b169add1cbad5c7d31810_NeikiAnalytics.exe 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 1060 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1332 2220 76335d42165b169add1cbad5c7d31810_NeikiAnalytics.exe 90 PID 2220 wrote to memory of 1332 2220 76335d42165b169add1cbad5c7d31810_NeikiAnalytics.exe 90 PID 2220 wrote to memory of 1332 2220 76335d42165b169add1cbad5c7d31810_NeikiAnalytics.exe 90 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1332 wrote to memory of 1952 1332 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 91 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1132 wrote to memory of 4924 1132 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 102 PID 1060 wrote to memory of 900 1060 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 104 PID 1060 wrote to memory of 900 1060 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 104 PID 1060 wrote to memory of 900 1060 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 104 PID 1060 wrote to memory of 900 1060 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 104 PID 1060 wrote to memory of 900 1060 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 104 PID 1060 wrote to memory of 900 1060 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 104 PID 1060 wrote to memory of 900 1060 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 104 PID 1060 wrote to memory of 900 1060 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 104 PID 1060 wrote to memory of 900 1060 87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\76335d42165b169add1cbad5c7d31810_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\76335d42165b169add1cbad5c7d31810_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Roaming\WinSocket\87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1952
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4004 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:2056
-
C:\Users\Admin\AppData\Roaming\WinSocket\87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4924
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\87336d42176b179add1cbad6c8d31910_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD576335d42165b169add1cbad5c7d31810
SHA112c27851425ea22ec870699099c43cc97882ab66
SHA25674ff2594c9020312892faaafa6c16047b760461a6ed65c0806cdaf4f343b16d6
SHA51200e4dbd0109d79b819c00e0f228b9e158e6c9fc2baab7061d51339246049530a6e4d16a8dfa2837685aa04936896cd65d951d7ffcb9ee7f892478ff4f38cb913
-
Filesize
29KB
MD502bf8cb672c96804b395cbbbae573bce
SHA1dc5e7482872824c3bcb9d16b25ee66baf5dc9c1b
SHA25604c495f923e5e09ccd000a6f683f18c9e8adad89fad6c8d10bfd0565307bbf2c
SHA51206dc10822dacc5c30e8d013acfe0041011ffdccc484558b5cdc65d4de4771c73d01586201b8745f8af1eeb82382e5eb270bda1826655f41c7dac871ad394b9fd