Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 06:34
Behavioral task
behavioral1
Sample
c28aab5679c203f9e1dfc6c8d04a63f0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
c28aab5679c203f9e1dfc6c8d04a63f0_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
c28aab5679c203f9e1dfc6c8d04a63f0
-
SHA1
3089d32b0062f417ccbf2d962dbbbaf95e553626
-
SHA256
24300ab8ea18ae219c140b10f8eb08f34bcc80e05282b39c146d014d3feb90c9
-
SHA512
95ac24941aaf45f99109f5645582c54fdd3fca1db873e65d6e82da65948124bfc9f53a3d93bae1a07bce629895557307f17fac263143e6fd8982d15ee461bb13
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMHI+rMUx+N43XVZpFyL:E5aIwC+Agr6StVEnmcI+2zTyL
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2452-15-0x0000000002FD0000-0x0000000002FF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exec29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exec29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exepid process 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe 3136 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exec29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe Token: SeTcbPrivilege 3136 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
c28aab5679c203f9e1dfc6c8d04a63f0_NeikiAnalytics.exec29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exec29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exec29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exepid process 2452 c28aab5679c203f9e1dfc6c8d04a63f0_NeikiAnalytics.exe 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe 3136 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c28aab5679c203f9e1dfc6c8d04a63f0_NeikiAnalytics.exec29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exec29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exec29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exedescription pid process target process PID 2452 wrote to memory of 4148 2452 c28aab5679c203f9e1dfc6c8d04a63f0_NeikiAnalytics.exe c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe PID 2452 wrote to memory of 4148 2452 c28aab5679c203f9e1dfc6c8d04a63f0_NeikiAnalytics.exe c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe PID 2452 wrote to memory of 4148 2452 c28aab5679c203f9e1dfc6c8d04a63f0_NeikiAnalytics.exe c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 4148 wrote to memory of 4840 4148 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3584 wrote to memory of 3320 3584 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3136 wrote to memory of 748 3136 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3136 wrote to memory of 748 3136 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3136 wrote to memory of 748 3136 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3136 wrote to memory of 748 3136 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3136 wrote to memory of 748 3136 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3136 wrote to memory of 748 3136 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3136 wrote to memory of 748 3136 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3136 wrote to memory of 748 3136 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe PID 3136 wrote to memory of 748 3136 c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c28aab5679c203f9e1dfc6c8d04a63f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c28aab5679c203f9e1dfc6c8d04a63f0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Roaming\WinSocket\c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4840
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3320
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\c29aab6789c203f9e1dfc7c9d04a73f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5c28aab5679c203f9e1dfc6c8d04a63f0
SHA13089d32b0062f417ccbf2d962dbbbaf95e553626
SHA25624300ab8ea18ae219c140b10f8eb08f34bcc80e05282b39c146d014d3feb90c9
SHA51295ac24941aaf45f99109f5645582c54fdd3fca1db873e65d6e82da65948124bfc9f53a3d93bae1a07bce629895557307f17fac263143e6fd8982d15ee461bb13
-
Filesize
39KB
MD5ebabcddba5d7661ea75f3a3ced195e8b
SHA1ded031f2216358efedf9922978944719d02da3c3
SHA256ec84d7698a1a00c118327efe4ec195d0e1134311037189c458146e27bdd6e056
SHA5122731c59fdcbbdcc26e0f1a218b23769312d5c1fdd75ac47f69cea83e7d7fa67ce0ddac7760a4d86b55d5e8cdcffbc4027b228448078fffe0905d286e6305a950