Analysis
-
max time kernel
135s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 15:12
Behavioral task
behavioral1
Sample
ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
ed8957c3fd817ef52ae025a66aa42180
-
SHA1
e9a6037089f6a064546d00325062627ea11c7b75
-
SHA256
efbd6d8ec6ef782d65154ed360a81fe4f406285c1523214a41ed350420ee4fd4
-
SHA512
199edc5760480a0db650d534fa90366acca7e26c5309cb0fe90e09c8afab321375d7e6520b352218ce869458893fe6e02792491d3b0275d7567ea9d6aae01585
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1SdrzRjVYaQ/n2lbcMfcz5lb:E5aIwC+Agr6S/FYqOc2e
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\WinSocket\ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/1648-15-0x0000000000300000-0x0000000000329000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exeed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exeed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exepid process 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 1796 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 1180 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe -
Loads dropped DLL 2 IoCs
Processes:
ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exepid process 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 2876 sc.exe 2840 sc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exepowershell.exepid process 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe 2672 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exeed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exeed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exedescription pid process Token: SeDebugPrivilege 2672 powershell.exe Token: SeTcbPrivilege 1796 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe Token: SeTcbPrivilege 1180 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exeed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exeed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exeed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exepid process 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 1796 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 1180 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.execmd.execmd.execmd.exeed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exetaskeng.exeed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exedescription pid process target process PID 1648 wrote to memory of 2696 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe cmd.exe PID 1648 wrote to memory of 2696 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe cmd.exe PID 1648 wrote to memory of 2696 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe cmd.exe PID 1648 wrote to memory of 2696 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe cmd.exe PID 1648 wrote to memory of 2708 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe cmd.exe PID 1648 wrote to memory of 2708 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe cmd.exe PID 1648 wrote to memory of 2708 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe cmd.exe PID 1648 wrote to memory of 2708 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe cmd.exe PID 1648 wrote to memory of 2884 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe cmd.exe PID 1648 wrote to memory of 2884 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe cmd.exe PID 1648 wrote to memory of 2884 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe cmd.exe PID 1648 wrote to memory of 2884 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe cmd.exe PID 2696 wrote to memory of 2876 2696 cmd.exe sc.exe PID 2696 wrote to memory of 2876 2696 cmd.exe sc.exe PID 2696 wrote to memory of 2876 2696 cmd.exe sc.exe PID 2696 wrote to memory of 2876 2696 cmd.exe sc.exe PID 1648 wrote to memory of 2496 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe PID 1648 wrote to memory of 2496 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe PID 1648 wrote to memory of 2496 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe PID 1648 wrote to memory of 2496 1648 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe PID 2884 wrote to memory of 2672 2884 cmd.exe powershell.exe PID 2884 wrote to memory of 2672 2884 cmd.exe powershell.exe PID 2884 wrote to memory of 2672 2884 cmd.exe powershell.exe PID 2884 wrote to memory of 2672 2884 cmd.exe powershell.exe PID 2708 wrote to memory of 2840 2708 cmd.exe sc.exe PID 2708 wrote to memory of 2840 2708 cmd.exe sc.exe PID 2708 wrote to memory of 2840 2708 cmd.exe sc.exe PID 2708 wrote to memory of 2840 2708 cmd.exe sc.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 2496 wrote to memory of 2660 2496 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 1036 wrote to memory of 1796 1036 taskeng.exe ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe PID 1036 wrote to memory of 1796 1036 taskeng.exe ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe PID 1036 wrote to memory of 1796 1036 taskeng.exe ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe PID 1036 wrote to memory of 1796 1036 taskeng.exe ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe PID 1796 wrote to memory of 2896 1796 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 1796 wrote to memory of 2896 1796 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 1796 wrote to memory of 2896 1796 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe PID 1796 wrote to memory of 2896 1796 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\sc.exesc delete WinDefend3⤵
- Launches sc.exe
PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2660
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {486FAF63-D5A0-4B81-AE5A-734E64B93E65} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Roaming\WinSocket\ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2896
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1180 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1292
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5ed8957c3fd817ef52ae025a66aa42180
SHA1e9a6037089f6a064546d00325062627ea11c7b75
SHA256efbd6d8ec6ef782d65154ed360a81fe4f406285c1523214a41ed350420ee4fd4
SHA512199edc5760480a0db650d534fa90366acca7e26c5309cb0fe90e09c8afab321375d7e6520b352218ce869458893fe6e02792491d3b0275d7567ea9d6aae01585