Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 17:13
Behavioral task
behavioral1
Sample
ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
ed8957c3fd817ef52ae025a66aa42180
-
SHA1
e9a6037089f6a064546d00325062627ea11c7b75
-
SHA256
efbd6d8ec6ef782d65154ed360a81fe4f406285c1523214a41ed350420ee4fd4
-
SHA512
199edc5760480a0db650d534fa90366acca7e26c5309cb0fe90e09c8afab321375d7e6520b352218ce869458893fe6e02792491d3b0275d7567ea9d6aae01585
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1SdrzRjVYaQ/n2lbcMfcz5lb:E5aIwC+Agr6S/FYqOc2e
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023417-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/224-15-0x0000000002BE0000-0x0000000002C09000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 1700 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe Token: SeTcbPrivilege 1700 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 224 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 1700 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 3972 224 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe 83 PID 224 wrote to memory of 3972 224 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe 83 PID 224 wrote to memory of 3972 224 ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe 83 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3972 wrote to memory of 2468 3972 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 85 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 3876 wrote to memory of 1440 3876 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 100 PID 1700 wrote to memory of 3852 1700 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 109 PID 1700 wrote to memory of 3852 1700 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 109 PID 1700 wrote to memory of 3852 1700 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 109 PID 1700 wrote to memory of 3852 1700 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 109 PID 1700 wrote to memory of 3852 1700 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 109 PID 1700 wrote to memory of 3852 1700 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 109 PID 1700 wrote to memory of 3852 1700 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 109 PID 1700 wrote to memory of 3852 1700 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 109 PID 1700 wrote to memory of 3852 1700 ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ed8957c3fd817ef52ae025a66aa42180_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Roaming\WinSocket\ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2468
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1440
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\ed9968c3fd918ef62ae026a77aa42190_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5ed8957c3fd817ef52ae025a66aa42180
SHA1e9a6037089f6a064546d00325062627ea11c7b75
SHA256efbd6d8ec6ef782d65154ed360a81fe4f406285c1523214a41ed350420ee4fd4
SHA512199edc5760480a0db650d534fa90366acca7e26c5309cb0fe90e09c8afab321375d7e6520b352218ce869458893fe6e02792491d3b0275d7567ea9d6aae01585
-
Filesize
40KB
MD52132163bcbe1ab4d01cf722222221103
SHA1a6841834f29bb39468a5995b96670a8295c124ee
SHA2568bf97ec1fe2f606a2d1b88b082667b2238ba044c8f521a4d9242140f1cdaddc3
SHA512184d86b6e36b4b3878096a77acc2aa3031f70d8d0fdac9e2593abe09fec87bd62e4efa73c7640deac7c056ba8e8937ec92cbeaf60cffa48ddb1aadfe5d2469c6