Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 21:29
Behavioral task
behavioral1
Sample
060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
060c16ffab2baf7d36ce23605c8433f0
-
SHA1
912093cdd6e04b4269a014208e8c1a603a006845
-
SHA256
72cebf37d27ac7210a756eb9f6180a9bb6153b9cf887550e303f17e6b9573f13
-
SHA512
bf63034bb9f94d0b51c44c13c281517b42988d232b01a80981d8fddc8f5e23581bfdfbecafff70a30696fb4212cdfa6bcd966d35cc8fb6a2f76b9b75c7e85902
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMHI+rMUx+N43XVZpFy/my:E5aIwC+Agr6StVEnmcI+2zTy/h
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4356-16-0x0000000002200000-0x0000000002229000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exepid process 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe Token: SeTcbPrivilege 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exepid process 4356 060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exedescription pid process target process PID 4356 wrote to memory of 1140 4356 060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe PID 4356 wrote to memory of 1140 4356 060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe PID 4356 wrote to memory of 1140 4356 060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 1140 wrote to memory of 2156 1140 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 2656 wrote to memory of 4284 2656 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe PID 4440 wrote to memory of 1208 4440 070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\060c16ffab2baf7d36ce23605c8433f0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2156
-
C:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Modifies data under HKEY_USERS
PID:4284
-
C:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\070c17ffab2baf8d37ce23706c9433f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5060c16ffab2baf7d36ce23605c8433f0
SHA1912093cdd6e04b4269a014208e8c1a603a006845
SHA25672cebf37d27ac7210a756eb9f6180a9bb6153b9cf887550e303f17e6b9573f13
SHA512bf63034bb9f94d0b51c44c13c281517b42988d232b01a80981d8fddc8f5e23581bfdfbecafff70a30696fb4212cdfa6bcd966d35cc8fb6a2f76b9b75c7e85902
-
Filesize
38KB
MD5030b2b1b67f22fe9256a2161ebb84e15
SHA1393a4862f069bd8891867584b570082f462f4217
SHA256b8f9a18bfb1107d224b29ed448c2820ff4ba7e897a788f5a754240de48339486
SHA51219143a9b7e8ce9cd8813e421dc70b51f4b9ff090a8fcaedfa93b2a0505e336058e8457df9465b982607600e5e0c6950d63438b5005237f0bd47bfbc9dbe91794