Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 00:40
Behavioral task
behavioral1
Sample
6159332156c46a7e0c91bcaa6b2de3d0_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
6159332156c46a7e0c91bcaa6b2de3d0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
6159332156c46a7e0c91bcaa6b2de3d0
-
SHA1
41c3d66822b4a082a6e0efa0ff9074e4a208cca8
-
SHA256
e1d0981c6b4dde870663311a0cf004b31bead09893b9eb5cabfb2526ac560cb9
-
SHA512
0dc3974d69398d8b3d7e939cfd4baa81080edc66ac7469093f0ab5a50df2bdcc0a50786b253c6c4a78fcbb2cc372553af7bfee5d24a37490f6e6b4aaba0296af
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1Sd8zG7u75+FmVf6IIwQREr0F:E5aIwC+Agr6S/FEAGsjiIIbEr2
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000233f6-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2948-15-0x00000000021F0000-0x0000000002219000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 692 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe Token: SeTcbPrivilege 692 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2948 6159332156c46a7e0c91bcaa6b2de3d0_NeikiAnalytics.exe 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 692 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2948 wrote to memory of 1612 2948 6159332156c46a7e0c91bcaa6b2de3d0_NeikiAnalytics.exe 82 PID 2948 wrote to memory of 1612 2948 6159332156c46a7e0c91bcaa6b2de3d0_NeikiAnalytics.exe 82 PID 2948 wrote to memory of 1612 2948 6159332156c46a7e0c91bcaa6b2de3d0_NeikiAnalytics.exe 82 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 1612 wrote to memory of 884 1612 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 83 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 2384 wrote to memory of 3756 2384 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 99 PID 692 wrote to memory of 536 692 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 109 PID 692 wrote to memory of 536 692 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 109 PID 692 wrote to memory of 536 692 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 109 PID 692 wrote to memory of 536 692 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 109 PID 692 wrote to memory of 536 692 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 109 PID 692 wrote to memory of 536 692 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 109 PID 692 wrote to memory of 536 692 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 109 PID 692 wrote to memory of 536 692 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 109 PID 692 wrote to memory of 536 692 7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6159332156c46a7e0c91bcaa6b2de3d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6159332156c46a7e0c91bcaa6b2de3d0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Roaming\WinSocket\7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:884
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3756
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\7169332167c47a8e0c91bcaa7b2de3d0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56159332156c46a7e0c91bcaa6b2de3d0
SHA141c3d66822b4a082a6e0efa0ff9074e4a208cca8
SHA256e1d0981c6b4dde870663311a0cf004b31bead09893b9eb5cabfb2526ac560cb9
SHA5120dc3974d69398d8b3d7e939cfd4baa81080edc66ac7469093f0ab5a50df2bdcc0a50786b253c6c4a78fcbb2cc372553af7bfee5d24a37490f6e6b4aaba0296af
-
Filesize
37KB
MD511eef44bafe26aa9900424b5d68a5cde
SHA186b845f579cc04e7e245156e3295e72c60c3e583
SHA256da2b0e1c9b5c26166958ce795f7f93c6f95f29adf9f1afec2bff8641e714ac59
SHA5128242ea2d730f77df05dc7271e852ec6bc244b68f91d31656a6c96eec33d8429c74be232a1b7a4cfedef6837709e1925c37df39c170d222f84ad0a67be214fa82