Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 03:17
Behavioral task
behavioral1
Sample
8005b95aa2e77989c5e9ab473e97b110_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
8005b95aa2e77989c5e9ab473e97b110_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
8005b95aa2e77989c5e9ab473e97b110
-
SHA1
a4c2b0cb0d81f969b23d5dd7e99f48bd55fe6b8c
-
SHA256
b33b49e8d3ea86d34e8b1ea2cb8a7c5164cfce909a71f121a4f3f81057e544c1
-
SHA512
2d7cfe1a1352d918eb2d31f6c1135f0af057f2a06cb4d447a0fc0acc4a68dc760bcbc2f4aade258b1643adc6c38d242111aa38d5a726586f81a86361fc1643b4
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMHI+rMUx+N43XVZpFyD:E5aIwC+Agr6StVEnmcI+2zTyD
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023407-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4268-15-0x0000000002A10000-0x0000000002A39000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 3276 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe Token: SeTcbPrivilege 3276 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4268 8005b95aa2e77989c5e9ab473e97b110_NeikiAnalytics.exe 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 3276 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 1632 4268 8005b95aa2e77989c5e9ab473e97b110_NeikiAnalytics.exe 82 PID 4268 wrote to memory of 1632 4268 8005b95aa2e77989c5e9ab473e97b110_NeikiAnalytics.exe 82 PID 4268 wrote to memory of 1632 4268 8005b95aa2e77989c5e9ab473e97b110_NeikiAnalytics.exe 82 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 1632 wrote to memory of 1940 1632 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 83 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3352 wrote to memory of 220 3352 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 99 PID 3276 wrote to memory of 2544 3276 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 107 PID 3276 wrote to memory of 2544 3276 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 107 PID 3276 wrote to memory of 2544 3276 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 107 PID 3276 wrote to memory of 2544 3276 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 107 PID 3276 wrote to memory of 2544 3276 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 107 PID 3276 wrote to memory of 2544 3276 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 107 PID 3276 wrote to memory of 2544 3276 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 107 PID 3276 wrote to memory of 2544 3276 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 107 PID 3276 wrote to memory of 2544 3276 9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8005b95aa2e77989c5e9ab473e97b110_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8005b95aa2e77989c5e9ab473e97b110_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Roaming\WinSocket\9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1940
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:220
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\9006b96aa2e88999c6e9ab483e98b110_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD58005b95aa2e77989c5e9ab473e97b110
SHA1a4c2b0cb0d81f969b23d5dd7e99f48bd55fe6b8c
SHA256b33b49e8d3ea86d34e8b1ea2cb8a7c5164cfce909a71f121a4f3f81057e544c1
SHA5122d7cfe1a1352d918eb2d31f6c1135f0af057f2a06cb4d447a0fc0acc4a68dc760bcbc2f4aade258b1643adc6c38d242111aa38d5a726586f81a86361fc1643b4
-
Filesize
42KB
MD53de4d0463e2a1926ed0284b87fe4d452
SHA19e2d9a40f4d88d1631c259cd87d5dde292f9a461
SHA256da04b717db5ab7c38be00e1d39eb00728da7564cb614ed3f94e327c81b1d1eed
SHA5122158bafcc5b01a2d8fc941f94a0a8bacf66b719d0f165ce566da624f8c188fad43e7db065ec91da5506a34c945f4f16352ed45e1def578f65549bb3fbc8c8b08