Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 16:17
Behavioral task
behavioral1
Sample
eac7a854d283ca1ad7d20226a79f9d90_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
eac7a854d283ca1ad7d20226a79f9d90_NeikiAnalytics.exe
-
Size
946KB
-
MD5
eac7a854d283ca1ad7d20226a79f9d90
-
SHA1
1700165bfd27757db4a12ac0c3e531906c2d81d3
-
SHA256
c1b9eb2b80e5768d0db6d135c38b77f266971a6df3dd6fffc5850b980214d8cc
-
SHA512
b6791301ce2cc401322f6b7ab56624fabf3c7e142a34f00686c9ece5d17db963afc0944651ce64a868ed88b5de2607665058f50c897fd91db076792e63b35125
-
SSDEEP
24576:zQ5aILMCfmAUjzX6gfU1pjwjbsmQdmTYc:E5aIwC+Agr6g81pbc
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1220-15-0x00000000029C0000-0x00000000029E9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exeeac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exeeac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exepid process 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe 4808 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exeeac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe Token: SeTcbPrivilege 4808 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
eac7a854d283ca1ad7d20226a79f9d90_NeikiAnalytics.exeeac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exeeac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exeeac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exepid process 1220 eac7a854d283ca1ad7d20226a79f9d90_NeikiAnalytics.exe 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe 4808 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
eac7a854d283ca1ad7d20226a79f9d90_NeikiAnalytics.exeeac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exeeac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exeeac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exedescription pid process target process PID 1220 wrote to memory of 3340 1220 eac7a854d283ca1ad7d20226a79f9d90_NeikiAnalytics.exe eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe PID 1220 wrote to memory of 3340 1220 eac7a854d283ca1ad7d20226a79f9d90_NeikiAnalytics.exe eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe PID 1220 wrote to memory of 3340 1220 eac7a854d283ca1ad7d20226a79f9d90_NeikiAnalytics.exe eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 3340 wrote to memory of 2844 3340 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4644 wrote to memory of 4816 4644 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4808 wrote to memory of 2384 4808 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4808 wrote to memory of 2384 4808 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4808 wrote to memory of 2384 4808 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4808 wrote to memory of 2384 4808 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4808 wrote to memory of 2384 4808 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4808 wrote to memory of 2384 4808 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4808 wrote to memory of 2384 4808 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4808 wrote to memory of 2384 4808 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe PID 4808 wrote to memory of 2384 4808 eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac7a854d283ca1ad7d20226a79f9d90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\eac7a854d283ca1ad7d20226a79f9d90_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Roaming\WinSocket\eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2844
-
C:\Users\Admin\AppData\Roaming\WinSocket\eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4816
-
C:\Users\Admin\AppData\Roaming\WinSocket\eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\eac8a964d293ca1ad8d20227a89f9d90_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
946KB
MD5eac7a854d283ca1ad7d20226a79f9d90
SHA11700165bfd27757db4a12ac0c3e531906c2d81d3
SHA256c1b9eb2b80e5768d0db6d135c38b77f266971a6df3dd6fffc5850b980214d8cc
SHA512b6791301ce2cc401322f6b7ab56624fabf3c7e142a34f00686c9ece5d17db963afc0944651ce64a868ed88b5de2607665058f50c897fd91db076792e63b35125
-
Filesize
20KB
MD567586ce8264fa382b74c46d76f63ac3b
SHA1cfd1159878d10f8ca710a4c921613202583c5674
SHA256c54d8b14dd6a4ef6a5caff2eeeca457fee1e76d7bbc05bc19976f43a13f7080f
SHA5125ef2b528e0a9ab07477784dead885e58f1e3228d7cf83106120f9eddfb5260b851417cb94fd3ee28c5af170ce9740b5e1ef672faebe2824c2e842822d3196ca6