Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 02:54
Behavioral task
behavioral1
Sample
5b4cc94bd21d1799568471b3c46fdde0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
5b4cc94bd21d1799568471b3c46fdde0_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
5b4cc94bd21d1799568471b3c46fdde0
-
SHA1
09816b0d7e61e0976cfb8ee49372e3144c1623ef
-
SHA256
7cea9502016cd91aed40f41c2aabd1216cffca4143e452bc8290abbe286726b0
-
SHA512
5973fb1349c09ddde05f49e367216e1b31e302f44ab3508adb5cde97d4c0ec702a548eb87186fc04d3a9c28f4694f99406591544805a1084e6753747854de6cb
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSM65A:E5aIwC+Agr6SN1
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000800000002330f-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2868-15-0x0000000002FE0000-0x0000000003009000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 2644 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe Token: SeTcbPrivilege 2644 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2868 5b4cc94bd21d1799568471b3c46fdde0_NeikiAnalytics.exe 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 2644 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 3044 2868 5b4cc94bd21d1799568471b3c46fdde0_NeikiAnalytics.exe 91 PID 2868 wrote to memory of 3044 2868 5b4cc94bd21d1799568471b3c46fdde0_NeikiAnalytics.exe 91 PID 2868 wrote to memory of 3044 2868 5b4cc94bd21d1799568471b3c46fdde0_NeikiAnalytics.exe 91 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 3044 wrote to memory of 3932 3044 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 92 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 936 wrote to memory of 3976 936 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 108 PID 2644 wrote to memory of 4600 2644 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 117 PID 2644 wrote to memory of 4600 2644 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 117 PID 2644 wrote to memory of 4600 2644 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 117 PID 2644 wrote to memory of 4600 2644 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 117 PID 2644 wrote to memory of 4600 2644 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 117 PID 2644 wrote to memory of 4600 2644 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 117 PID 2644 wrote to memory of 4600 2644 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 117 PID 2644 wrote to memory of 4600 2644 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 117 PID 2644 wrote to memory of 4600 2644 6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b4cc94bd21d1799568471b3c46fdde0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5b4cc94bd21d1799568471b3c46fdde0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Roaming\WinSocket\6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3932
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4036,i,17096020621006928097,15544233752327415349,262144 --variations-seed-version --mojo-platform-channel-handle=4312 /prefetch:81⤵PID:1924
-
C:\Users\Admin\AppData\Roaming\WinSocket\6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3976
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\6b4cc94bd21d1899679481b3c47fdde0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD55b4cc94bd21d1799568471b3c46fdde0
SHA109816b0d7e61e0976cfb8ee49372e3144c1623ef
SHA2567cea9502016cd91aed40f41c2aabd1216cffca4143e452bc8290abbe286726b0
SHA5125973fb1349c09ddde05f49e367216e1b31e302f44ab3508adb5cde97d4c0ec702a548eb87186fc04d3a9c28f4694f99406591544805a1084e6753747854de6cb
-
Filesize
33KB
MD5df374745afa07f14b70266a8407a0674
SHA1b8766cc2e1a224e3c51593112bf75a31e850f82e
SHA256e48f801d6552768a6329132ef2757c88a4082cc767c44d8c1a7f19b3a65f3d83
SHA51208525ed1d68470152ae4042dfb5370833263a9a239f8ac115f00ebf913035db4e508abdf5fd51e0626366073c00b8cf2d7b002c6c7b64f25dbd2a239d33a1147