Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 11:08
Behavioral task
behavioral1
Sample
acf4bcbb83a2b4a75fdd75346ea41490_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
acf4bcbb83a2b4a75fdd75346ea41490_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
acf4bcbb83a2b4a75fdd75346ea41490
-
SHA1
d5a27bdce34763bd20a3db2ddce4495323dd30ee
-
SHA256
cc033a7139570c93b327b1fce324851cce00d81447dea0d0de076ff5e6c2fb82
-
SHA512
f1833af44d800dbd196f22d46602698f6347274cb884552857d957a8590416493a364a4ad8fe2f94b1323c77f424abc54a50e39a32089afb84ecd0df69ebac0a
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMHI+rMUx+N43XVZpFyD:E5aIwC+Agr6StVEnmcI+2zTyD
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023432-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4988-15-0x0000000002FF0000-0x0000000003019000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 3760 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe Token: SeTcbPrivilege 3760 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4988 acf4bcbb83a2b4a75fdd75346ea41490_NeikiAnalytics.exe 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 3760 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 1360 4988 acf4bcbb83a2b4a75fdd75346ea41490_NeikiAnalytics.exe 82 PID 4988 wrote to memory of 1360 4988 acf4bcbb83a2b4a75fdd75346ea41490_NeikiAnalytics.exe 82 PID 4988 wrote to memory of 1360 4988 acf4bcbb83a2b4a75fdd75346ea41490_NeikiAnalytics.exe 82 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1360 wrote to memory of 116 1360 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 83 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 1680 wrote to memory of 1192 1680 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 103 PID 3760 wrote to memory of 1036 3760 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 111 PID 3760 wrote to memory of 1036 3760 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 111 PID 3760 wrote to memory of 1036 3760 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 111 PID 3760 wrote to memory of 1036 3760 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 111 PID 3760 wrote to memory of 1036 3760 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 111 PID 3760 wrote to memory of 1036 3760 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 111 PID 3760 wrote to memory of 1036 3760 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 111 PID 3760 wrote to memory of 1036 3760 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 111 PID 3760 wrote to memory of 1036 3760 acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\acf4bcbb83a2b4a75fdd75346ea41490_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\acf4bcbb83a2b4a75fdd75346ea41490_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Roaming\WinSocket\acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:116
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1192
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\acf4bcbb93a2b4a86fdd86347ea41490_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5acf4bcbb83a2b4a75fdd75346ea41490
SHA1d5a27bdce34763bd20a3db2ddce4495323dd30ee
SHA256cc033a7139570c93b327b1fce324851cce00d81447dea0d0de076ff5e6c2fb82
SHA512f1833af44d800dbd196f22d46602698f6347274cb884552857d957a8590416493a364a4ad8fe2f94b1323c77f424abc54a50e39a32089afb84ecd0df69ebac0a
-
Filesize
30KB
MD51f11dcad5d7db41a68c36df4f12c65d3
SHA1b720c1d050059452ec75c518e79381dcdd13ec99
SHA25622efff8b373b85dae69658a22756a2e97cb26499e099650b8e454a8135dea9ae
SHA512f1a9dfab556f7b1f2ada8b4431a72f2ae7f1bafc96d45090381eee7bc712b6a0ac5f230ea9db231cc1a985591f377a40f2dcd77f9fd734f0a36a403a09efdb95