Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 05:31
Behavioral task
behavioral1
Sample
b9b545085e23c0b6ce5236742ba877d0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
b9b545085e23c0b6ce5236742ba877d0_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
b9b545085e23c0b6ce5236742ba877d0
-
SHA1
4f1d59594fe21c95003974f1c93406148a882f35
-
SHA256
ba25564af5c21a501187f82156108be077ae9681994d37446338a108fe86820e
-
SHA512
477c8c0c2c534f06ac83704a8270c46218ffb3f19d3ded7e8eadb8a8c43154523eb8e648594197f4dbf0c36b6f7a553dde31ad1e66657e8f6c3d04da71ba067d
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSM6J:E5aIwC+Agr6SNO
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1148-16-0x0000000002AB0000-0x0000000002AD9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exeb9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exeb9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exepid process 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe 4316 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exeb9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe Token: SeTcbPrivilege 4316 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
b9b545085e23c0b6ce5236742ba877d0_NeikiAnalytics.exeb9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exeb9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exeb9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exepid process 1148 b9b545085e23c0b6ce5236742ba877d0_NeikiAnalytics.exe 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe 4316 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b9b545085e23c0b6ce5236742ba877d0_NeikiAnalytics.exeb9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exeb9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exeb9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exedescription pid process target process PID 1148 wrote to memory of 4012 1148 b9b545085e23c0b6ce5236742ba877d0_NeikiAnalytics.exe b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe PID 1148 wrote to memory of 4012 1148 b9b545085e23c0b6ce5236742ba877d0_NeikiAnalytics.exe b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe PID 1148 wrote to memory of 4012 1148 b9b545085e23c0b6ce5236742ba877d0_NeikiAnalytics.exe b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4012 wrote to memory of 5012 4012 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 3264 wrote to memory of 1044 3264 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4316 wrote to memory of 3588 4316 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4316 wrote to memory of 3588 4316 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4316 wrote to memory of 3588 4316 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4316 wrote to memory of 3588 4316 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4316 wrote to memory of 3588 4316 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4316 wrote to memory of 3588 4316 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4316 wrote to memory of 3588 4316 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4316 wrote to memory of 3588 4316 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe PID 4316 wrote to memory of 3588 4316 b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9b545085e23c0b6ce5236742ba877d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b9b545085e23c0b6ce5236742ba877d0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Roaming\WinSocket\b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:5012
-
C:\Users\Admin\AppData\Roaming\WinSocket\b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1044
-
C:\Users\Admin\AppData\Roaming\WinSocket\b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\b9b646096e23c0b7ce6237842ba988d0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5b9b545085e23c0b6ce5236742ba877d0
SHA14f1d59594fe21c95003974f1c93406148a882f35
SHA256ba25564af5c21a501187f82156108be077ae9681994d37446338a108fe86820e
SHA512477c8c0c2c534f06ac83704a8270c46218ffb3f19d3ded7e8eadb8a8c43154523eb8e648594197f4dbf0c36b6f7a553dde31ad1e66657e8f6c3d04da71ba067d
-
Filesize
31KB
MD5df1975d141c9ceff0ddb6ee88f63b28b
SHA10bc582db8c789075bb1a49107bb481953a20c08f
SHA25638c0f3be27075722dc9600889b9bbbdf3fddee81b67174d8c127e2ff180bb5ad
SHA51231dafaacba4637d39d31d0159fe344dc5d0310b71feb4cc5dc42e1508cb27235e670ccd0f4bdcf275adb809bbf6b4c694b421ef68c0d8f6afb41ab9fc07b858b