Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 13:22
Behavioral task
behavioral1
Sample
547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
02819aba48b35ba0d52dadea6a4de550
-
SHA1
aca219781675ba31463e9ea7b2b7536be4620539
-
SHA256
547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791
-
SHA512
7b23f8aa48f5cf8ab65e69c67cb57f87d4cb151a565787b185109e111c97ea8eb5cb97d7d9805bed609eb8d7dc5a1f3bdfc8cafe83c2d254650bc054901730c2
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1Sd8zG7u75+FmVf6IIwQREr0ino4:E5aIwC+Agr6S/FEAGsjiIIbErJ
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023264-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/5020-17-0x0000000002200000-0x0000000002229000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 1600 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe Token: SeTcbPrivilege 1600 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5020 547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791_NeikiAnalytics.exe 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 1600 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 2112 5020 547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791_NeikiAnalytics.exe 90 PID 5020 wrote to memory of 2112 5020 547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791_NeikiAnalytics.exe 90 PID 5020 wrote to memory of 2112 5020 547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791_NeikiAnalytics.exe 90 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 2112 wrote to memory of 3964 2112 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 91 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1884 wrote to memory of 1540 1884 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 102 PID 1600 wrote to memory of 3764 1600 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 104 PID 1600 wrote to memory of 3764 1600 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 104 PID 1600 wrote to memory of 3764 1600 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 104 PID 1600 wrote to memory of 3764 1600 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 104 PID 1600 wrote to memory of 3764 1600 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 104 PID 1600 wrote to memory of 3764 1600 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 104 PID 1600 wrote to memory of 3764 1600 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 104 PID 1600 wrote to memory of 3764 1600 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 104 PID 1600 wrote to memory of 3764 1600 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Roaming\WinSocket\648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3964
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:4660
-
C:\Users\Admin\AppData\Roaming\WinSocket\648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1540
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891_NeikiAnalytict.exe
Filesize1.3MB
MD502819aba48b35ba0d52dadea6a4de550
SHA1aca219781675ba31463e9ea7b2b7536be4620539
SHA256547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791
SHA5127b23f8aa48f5cf8ab65e69c67cb57f87d4cb151a565787b185109e111c97ea8eb5cb97d7d9805bed609eb8d7dc5a1f3bdfc8cafe83c2d254650bc054901730c2
-
Filesize
43KB
MD57b5276d0a4792bb8e0d2f4310955157b
SHA1152e9a07efc373118774a187db2fa7795accbd4d
SHA256296ebd05281e58d14d987ddb9d4bec7fcd3f054dccc01293bba5c0a80ca1642f
SHA5125c086405bc4363dbae6d7e3497b27134054dc3e55273a12a41888506b06a06c38d51484fd58fd3648b77ee149478286aa455e388dc2d96c7f6b15296e3b895bc