Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:02
Behavioral task
behavioral1
Sample
00b33a6bf17b76e78f5404bc37638a10_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
00b33a6bf17b76e78f5404bc37638a10_NeikiAnalytics.exe
-
Size
1.6MB
-
MD5
00b33a6bf17b76e78f5404bc37638a10
-
SHA1
2c3a870d6ca7d28bff84e0fc48ff14d8bf089768
-
SHA256
f05e7e3b171f42cdc9816ee35990fc09614e98d95101500e4d460190dfcf1f44
-
SHA512
91cb26f24360ab7edfaa98e4cc015bee07d54670a2129701f1e6036a74a2f2671cf64b583216c540336ec9cf4c61707c0a1a1e566391b5923cc4b1fea823dcef
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQE4efQg3zNn+2jsvercPk9N4hVI3/BxL+XKHZjb//8ISgHU:E5aIwC+Agr6SqCPGC6HZkIT/M
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002341e-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1052-15-0x0000000002D10000-0x0000000002D39000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 1620 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe Token: SeTcbPrivilege 1620 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1052 00b33a6bf17b76e78f5404bc37638a10_NeikiAnalytics.exe 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 1620 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1052 wrote to memory of 2340 1052 00b33a6bf17b76e78f5404bc37638a10_NeikiAnalytics.exe 84 PID 1052 wrote to memory of 2340 1052 00b33a6bf17b76e78f5404bc37638a10_NeikiAnalytics.exe 84 PID 1052 wrote to memory of 2340 1052 00b33a6bf17b76e78f5404bc37638a10_NeikiAnalytics.exe 84 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 2340 wrote to memory of 3252 2340 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 86 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 4740 wrote to memory of 3568 4740 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 100 PID 1620 wrote to memory of 4280 1620 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 109 PID 1620 wrote to memory of 4280 1620 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 109 PID 1620 wrote to memory of 4280 1620 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 109 PID 1620 wrote to memory of 4280 1620 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 109 PID 1620 wrote to memory of 4280 1620 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 109 PID 1620 wrote to memory of 4280 1620 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 109 PID 1620 wrote to memory of 4280 1620 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 109 PID 1620 wrote to memory of 4280 1620 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 109 PID 1620 wrote to memory of 4280 1620 00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\00b33a6bf17b76e78f5404bc37638a10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\00b33a6bf17b76e78f5404bc37638a10_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Roaming\WinSocket\00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3252
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3568
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\00b33a7bf18b87e89f6404bc38739a10_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD500b33a6bf17b76e78f5404bc37638a10
SHA12c3a870d6ca7d28bff84e0fc48ff14d8bf089768
SHA256f05e7e3b171f42cdc9816ee35990fc09614e98d95101500e4d460190dfcf1f44
SHA51291cb26f24360ab7edfaa98e4cc015bee07d54670a2129701f1e6036a74a2f2671cf64b583216c540336ec9cf4c61707c0a1a1e566391b5923cc4b1fea823dcef
-
Filesize
44KB
MD58d3c45e1335bd3a06d1eed0053b35ce7
SHA11fba9ba39733c18a3531d63ab08c376bdefe5d9c
SHA25643ae5a998dbe2297d6cd99efa1c30fc7c5e83576136b288bd7a305a46adf846d
SHA5121844af433ac0ef90da5b8480ff11508e15b70640747fb04b202377ad57ef3de05069b1f6376f437e96ca0289afa78bf2461349049b8fe19291cac4c137e4550c