Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 15:29
Behavioral task
behavioral1
Sample
3a48c3e72a85863e52b4782b511a0840_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
3a48c3e72a85863e52b4782b511a0840_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
3a48c3e72a85863e52b4782b511a0840
-
SHA1
4794b16f61e21855b03717cdd1934ad6ab9566cf
-
SHA256
32c23609e72bd9fb8fab577d18ee7441c3dfb1c0ffaad8a16db8879e7c73bbd5
-
SHA512
ac6b03923f0c87122c52a9f206f834f65a976bf991e81600ea30de303f6b4bb2715a6719dda4aa055a665c30e34904c616492c646a8232d61c4b3e484e011f4a
-
SSDEEP
24576:zQ5aILMCfmAUjzX677WOMcT/X2dI7T2FAoUcUOp6doF5ES/ooQ:E5aIwC+Agr6tdlmU1/eod
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002341d-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4536-15-0x0000000002220000-0x0000000002249000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 3952 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe Token: SeTcbPrivilege 3952 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4536 3a48c3e72a85863e52b4782b511a0840_NeikiAnalytics.exe 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 3952 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4536 wrote to memory of 3900 4536 3a48c3e72a85863e52b4782b511a0840_NeikiAnalytics.exe 84 PID 4536 wrote to memory of 3900 4536 3a48c3e72a85863e52b4782b511a0840_NeikiAnalytics.exe 84 PID 4536 wrote to memory of 3900 4536 3a48c3e72a85863e52b4782b511a0840_NeikiAnalytics.exe 84 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3900 wrote to memory of 2980 3900 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 85 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3196 wrote to memory of 2980 3196 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 103 PID 3952 wrote to memory of 4800 3952 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 116 PID 3952 wrote to memory of 4800 3952 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 116 PID 3952 wrote to memory of 4800 3952 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 116 PID 3952 wrote to memory of 4800 3952 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 116 PID 3952 wrote to memory of 4800 3952 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 116 PID 3952 wrote to memory of 4800 3952 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 116 PID 3952 wrote to memory of 4800 3952 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 116 PID 3952 wrote to memory of 4800 3952 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 116 PID 3952 wrote to memory of 4800 3952 3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a48c3e72a85863e52b4782b511a0840_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3a48c3e72a85863e52b4782b511a0840_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Roaming\WinSocket\3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2980
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2980
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3a49c3e82a96973e62b4892b611a0940_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD53a48c3e72a85863e52b4782b511a0840
SHA14794b16f61e21855b03717cdd1934ad6ab9566cf
SHA25632c23609e72bd9fb8fab577d18ee7441c3dfb1c0ffaad8a16db8879e7c73bbd5
SHA512ac6b03923f0c87122c52a9f206f834f65a976bf991e81600ea30de303f6b4bb2715a6719dda4aa055a665c30e34904c616492c646a8232d61c4b3e484e011f4a
-
Filesize
42KB
MD57a6c113a0a569e63e097cca9d5f2f8de
SHA1799ab4a7b4cce136239375c3536fb5dbd039b7c4
SHA2567a4932c170c55f72706f3e298160fe6df5e0f224a6158bd8bd3943fb130cce79
SHA512f4eb10521fee1e7b0fd91df07e7205bb58ac9cb747eb5baa6c210159c206fa8d0ab0038b77d7b91fa4edd0b27170263d22c4d72ac4133ab1e12a0c880da2a3c2