Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 03:28
Behavioral task
behavioral1
Sample
10228b19267cd57c4e838785a95a1880_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
10228b19267cd57c4e838785a95a1880_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
10228b19267cd57c4e838785a95a1880
-
SHA1
c36005e23faab52e5a7abf5147b3be285e413b9f
-
SHA256
43ef85a31ffe7667a2b133a2405631fa8c8c16b4f5f5c22d98c6f224fab18eac
-
SHA512
9085f2ad32c8f09176a6b44a6da3c498e15fb384dfc87af582d217d00cd237783eb5930844e63f216c81ce961abb18da4d7bf7505750f957e1e9f999d7bfee50
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMAOxA5zYlo1c51WnZ2ky:E5aIwC+Agr6StVEnmcKxY/O16y
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000233c8-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1808-15-0x0000000002AD0000-0x0000000002AF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 3308 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe Token: SeTcbPrivilege 3308 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1808 10228b19267cd57c4e838785a95a1880_NeikiAnalytics.exe 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 3308 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 4640 1808 10228b19267cd57c4e838785a95a1880_NeikiAnalytics.exe 82 PID 1808 wrote to memory of 4640 1808 10228b19267cd57c4e838785a95a1880_NeikiAnalytics.exe 82 PID 1808 wrote to memory of 4640 1808 10228b19267cd57c4e838785a95a1880_NeikiAnalytics.exe 82 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 4640 wrote to memory of 4404 4640 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 83 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3596 wrote to memory of 2396 3596 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 93 PID 3308 wrote to memory of 3200 3308 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 95 PID 3308 wrote to memory of 3200 3308 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 95 PID 3308 wrote to memory of 3200 3308 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 95 PID 3308 wrote to memory of 3200 3308 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 95 PID 3308 wrote to memory of 3200 3308 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 95 PID 3308 wrote to memory of 3200 3308 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 95 PID 3308 wrote to memory of 3200 3308 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 95 PID 3308 wrote to memory of 3200 3308 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 95 PID 3308 wrote to memory of 3200 3308 10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\10228b19267cd57c4e838785a95a1880_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\10228b19267cd57c4e838785a95a1880_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Roaming\WinSocket\10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4404
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2396
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\10229b19278cd68c4e939896a96a1990_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD510228b19267cd57c4e838785a95a1880
SHA1c36005e23faab52e5a7abf5147b3be285e413b9f
SHA25643ef85a31ffe7667a2b133a2405631fa8c8c16b4f5f5c22d98c6f224fab18eac
SHA5129085f2ad32c8f09176a6b44a6da3c498e15fb384dfc87af582d217d00cd237783eb5930844e63f216c81ce961abb18da4d7bf7505750f957e1e9f999d7bfee50
-
Filesize
32KB
MD52c3b5e619da3a9eb77e6e249729e4d48
SHA1402f4495ac1b6c640199f599f55ce58a82e724be
SHA25607fdb562bdb4bf37304088d931391189d9125744445f3939713d02b62ef59076
SHA512263c28c87ea80912963bb52b6e2fafa90996919a400922cca43ced9f791282797f946284950e2994f26317a37805c5f60ad92f92b0c532618edc410901e93003