Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 23:56
Behavioral task
behavioral1
Sample
0e2068c57ded8125148705bd903eead0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
0e2068c57ded8125148705bd903eead0_NeikiAnalytics.exe
-
Size
799KB
-
MD5
0e2068c57ded8125148705bd903eead0
-
SHA1
62cc25f2fef878e5b35b5f236614a3058556b635
-
SHA256
a804afe454e9930a1fbe9884e7c1b0b8485f99e476e2ce2b6eabeba974ac9737
-
SHA512
9f79c6b040816c9419daf0a384533b8640fd03f40418f20e011b19d68f846c32c91b26bce5e71336428c87c882df746e18013268a12b8b3dee16d16ec9b5635a
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQGCsksQjn6YHldGm1u9hf0KM:zQ5aILMCfmAUjzX6xQGCZLFdGm1ShhM
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2012-15-0x0000000002390000-0x00000000023B9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exepid process 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe 860 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe Token: SeTcbPrivilege 860 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
0e2068c57ded8125148705bd903eead0_NeikiAnalytics.exe0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exepid process 2012 0e2068c57ded8125148705bd903eead0_NeikiAnalytics.exe 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe 860 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0e2068c57ded8125148705bd903eead0_NeikiAnalytics.exe0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exedescription pid process target process PID 2012 wrote to memory of 1292 2012 0e2068c57ded8125148705bd903eead0_NeikiAnalytics.exe 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe PID 2012 wrote to memory of 1292 2012 0e2068c57ded8125148705bd903eead0_NeikiAnalytics.exe 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe PID 2012 wrote to memory of 1292 2012 0e2068c57ded8125148705bd903eead0_NeikiAnalytics.exe 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 1292 wrote to memory of 5040 1292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 2292 wrote to memory of 428 2292 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 860 wrote to memory of 1064 860 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 860 wrote to memory of 1064 860 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 860 wrote to memory of 1064 860 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 860 wrote to memory of 1064 860 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 860 wrote to memory of 1064 860 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 860 wrote to memory of 1064 860 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 860 wrote to memory of 1064 860 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 860 wrote to memory of 1064 860 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe PID 860 wrote to memory of 1064 860 0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e2068c57ded8125148705bd903eead0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0e2068c57ded8125148705bd903eead0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Roaming\WinSocket\0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:5040
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:428
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0e2079c68ded9126149806bd903eead0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
799KB
MD50e2068c57ded8125148705bd903eead0
SHA162cc25f2fef878e5b35b5f236614a3058556b635
SHA256a804afe454e9930a1fbe9884e7c1b0b8485f99e476e2ce2b6eabeba974ac9737
SHA5129f79c6b040816c9419daf0a384533b8640fd03f40418f20e011b19d68f846c32c91b26bce5e71336428c87c882df746e18013268a12b8b3dee16d16ec9b5635a
-
Filesize
32KB
MD5a8ba16e6ce89d9b34dc41a052de00622
SHA176f16c98924e5d91bffffb9f0fa4e4a3aa6e2cc3
SHA2563c11c7306a2e49f5caae6a15ad2848e912a701cfd9408cc97f435710ba09ab98
SHA512a13093a15ae55c78bd544d18853ec91a7eadca3d08195c0bdb2928ac44c06c8e771e644b4d0a1394f64eac9d905275d67f3d100333d4eb285421d4aad4b0506a