Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 10:20
Behavioral task
behavioral1
Sample
d3df158f15b7cb83474672529243fce0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
d3df158f15b7cb83474672529243fce0_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
d3df158f15b7cb83474672529243fce0
-
SHA1
b4da37421155bae8550cc2f5c08bfe6da0471dc5
-
SHA256
aca515508c9bcae80b97719203ba6f617bb6e560b5b60c1722f9657997b38615
-
SHA512
c424bb65374843ee8f2c4e9ffaafb5e9bda51b8179bbf681b4bcb7a4f771914e629e933d594ec203d6b7d1bc4bde22c4032bfc951b1832f20986f4186dc00f9f
-
SSDEEP
24576:zQ5aILMCfmAUjzX677WOMcT/X2dI7T2FAoUcUOp6doF5ES/oT:E5aIwC+Agr6tdlmU1/eoT
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023424-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4844-15-0x00000000029B0000-0x00000000029D9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 2104 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe Token: SeTcbPrivilege 2104 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4844 d3df158f15b7cb83474672529243fce0_NeikiAnalytics.exe 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 2104 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4844 wrote to memory of 4284 4844 d3df158f15b7cb83474672529243fce0_NeikiAnalytics.exe 83 PID 4844 wrote to memory of 4284 4844 d3df158f15b7cb83474672529243fce0_NeikiAnalytics.exe 83 PID 4844 wrote to memory of 4284 4844 d3df158f15b7cb83474672529243fce0_NeikiAnalytics.exe 83 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 4284 wrote to memory of 1492 4284 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 84 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 928 wrote to memory of 4284 928 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 102 PID 2104 wrote to memory of 4204 2104 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 111 PID 2104 wrote to memory of 4204 2104 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 111 PID 2104 wrote to memory of 4204 2104 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 111 PID 2104 wrote to memory of 4204 2104 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 111 PID 2104 wrote to memory of 4204 2104 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 111 PID 2104 wrote to memory of 4204 2104 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 111 PID 2104 wrote to memory of 4204 2104 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 111 PID 2104 wrote to memory of 4204 2104 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 111 PID 2104 wrote to memory of 4204 2104 d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3df158f15b7cb83474672529243fce0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d3df158f15b7cb83474672529243fce0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Roaming\WinSocket\d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1492
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4284
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\d3df169f16b8cb93484782629243fce0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5d3df158f15b7cb83474672529243fce0
SHA1b4da37421155bae8550cc2f5c08bfe6da0471dc5
SHA256aca515508c9bcae80b97719203ba6f617bb6e560b5b60c1722f9657997b38615
SHA512c424bb65374843ee8f2c4e9ffaafb5e9bda51b8179bbf681b4bcb7a4f771914e629e933d594ec203d6b7d1bc4bde22c4032bfc951b1832f20986f4186dc00f9f
-
Filesize
48KB
MD52b8f1c344c8269a5633ece2325aef121
SHA1c8e4f1aa0daf0714dfee8667c313f1278e423027
SHA256c0331d36e69086099f283a80acdece7112c152e16f165a577b44eddc687e8115
SHA512a146ab22826538aab0f1488788192ec0cdd669f99c34c7d04115da237726abfa28d2d31b4aed6eda3bf3c4013e07c9afe4ebe00670305c87c19c9025780d201c