Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 11:44
Behavioral task
behavioral1
Sample
effcdf1db8178375d2191b77ba7a6e10_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
effcdf1db8178375d2191b77ba7a6e10_NeikiAnalytics.exe
-
Size
1011KB
-
MD5
effcdf1db8178375d2191b77ba7a6e10
-
SHA1
69b83da34c824ee263962a654441cfb64cde2d57
-
SHA256
798e8fc962ff9241bac87bd6b1b0e772a6ecc6a75f1cec39ce332b078f8db6ed
-
SHA512
a8244b04ea8237b81e2c73d6562134f6606451d5b340fa620ec73867fcdd72b0fe7d535948f46bb8ab74243cb2804ace774f53879bad4f85c73afbf7ddf1b287
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEs1HzCHT4TlM9YmJ2Q97v54yRnkQgVfp:zQ5aILMCfmAUjzX6T0TlOnvPyQCfp
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002341c-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1020-15-0x0000000002AF0000-0x0000000002B19000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 2812 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe Token: SeTcbPrivilege 2812 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1020 effcdf1db8178375d2191b77ba7a6e10_NeikiAnalytics.exe 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 2812 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1020 wrote to memory of 1112 1020 effcdf1db8178375d2191b77ba7a6e10_NeikiAnalytics.exe 83 PID 1020 wrote to memory of 1112 1020 effcdf1db8178375d2191b77ba7a6e10_NeikiAnalytics.exe 83 PID 1020 wrote to memory of 1112 1020 effcdf1db8178375d2191b77ba7a6e10_NeikiAnalytics.exe 83 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1112 wrote to memory of 2352 1112 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 84 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 1696 wrote to memory of 3012 1696 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 103 PID 2812 wrote to memory of 3204 2812 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 111 PID 2812 wrote to memory of 3204 2812 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 111 PID 2812 wrote to memory of 3204 2812 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 111 PID 2812 wrote to memory of 3204 2812 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 111 PID 2812 wrote to memory of 3204 2812 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 111 PID 2812 wrote to memory of 3204 2812 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 111 PID 2812 wrote to memory of 3204 2812 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 111 PID 2812 wrote to memory of 3204 2812 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 111 PID 2812 wrote to memory of 3204 2812 effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\effcdf1db8178375d2191b77ba7a6e10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\effcdf1db8178375d2191b77ba7a6e10_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Roaming\WinSocket\effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2352
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3012
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\effcdf1db9189386d2191b88ba8a7e10_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1011KB
MD5effcdf1db8178375d2191b77ba7a6e10
SHA169b83da34c824ee263962a654441cfb64cde2d57
SHA256798e8fc962ff9241bac87bd6b1b0e772a6ecc6a75f1cec39ce332b078f8db6ed
SHA512a8244b04ea8237b81e2c73d6562134f6606451d5b340fa620ec73867fcdd72b0fe7d535948f46bb8ab74243cb2804ace774f53879bad4f85c73afbf7ddf1b287
-
Filesize
29KB
MD50af693166932cee5919ced0202273e75
SHA150d3c9bdc23b699a408b642d198af32253eeaad6
SHA256e8691e02cd2bcb2a1b9e2aa89e0c57734b75b4f9f88dca93a3af5586b1bd0f2f
SHA512ac2e77f46ce136d18cc76147361ef2f1ce2f4a360c0113c573f2249ae24622f37f79a27c5e4e6d6bf1ec8b68772bae4313b613289c0b8dfefca2504e048c72fb