Analysis
-
max time kernel
137s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 18:38
Behavioral task
behavioral1
Sample
0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
0bb890f4613ef5e03f64cbf13f7b57f0
-
SHA1
abcf6d03c7610a9d3024ab65aa621a127d0ec4a2
-
SHA256
8d3048b45a8d49dc227d30c39040c419e38bd599268f8b80c3612dcd0acdcadc
-
SHA512
405b112a7c686a4484e41023f138ed68d22ac7f4e90dc02754bb3b1b2df7915aeac80c3b33f57f6b375c860b945d3fd096308d28d98601afa66971f49565315c
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQE4efQg3zNn+2jsvercPk9N4hVI3/TQyFwfkx:E5aIwC+Agr6SqCPGvTpx
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000235e0-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4904-15-0x0000000002AB0000-0x0000000002AD9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 4448 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe Token: SeTcbPrivilege 4448 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4904 0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 4448 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4904 wrote to memory of 3864 4904 0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe 90 PID 4904 wrote to memory of 3864 4904 0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe 90 PID 4904 wrote to memory of 3864 4904 0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe 90 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 3864 wrote to memory of 316 3864 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 93 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 644 wrote to memory of 3296 644 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 111 PID 4448 wrote to memory of 4392 4448 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 120 PID 4448 wrote to memory of 4392 4448 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 120 PID 4448 wrote to memory of 4392 4448 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 120 PID 4448 wrote to memory of 4392 4448 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 120 PID 4448 wrote to memory of 4392 4448 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 120 PID 4448 wrote to memory of 4392 4448 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 120 PID 4448 wrote to memory of 4392 4448 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 120 PID 4448 wrote to memory of 4392 4448 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 120 PID 4448 wrote to memory of 4392 4448 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Roaming\WinSocket\0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:316
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4072,i,14486271492189381216,15799931579469722648,262144 --variations-seed-version --mojo-platform-channel-handle=4552 /prefetch:81⤵PID:1912
-
C:\Users\Admin\AppData\Roaming\WinSocket\0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3296
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD50bb890f4613ef5e03f64cbf13f7b57f0
SHA1abcf6d03c7610a9d3024ab65aa621a127d0ec4a2
SHA2568d3048b45a8d49dc227d30c39040c419e38bd599268f8b80c3612dcd0acdcadc
SHA512405b112a7c686a4484e41023f138ed68d22ac7f4e90dc02754bb3b1b2df7915aeac80c3b33f57f6b375c860b945d3fd096308d28d98601afa66971f49565315c
-
Filesize
29KB
MD5f0f47d802b8c0ac4172474cc79af6c92
SHA1973e524951ef66a3563d7e9a20200c16c5f5f35e
SHA2561538f8797297eb754de23ab8f1ac1b3482c7939143e60f37af83be6b4ec3f95a
SHA5124068ab8eabb842492ba4b6360c2064a819684ce4da018a3d4175e767c7059e67f1fac309ed2bbf7d56b9c42af6b7b95109fe34d7ddfc503419d5d05a8074b6e2