Analysis
-
max time kernel
139s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 21:52
Behavioral task
behavioral1
Sample
0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
0bb890f4613ef5e03f64cbf13f7b57f0
-
SHA1
abcf6d03c7610a9d3024ab65aa621a127d0ec4a2
-
SHA256
8d3048b45a8d49dc227d30c39040c419e38bd599268f8b80c3612dcd0acdcadc
-
SHA512
405b112a7c686a4484e41023f138ed68d22ac7f4e90dc02754bb3b1b2df7915aeac80c3b33f57f6b375c860b945d3fd096308d28d98601afa66971f49565315c
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQE4efQg3zNn+2jsvercPk9N4hVI3/TQyFwfkx:E5aIwC+Agr6SqCPGvTpx
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000235a0-22.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4900-15-0x0000000002BD0000-0x0000000002BF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 1316 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe Token: SeTcbPrivilege 1316 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4900 0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 1316 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4900 wrote to memory of 3820 4900 0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe 91 PID 4900 wrote to memory of 3820 4900 0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe 91 PID 4900 wrote to memory of 3820 4900 0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe 91 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3820 wrote to memory of 1544 3820 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 92 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 3880 wrote to memory of 1040 3880 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 112 PID 1316 wrote to memory of 2388 1316 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 122 PID 1316 wrote to memory of 2388 1316 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 122 PID 1316 wrote to memory of 2388 1316 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 122 PID 1316 wrote to memory of 2388 1316 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 122 PID 1316 wrote to memory of 2388 1316 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 122 PID 1316 wrote to memory of 2388 1316 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 122 PID 1316 wrote to memory of 2388 1316 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 122 PID 1316 wrote to memory of 2388 1316 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 122 PID 1316 wrote to memory of 2388 1316 0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0bb890f4613ef5e03f64cbf13f7b57f0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Roaming\WinSocket\0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1544
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1036,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=3816 /prefetch:81⤵PID:3848
-
C:\Users\Admin\AppData\Roaming\WinSocket\0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1040
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0bb990f4713ef6e03f74cbf13f8b68f0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD50bb890f4613ef5e03f64cbf13f7b57f0
SHA1abcf6d03c7610a9d3024ab65aa621a127d0ec4a2
SHA2568d3048b45a8d49dc227d30c39040c419e38bd599268f8b80c3612dcd0acdcadc
SHA512405b112a7c686a4484e41023f138ed68d22ac7f4e90dc02754bb3b1b2df7915aeac80c3b33f57f6b375c860b945d3fd096308d28d98601afa66971f49565315c
-
Filesize
47KB
MD5774029cd95688f22b0c11d0d915891e0
SHA19d351ff7f2f8c35dffb70ef7e2558ec562c5a41f
SHA2563cb552cacea32cfccf911df6a57a17e4b23ae0d9ad1b053d1f4832f2a4910864
SHA51299f8e192816d57fbaeec4417d0ed9f9c5058a4020d4cf7d7255ac68e5ca897433ee68efdca7b623132b83f6099201ff75ee13ca44232ffc618f257b784598ce2