Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 06:32
Behavioral task
behavioral1
Sample
36bce2c8027720489a48f3c965ad5c50_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
36bce2c8027720489a48f3c965ad5c50_NeikiAnalytics.exe
-
Size
1.0MB
-
MD5
36bce2c8027720489a48f3c965ad5c50
-
SHA1
abc960b6e4102c4a5c71ffcf30114c868807f6d8
-
SHA256
8d08b7b5057147ba46c56521b182335b36ded1cf3c87674c4bf9d8b0db430755
-
SHA512
74ed2eef4cb18fe2d3f3645bb1366a700f992de586b9fa4c72d5beb83b4e061f9066af6f4c4a89533aea3492352cf7bddb70ec5bfc7a246f4592d1f00ff24122
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEs1HzCHT4TlM9YmJ2Q97v54yRnkQgVfr9K:zQ5aILMCfmAUjzX6T0TlOnvPyQCfr0
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023424-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/224-15-0x00000000023B0000-0x00000000023D9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 4960 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe Token: SeTcbPrivilege 4960 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 224 36bce2c8027720489a48f3c965ad5c50_NeikiAnalytics.exe 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 4960 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 3068 224 36bce2c8027720489a48f3c965ad5c50_NeikiAnalytics.exe 83 PID 224 wrote to memory of 3068 224 36bce2c8027720489a48f3c965ad5c50_NeikiAnalytics.exe 83 PID 224 wrote to memory of 3068 224 36bce2c8027720489a48f3c965ad5c50_NeikiAnalytics.exe 83 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3068 wrote to memory of 2636 3068 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 84 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 3536 wrote to memory of 548 3536 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 102 PID 4960 wrote to memory of 3908 4960 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 111 PID 4960 wrote to memory of 3908 4960 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 111 PID 4960 wrote to memory of 3908 4960 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 111 PID 4960 wrote to memory of 3908 4960 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 111 PID 4960 wrote to memory of 3908 4960 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 111 PID 4960 wrote to memory of 3908 4960 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 111 PID 4960 wrote to memory of 3908 4960 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 111 PID 4960 wrote to memory of 3908 4960 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 111 PID 4960 wrote to memory of 3908 4960 37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\36bce2c8027720489a48f3c965ad5c50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\36bce2c8027720489a48f3c965ad5c50_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Roaming\WinSocket\37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2636
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:548
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\37bce2c9028820499a49f3c976ad6c60_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD536bce2c8027720489a48f3c965ad5c50
SHA1abc960b6e4102c4a5c71ffcf30114c868807f6d8
SHA2568d08b7b5057147ba46c56521b182335b36ded1cf3c87674c4bf9d8b0db430755
SHA51274ed2eef4cb18fe2d3f3645bb1366a700f992de586b9fa4c72d5beb83b4e061f9066af6f4c4a89533aea3492352cf7bddb70ec5bfc7a246f4592d1f00ff24122
-
Filesize
32KB
MD52d100ff8462aa171594b4ef819835554
SHA1e8d3fb67d0166359c682119c6f1e7918070c5cbc
SHA25660f4c6cba8a44db1a1f7f55eb4b90ed134e489ef76d3801f7d75550feaa8d178
SHA5125acb89c450b3db88a4b666448aa9e9a8a1e9dea6baa948b4c2e15b363bc6c559851bbef6a5d75e7636a01ed5b09037813ea96ede3f1cdc9abfd1e813c5abb73e