Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 06:35
Behavioral task
behavioral1
Sample
36da7ef1e692ecf7527ae95cae37a5e0_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
36da7ef1e692ecf7527ae95cae37a5e0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
36da7ef1e692ecf7527ae95cae37a5e0
-
SHA1
77dfb4c81238bd58e9ff5ea687709f445ac72aed
-
SHA256
da03b27e9540dfd89924309007b942222b53aa693e36ffd55a239ff1c95b3fcc
-
SHA512
04a0afbbf576c8d52ddb51c678bb7519fe5467f7e0c1b6bd93e3a7a7ffcdebc9fcd119bfd5feba069a75cbf6c13c37519836d2e9999f06323ee5d7e32d33b1bb
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMAOxA5zYlo1c51Wni7:E5aIwC+Agr6StVEnmcKxY/O1r7
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002343a-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4836-15-0x0000000002FD0000-0x0000000002FF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 992 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe Token: SeTcbPrivilege 992 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4836 36da7ef1e692ecf7527ae95cae37a5e0_NeikiAnalytics.exe 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 992 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4836 wrote to memory of 3608 4836 36da7ef1e692ecf7527ae95cae37a5e0_NeikiAnalytics.exe 81 PID 4836 wrote to memory of 3608 4836 36da7ef1e692ecf7527ae95cae37a5e0_NeikiAnalytics.exe 81 PID 4836 wrote to memory of 3608 4836 36da7ef1e692ecf7527ae95cae37a5e0_NeikiAnalytics.exe 81 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 3608 wrote to memory of 448 3608 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 82 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 2404 wrote to memory of 1164 2404 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 96 PID 992 wrote to memory of 3568 992 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 98 PID 992 wrote to memory of 3568 992 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 98 PID 992 wrote to memory of 3568 992 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 98 PID 992 wrote to memory of 3568 992 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 98 PID 992 wrote to memory of 3568 992 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 98 PID 992 wrote to memory of 3568 992 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 98 PID 992 wrote to memory of 3568 992 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 98 PID 992 wrote to memory of 3568 992 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 98 PID 992 wrote to memory of 3568 992 37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\36da7ef1e692ecf7527ae95cae37a5e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\36da7ef1e692ecf7527ae95cae37a5e0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Roaming\WinSocket\37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:448
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1164
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD536da7ef1e692ecf7527ae95cae37a5e0
SHA177dfb4c81238bd58e9ff5ea687709f445ac72aed
SHA256da03b27e9540dfd89924309007b942222b53aa693e36ffd55a239ff1c95b3fcc
SHA51204a0afbbf576c8d52ddb51c678bb7519fe5467f7e0c1b6bd93e3a7a7ffcdebc9fcd119bfd5feba069a75cbf6c13c37519836d2e9999f06323ee5d7e32d33b1bb
-
Filesize
21KB
MD5e12c2f13b9879be4a2a44711239efcc1
SHA14475475ad499fe0f33d5f3279b4d63f46203891f
SHA256536c3519a5a2000c97a8bb7bb07d31851cbe493303d6e059c959344fa195e041
SHA5120d6e6b3bb4421014f30f5a58d1686df674de4c10d37a77cd22cbb10cc62bd52b9e35354f94ccc97ed6229b76a89607b105829d87967a369d4f43cb45110c1607