Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 06:35

General

  • Target

    36da7ef1e692ecf7527ae95cae37a5e0_NeikiAnalytics.exe

  • Size

    1.2MB

  • MD5

    36da7ef1e692ecf7527ae95cae37a5e0

  • SHA1

    77dfb4c81238bd58e9ff5ea687709f445ac72aed

  • SHA256

    da03b27e9540dfd89924309007b942222b53aa693e36ffd55a239ff1c95b3fcc

  • SHA512

    04a0afbbf576c8d52ddb51c678bb7519fe5467f7e0c1b6bd93e3a7a7ffcdebc9fcd119bfd5feba069a75cbf6c13c37519836d2e9999f06323ee5d7e32d33b1bb

  • SSDEEP

    24576:zQ5aILMCfmAUjzX6xQt+4En+bcMAOxA5zYlo1c51Wni7:E5aIwC+Agr6StVEnmcKxY/O1r7

Malware Config

Signatures

  • KPOT

    KPOT is an information stealer that steals user data and account credentials.

  • KPOT Core Executable 1 IoCs
  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot x86 loader 1 IoCs

    Detected Trickbot's x86 loader that unpacks the x86 payload.

  • Executes dropped EXE 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\36da7ef1e692ecf7527ae95cae37a5e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\36da7ef1e692ecf7527ae95cae37a5e0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Users\Admin\AppData\Roaming\WinSocket\37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe
      C:\Users\Admin\AppData\Roaming\WinSocket\37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:448
    • C:\Users\Admin\AppData\Roaming\WinSocket\37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe
      C:\Users\Admin\AppData\Roaming\WinSocket\37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe
        2⤵
          PID:1164
      • C:\Users\Admin\AppData\Roaming\WinSocket\37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe
        C:\Users\Admin\AppData\Roaming\WinSocket\37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:992
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe
          2⤵
            PID:3568

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\WinSocket\37da8ef1e792ecf8628ae96cae38a6e0_NeikiAnalytict.exe

          Filesize

          1.2MB

          MD5

          36da7ef1e692ecf7527ae95cae37a5e0

          SHA1

          77dfb4c81238bd58e9ff5ea687709f445ac72aed

          SHA256

          da03b27e9540dfd89924309007b942222b53aa693e36ffd55a239ff1c95b3fcc

          SHA512

          04a0afbbf576c8d52ddb51c678bb7519fe5467f7e0c1b6bd93e3a7a7ffcdebc9fcd119bfd5feba069a75cbf6c13c37519836d2e9999f06323ee5d7e32d33b1bb

        • C:\Users\Admin\AppData\Roaming\WinSocket\settings.ini

          Filesize

          21KB

          MD5

          e12c2f13b9879be4a2a44711239efcc1

          SHA1

          4475475ad499fe0f33d5f3279b4d63f46203891f

          SHA256

          536c3519a5a2000c97a8bb7bb07d31851cbe493303d6e059c959344fa195e041

          SHA512

          0d6e6b3bb4421014f30f5a58d1686df674de4c10d37a77cd22cbb10cc62bd52b9e35354f94ccc97ed6229b76a89607b105829d87967a369d4f43cb45110c1607

        • memory/448-46-0x0000000010000000-0x000000001001E000-memory.dmp

          Filesize

          120KB

        • memory/448-51-0x0000013A18290000-0x0000013A18291000-memory.dmp

          Filesize

          4KB

        • memory/2404-65-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

          Filesize

          4KB

        • memory/2404-68-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

          Filesize

          4KB

        • memory/2404-63-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

          Filesize

          4KB

        • memory/2404-64-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

          Filesize

          4KB

        • memory/2404-61-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

          Filesize

          4KB

        • memory/2404-66-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

          Filesize

          4KB

        • memory/2404-67-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

          Filesize

          4KB

        • memory/2404-62-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

          Filesize

          4KB

        • memory/2404-69-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

          Filesize

          4KB

        • memory/2404-72-0x0000000000421000-0x0000000000422000-memory.dmp

          Filesize

          4KB

        • memory/2404-73-0x0000000000400000-0x0000000000472000-memory.dmp

          Filesize

          456KB

        • memory/2404-59-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

          Filesize

          4KB

        • memory/2404-60-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

          Filesize

          4KB

        • memory/2404-58-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

          Filesize

          4KB

        • memory/3608-33-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB

        • memory/3608-52-0x0000000003060000-0x000000000311E000-memory.dmp

          Filesize

          760KB

        • memory/3608-36-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB

        • memory/3608-35-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB

        • memory/3608-41-0x0000000010000000-0x0000000010007000-memory.dmp

          Filesize

          28KB

        • memory/3608-34-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB

        • memory/3608-53-0x0000000003120000-0x00000000033E9000-memory.dmp

          Filesize

          2.8MB

        • memory/3608-32-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB

        • memory/3608-30-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB

        • memory/3608-29-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB

        • memory/3608-28-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB

        • memory/3608-27-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB

        • memory/3608-26-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB

        • memory/3608-37-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB

        • memory/3608-31-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB

        • memory/3608-40-0x0000000000400000-0x0000000000472000-memory.dmp

          Filesize

          456KB

        • memory/4836-12-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

          Filesize

          4KB

        • memory/4836-5-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

          Filesize

          4KB

        • memory/4836-10-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

          Filesize

          4KB

        • memory/4836-9-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

          Filesize

          4KB

        • memory/4836-15-0x0000000002FD0000-0x0000000002FF9000-memory.dmp

          Filesize

          164KB

        • memory/4836-3-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

          Filesize

          4KB

        • memory/4836-11-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

          Filesize

          4KB

        • memory/4836-6-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

          Filesize

          4KB

        • memory/4836-7-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

          Filesize

          4KB

        • memory/4836-13-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

          Filesize

          4KB

        • memory/4836-14-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

          Filesize

          4KB

        • memory/4836-8-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

          Filesize

          4KB

        • memory/4836-2-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

          Filesize

          4KB

        • memory/4836-18-0x0000000000400000-0x0000000000472000-memory.dmp

          Filesize

          456KB

        • memory/4836-17-0x0000000000421000-0x0000000000422000-memory.dmp

          Filesize

          4KB

        • memory/4836-4-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

          Filesize

          4KB