Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 09:51
Static task
static1
Behavioral task
behavioral1
Sample
3e1a4f5a28fb96d9596bca92ef13ca90_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
3e1a4f5a28fb96d9596bca92ef13ca90_NeikiAnalytics.exe
-
Size
1014KB
-
MD5
3e1a4f5a28fb96d9596bca92ef13ca90
-
SHA1
ba5867e39835636174d6a129de8b48b0b2b17131
-
SHA256
2f68f2ba07209c11769f12258949c6622b89c8188c2767b1e781e9ede461cd65
-
SHA512
756265471b7ff97cbffaac0a2e32c67b9b22412c58e427723a7c9c3d202bc5b957593794b2735fac73c9afb64ab90bd9ee5808a833929c00e78d44761fe18266
-
SSDEEP
24576:zQ5aILMCfmAUhrSO1YNWdvCzMPqdUD6dNDmwO:E5aIwC+AUBsWsXHO
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/976-15-0x0000000002930000-0x0000000002959000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 320 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe Token: SeTcbPrivilege 320 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 976 3e1a4f5a28fb96d9596bca92ef13ca90_NeikiAnalytics.exe 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 320 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 976 wrote to memory of 3540 976 3e1a4f5a28fb96d9596bca92ef13ca90_NeikiAnalytics.exe 83 PID 976 wrote to memory of 3540 976 3e1a4f5a28fb96d9596bca92ef13ca90_NeikiAnalytics.exe 83 PID 976 wrote to memory of 3540 976 3e1a4f5a28fb96d9596bca92ef13ca90_NeikiAnalytics.exe 83 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 3540 wrote to memory of 2428 3540 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 84 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 4708 wrote to memory of 3540 4708 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 101 PID 320 wrote to memory of 1700 320 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 110 PID 320 wrote to memory of 1700 320 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 110 PID 320 wrote to memory of 1700 320 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 110 PID 320 wrote to memory of 1700 320 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 110 PID 320 wrote to memory of 1700 320 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 110 PID 320 wrote to memory of 1700 320 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 110 PID 320 wrote to memory of 1700 320 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 110 PID 320 wrote to memory of 1700 320 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 110 PID 320 wrote to memory of 1700 320 3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e1a4f5a28fb96d9596bca92ef13ca90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3e1a4f5a28fb96d9596bca92ef13ca90_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Roaming\WinSocket\3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2428
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3540
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3e1a4f6a29fb97d9697bca92ef13ca90_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1014KB
MD53e1a4f5a28fb96d9596bca92ef13ca90
SHA1ba5867e39835636174d6a129de8b48b0b2b17131
SHA2562f68f2ba07209c11769f12258949c6622b89c8188c2767b1e781e9ede461cd65
SHA512756265471b7ff97cbffaac0a2e32c67b9b22412c58e427723a7c9c3d202bc5b957593794b2735fac73c9afb64ab90bd9ee5808a833929c00e78d44761fe18266
-
Filesize
51KB
MD51b2e2ff0644d09bc6e4e7152b67df629
SHA17b45a05d7be653754341395c43de7783da03c7a5
SHA2565c43fc9c4567f07f87d7031a3d76d0ce1bf67de69f75156266109b37d3626c26
SHA5124dc5c0762a4c06d2acde0a9c52977c0b29fcc41cf9758b61facb468b96a3ec46ca418ecf298c5e15a4cd0488bad6b01e94ca7f7b3a67be66395d2e0df938612a