Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 04:46
Behavioral task
behavioral1
Sample
4052f1234ba1347a9b19b4e118b2a120_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
4052f1234ba1347a9b19b4e118b2a120_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
4052f1234ba1347a9b19b4e118b2a120
-
SHA1
99b87ea06a5fb21426f7209ac8962a7ed10c33f0
-
SHA256
162be35289daca8688df1a6465ea52fb5d2b97ed09f08cc718977384ab5a6e6f
-
SHA512
ff0212748ad6ac013bd4bb70f02cfd333efbd66777262aa34afb9e00d890f0a343227e3d2cb517d2c08ec327ad51231c07a7a47f6d87a2f5440c7c6d06d0f053
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQE4efQg3zNn+2jsvercPk9N4hVI3/TQyFqsM:E5aIwC+Agr6SqCPGvTTM
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002346f-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1160-15-0x0000000002A50000-0x0000000002A79000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 4280 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe Token: SeTcbPrivilege 4280 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1160 4052f1234ba1347a9b19b4e118b2a120_NeikiAnalytics.exe 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 4280 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1160 wrote to memory of 4012 1160 4052f1234ba1347a9b19b4e118b2a120_NeikiAnalytics.exe 82 PID 1160 wrote to memory of 4012 1160 4052f1234ba1347a9b19b4e118b2a120_NeikiAnalytics.exe 82 PID 1160 wrote to memory of 4012 1160 4052f1234ba1347a9b19b4e118b2a120_NeikiAnalytics.exe 82 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 4012 wrote to memory of 4700 4012 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 83 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 312 wrote to memory of 3224 312 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 96 PID 4280 wrote to memory of 1240 4280 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 98 PID 4280 wrote to memory of 1240 4280 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 98 PID 4280 wrote to memory of 1240 4280 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 98 PID 4280 wrote to memory of 1240 4280 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 98 PID 4280 wrote to memory of 1240 4280 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 98 PID 4280 wrote to memory of 1240 4280 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 98 PID 4280 wrote to memory of 1240 4280 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 98 PID 4280 wrote to memory of 1240 4280 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 98 PID 4280 wrote to memory of 1240 4280 4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4052f1234ba1347a9b19b4e118b2a120_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4052f1234ba1347a9b19b4e118b2a120_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Roaming\WinSocket\4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4700
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3224
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\4062f1234ba1348a9b19b4e119b2a120_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54052f1234ba1347a9b19b4e118b2a120
SHA199b87ea06a5fb21426f7209ac8962a7ed10c33f0
SHA256162be35289daca8688df1a6465ea52fb5d2b97ed09f08cc718977384ab5a6e6f
SHA512ff0212748ad6ac013bd4bb70f02cfd333efbd66777262aa34afb9e00d890f0a343227e3d2cb517d2c08ec327ad51231c07a7a47f6d87a2f5440c7c6d06d0f053
-
Filesize
25KB
MD5b5ce2eae07b523a197946f5b8881ea52
SHA1cb0ef6abf0891f65dd8bee60335c85803387fa33
SHA256bcd0f8013bafd9559df534be45157d126ee95ed3ea2f313e3321cd9a56b0923e
SHA512345937a2ea909a124db99cbfde9179d27274bce5b69796d6027676ee0e9396b44528ef50c47d2286c795509df88fd3f1dbe53972879ae0c7c70224ebfe424ec2