Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 09:27
Behavioral task
behavioral1
Sample
4f27747d7df889d180942f309bae0cd0_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
4f27747d7df889d180942f309bae0cd0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
4f27747d7df889d180942f309bae0cd0
-
SHA1
c4818a30a364e647374954411b9ca5cafd3b172d
-
SHA256
39c47fe33430293ead5f9d17b897157b81a6879e4cbfdd0d8de08bbb9b818bfa
-
SHA512
0c3113c3d8fdba0d90a91eed96e8de15565be9b8d08bc7059861734b3080fe1090ac1a0ed92f13be269b32e50176348c3f85d31a860ce3acd601640287279c31
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQE4efQg3zNn+2jsvercPk9N4hVI3/TQyFV:E5aIwC+Agr6SqCPGvT/
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023442-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4320-15-0x0000000002200000-0x0000000002229000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 4856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe Token: SeTcbPrivilege 4856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4320 4f27747d7df889d180942f309bae0cd0_NeikiAnalytics.exe 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 4856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4320 wrote to memory of 2856 4320 4f27747d7df889d180942f309bae0cd0_NeikiAnalytics.exe 84 PID 4320 wrote to memory of 2856 4320 4f27747d7df889d180942f309bae0cd0_NeikiAnalytics.exe 84 PID 4320 wrote to memory of 2856 4320 4f27747d7df889d180942f309bae0cd0_NeikiAnalytics.exe 84 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 2856 wrote to memory of 3708 2856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 85 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 956 wrote to memory of 844 956 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 98 PID 4856 wrote to memory of 2152 4856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 100 PID 4856 wrote to memory of 2152 4856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 100 PID 4856 wrote to memory of 2152 4856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 100 PID 4856 wrote to memory of 2152 4856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 100 PID 4856 wrote to memory of 2152 4856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 100 PID 4856 wrote to memory of 2152 4856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 100 PID 4856 wrote to memory of 2152 4856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 100 PID 4856 wrote to memory of 2152 4856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 100 PID 4856 wrote to memory of 2152 4856 4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f27747d7df889d180942f309bae0cd0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4f27747d7df889d180942f309bae0cd0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Roaming\WinSocket\4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3708
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:844
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\4f28848d8df999d190942f309bae0cd0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54f27747d7df889d180942f309bae0cd0
SHA1c4818a30a364e647374954411b9ca5cafd3b172d
SHA25639c47fe33430293ead5f9d17b897157b81a6879e4cbfdd0d8de08bbb9b818bfa
SHA5120c3113c3d8fdba0d90a91eed96e8de15565be9b8d08bc7059861734b3080fe1090ac1a0ed92f13be269b32e50176348c3f85d31a860ce3acd601640287279c31
-
Filesize
48KB
MD5a01dbf7795b63fea7f5ac551f1d367b8
SHA18b7d490b6fb4abc2167ee9b73cc2f1f16b9ad02d
SHA25682d36c717004e6d55ac8e38d14a5b4c1a0ada392c9ca20699598b5238907e0b0
SHA512c208f1a753353beaed47d36b2b5ca9063712b737ac0405e0e724d270badf2d13ba44391f3017953572d648987981799dc450e9d429ec0b315df15dc6afc019ec