Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 07:01
Behavioral task
behavioral1
Sample
696d25053f9efbdbf661f4ecb5d8b350_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
696d25053f9efbdbf661f4ecb5d8b350_NeikiAnalytics.exe
-
Size
1.0MB
-
MD5
696d25053f9efbdbf661f4ecb5d8b350
-
SHA1
762fdf6e18a94259793eb4c7c44be0bc589704f0
-
SHA256
8e3306dcc958b68c393c0ceef4da780760c52da621e12e0a170dc230a85d0656
-
SHA512
71aa072a82829456e75247ca70f89d4a26f0ae49e0ed587e086edb127e42dd995f9216d096b42efb59f7910e264fe1dbd52095dd77b2276ba6d9a54cecea6295
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEs1HzCHT4TlM9YmJ2Q97v54yRnkQgVfTk:zQ5aILMCfmAUjzX6T0TlOnvPyQCfTk
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023231-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4756-17-0x0000000002D10000-0x0000000002D39000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 5076 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe Token: SeTcbPrivilege 5076 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4756 696d25053f9efbdbf661f4ecb5d8b350_NeikiAnalytics.exe 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 5076 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4756 wrote to memory of 2752 4756 696d25053f9efbdbf661f4ecb5d8b350_NeikiAnalytics.exe 92 PID 4756 wrote to memory of 2752 4756 696d25053f9efbdbf661f4ecb5d8b350_NeikiAnalytics.exe 92 PID 4756 wrote to memory of 2752 4756 696d25053f9efbdbf661f4ecb5d8b350_NeikiAnalytics.exe 92 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 2752 wrote to memory of 3572 2752 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 93 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 732 wrote to memory of 968 732 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 104 PID 5076 wrote to memory of 756 5076 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 106 PID 5076 wrote to memory of 756 5076 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 106 PID 5076 wrote to memory of 756 5076 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 106 PID 5076 wrote to memory of 756 5076 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 106 PID 5076 wrote to memory of 756 5076 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 106 PID 5076 wrote to memory of 756 5076 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 106 PID 5076 wrote to memory of 756 5076 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 106 PID 5076 wrote to memory of 756 5076 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 106 PID 5076 wrote to memory of 756 5076 797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\696d25053f9efbdbf661f4ecb5d8b350_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\696d25053f9efbdbf661f4ecb5d8b350_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Roaming\WinSocket\797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3572
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4788 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:1236
-
C:\Users\Admin\AppData\Roaming\WinSocket\797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:968
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\797d26063f9efbdbf771f4ecb6d9b360_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5696d25053f9efbdbf661f4ecb5d8b350
SHA1762fdf6e18a94259793eb4c7c44be0bc589704f0
SHA2568e3306dcc958b68c393c0ceef4da780760c52da621e12e0a170dc230a85d0656
SHA51271aa072a82829456e75247ca70f89d4a26f0ae49e0ed587e086edb127e42dd995f9216d096b42efb59f7910e264fe1dbd52095dd77b2276ba6d9a54cecea6295
-
Filesize
34KB
MD57f92b8feeac713d6e1c71d8c11cb390a
SHA164daed4eb023413d365fd3ec9c8d6eb7e1355ba9
SHA256aae1a40f86fa059d3fd47baf3e963674179a74d17c6dfe3ef90cd20ec765f49e
SHA5121730e17901933b998a852ec8c603b84d5b29f53d1332caf2987be22b9d24a775143c696093ec703ddc19e56ff4874dafa1b81ea601f634a04862c6a9354abbde