Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 22:18
Behavioral task
behavioral1
Sample
81fe6ada4bf301f4ccd77e68801a06b0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
81fe6ada4bf301f4ccd77e68801a06b0_NeikiAnalytics.exe
-
Size
1.0MB
-
MD5
81fe6ada4bf301f4ccd77e68801a06b0
-
SHA1
b89bb863e996d109a56a08d65abdc08faaa8b39b
-
SHA256
5d9459a5733853cb168b4332d9a35c67e5f2a26b6d577907bd3541cd65d480cd
-
SHA512
55812c3ea08426a9268f31a0f7acd5bd7a74f52133afae37a37bd352f18afc5a8ed8afc246925da9dce09859903c9424b90759a541fc67b36bd948c76deac370
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEs1HzCHT4TlM9YmJ2Q97v54yRnkQgVfD:zQ5aILMCfmAUjzX6T0TlOnvPyQCfD
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023423-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/636-15-0x0000000002AC0000-0x0000000002AE9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 1056 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe Token: SeTcbPrivilege 1056 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 636 81fe6ada4bf301f4ccd77e68801a06b0_NeikiAnalytics.exe 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 1056 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 636 wrote to memory of 924 636 81fe6ada4bf301f4ccd77e68801a06b0_NeikiAnalytics.exe 83 PID 636 wrote to memory of 924 636 81fe6ada4bf301f4ccd77e68801a06b0_NeikiAnalytics.exe 83 PID 636 wrote to memory of 924 636 81fe6ada4bf301f4ccd77e68801a06b0_NeikiAnalytics.exe 83 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 924 wrote to memory of 2792 924 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 84 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1836 wrote to memory of 3200 1836 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 102 PID 1056 wrote to memory of 1844 1056 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 111 PID 1056 wrote to memory of 1844 1056 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 111 PID 1056 wrote to memory of 1844 1056 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 111 PID 1056 wrote to memory of 1844 1056 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 111 PID 1056 wrote to memory of 1844 1056 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 111 PID 1056 wrote to memory of 1844 1056 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 111 PID 1056 wrote to memory of 1844 1056 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 111 PID 1056 wrote to memory of 1844 1056 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 111 PID 1056 wrote to memory of 1844 1056 91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\81fe6ada4bf301f4ccd77e68801a06b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\81fe6ada4bf301f4ccd77e68801a06b0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Roaming\WinSocket\91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2792
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3200
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\91fe7ada4bf301f4ccd88e79901a07b0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD581fe6ada4bf301f4ccd77e68801a06b0
SHA1b89bb863e996d109a56a08d65abdc08faaa8b39b
SHA2565d9459a5733853cb168b4332d9a35c67e5f2a26b6d577907bd3541cd65d480cd
SHA51255812c3ea08426a9268f31a0f7acd5bd7a74f52133afae37a37bd352f18afc5a8ed8afc246925da9dce09859903c9424b90759a541fc67b36bd948c76deac370
-
Filesize
72KB
MD51995337f40cca8385418c42ffb2cb683
SHA18931270c3efd0aeb5b2d5310c45fe3d71db236e9
SHA25622b408bdb3a97fadd949a6b3a1ca3ebb3b35a59540de0726a9fb46739d73f60b
SHA512c27d6f269d300574751f6719144a01aaf1d07fdbed9bbcbaef432d829515bd5155952ce37005cd22cdf2f4ec46b7ad5a4f9eeb69fe4dbe80c5aa4f5e6f6a6332