Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 20:24
Behavioral task
behavioral1
Sample
7e4adfb6917649130c5523a4bf06f400_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
7e4adfb6917649130c5523a4bf06f400_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
7e4adfb6917649130c5523a4bf06f400
-
SHA1
8eb8a37d9032b17f940c33b77f375bf336fcca86
-
SHA256
8c7eef20257c2ef7fd28198d093c559f741c5e2c9008ac803481104874c7897c
-
SHA512
c48811d194373f1d8ea21696922b2825e0fdd533b9068adb86144a7bfc85af1ccf09f440381c45e52315b2774c4041045947db6d431de7fb017581c21967ccc4
-
SSDEEP
24576:zQ5aILMCfmAUjzX677WOMcT/X2dI7T2FAoUcUOp6doF5ES/oV:E5aIwC+Agr6tdlmU1/eoV
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023427-22.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2436-15-0x0000000002BC0000-0x0000000002BE9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 3732 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe Token: SeTcbPrivilege 3732 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2436 7e4adfb6917649130c5523a4bf06f400_NeikiAnalytics.exe 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 3732 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2436 wrote to memory of 4528 2436 7e4adfb6917649130c5523a4bf06f400_NeikiAnalytics.exe 82 PID 2436 wrote to memory of 4528 2436 7e4adfb6917649130c5523a4bf06f400_NeikiAnalytics.exe 82 PID 2436 wrote to memory of 4528 2436 7e4adfb6917649130c5523a4bf06f400_NeikiAnalytics.exe 82 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 4528 wrote to memory of 896 4528 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 83 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 1872 wrote to memory of 3744 1872 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 96 PID 3732 wrote to memory of 3848 3732 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 98 PID 3732 wrote to memory of 3848 3732 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 98 PID 3732 wrote to memory of 3848 3732 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 98 PID 3732 wrote to memory of 3848 3732 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 98 PID 3732 wrote to memory of 3848 3732 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 98 PID 3732 wrote to memory of 3848 3732 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 98 PID 3732 wrote to memory of 3848 3732 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 98 PID 3732 wrote to memory of 3848 3732 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 98 PID 3732 wrote to memory of 3848 3732 8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e4adfb6917649130c5523a4bf06f400_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7e4adfb6917649130c5523a4bf06f400_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Roaming\WinSocket\8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:896
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3744
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\8e4adfb7918749130c6623a4bf07f400_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD57e4adfb6917649130c5523a4bf06f400
SHA18eb8a37d9032b17f940c33b77f375bf336fcca86
SHA2568c7eef20257c2ef7fd28198d093c559f741c5e2c9008ac803481104874c7897c
SHA512c48811d194373f1d8ea21696922b2825e0fdd533b9068adb86144a7bfc85af1ccf09f440381c45e52315b2774c4041045947db6d431de7fb017581c21967ccc4
-
Filesize
57KB
MD51fea92258fc5c9ea815f3855540a0390
SHA14f1afb34a04bda8e218426c4bb3449e9e70bcdc0
SHA256b5bcde431f4f50ba199eb3641eadd18ac36b1c7d4fe9275bbf4ac8487a8b6b9d
SHA512913c2194c00a1982827f9c0ff8d9bb448fcc1b2d2fd9c3a76f2db82c317a48e8c5c3f6f0cb510a29465dd3d30736ba553b6ee95a179547cbff64c4a47f0cdea3