Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 05:19
Behavioral task
behavioral1
Sample
8ef55a4895e4cbb65b4c5ddf41da73e0_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
8ef55a4895e4cbb65b4c5ddf41da73e0_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
8ef55a4895e4cbb65b4c5ddf41da73e0
-
SHA1
4eef9d55518bf62f88e4bafe2ecc65c25c6bda99
-
SHA256
060b40211ca5cfc3c36e7bc2cf12a7a72dec24783328b5a4600ee695dfc65d40
-
SHA512
bd83015421b6358bca5f26fc874b188916e2845536b7583db2258e93c4e352c846dd4c40b0595a2de664a1337a845f9d1a35c12b0b9f6bff2cca2f33b146c4c2
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMAOxA5zYlo1c51WnqD:E5aIwC+Agr6StVEnmcKxY/O1/
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002341a-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3508-15-0x0000000002A80000-0x0000000002AA9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 4744 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe Token: SeTcbPrivilege 4744 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3508 8ef55a4895e4cbb65b4c5ddf41da73e0_NeikiAnalytics.exe 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 4744 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3508 wrote to memory of 3928 3508 8ef55a4895e4cbb65b4c5ddf41da73e0_NeikiAnalytics.exe 82 PID 3508 wrote to memory of 3928 3508 8ef55a4895e4cbb65b4c5ddf41da73e0_NeikiAnalytics.exe 82 PID 3508 wrote to memory of 3928 3508 8ef55a4895e4cbb65b4c5ddf41da73e0_NeikiAnalytics.exe 82 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3928 wrote to memory of 4828 3928 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 83 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 3432 wrote to memory of 2004 3432 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 101 PID 4744 wrote to memory of 1168 4744 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 111 PID 4744 wrote to memory of 1168 4744 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 111 PID 4744 wrote to memory of 1168 4744 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 111 PID 4744 wrote to memory of 1168 4744 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 111 PID 4744 wrote to memory of 1168 4744 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 111 PID 4744 wrote to memory of 1168 4744 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 111 PID 4744 wrote to memory of 1168 4744 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 111 PID 4744 wrote to memory of 1168 4744 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 111 PID 4744 wrote to memory of 1168 4744 9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ef55a4895e4cbb65b4c5ddf41da73e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8ef55a4895e4cbb65b4c5ddf41da73e0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Roaming\WinSocket\9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4828
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2004
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\9ef66a4996e4cbb76b4c6ddf41da83e0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD58ef55a4895e4cbb65b4c5ddf41da73e0
SHA14eef9d55518bf62f88e4bafe2ecc65c25c6bda99
SHA256060b40211ca5cfc3c36e7bc2cf12a7a72dec24783328b5a4600ee695dfc65d40
SHA512bd83015421b6358bca5f26fc874b188916e2845536b7583db2258e93c4e352c846dd4c40b0595a2de664a1337a845f9d1a35c12b0b9f6bff2cca2f33b146c4c2
-
Filesize
10KB
MD5bc989d126b36b62b1ab36e1c7bc82efa
SHA13102f23a766bd78076df948efeac9d235b3fa953
SHA256655731ecb414cd3ca9d049b14033e229dbbdb6d0895cbd5c9a53c6b2ec643534
SHA5124c4979ab5578644cc4d712ca38988f1be9e2e7189925c3bab5de605e19a3301982e28e8f1cc3f69f1f84a5aea03f581697b85c035637e3fb51298d7ddc0372f8