Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 01:31
Behavioral task
behavioral1
Sample
96b8cb024abe1204a4b198b1240a2c90_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
96b8cb024abe1204a4b198b1240a2c90_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
96b8cb024abe1204a4b198b1240a2c90
-
SHA1
25760a0e34b1fe16d11582d5861404f59644c8ca
-
SHA256
0a8c2e2090ba8f696b483a616e7236ce490509a4db539571dd03f975b61cf863
-
SHA512
7baf71c5eb11e6a39b53acaf41ad9e636d178aa5106b94161e5f77c21f6896c3e9483542f5d5a272d2c705f679c9a7f7bdac487f598f881caa5fd5fca92ff0b1
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1StE10/Zc9gge8ig:E5aIwC+Agr6S/FFC+L
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023414-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/884-16-0x0000000002BE0000-0x0000000002C09000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 5096 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe Token: SeTcbPrivilege 5096 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 884 96b8cb024abe1204a4b198b1240a2c90_NeikiAnalytics.exe 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 5096 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 884 wrote to memory of 1728 884 96b8cb024abe1204a4b198b1240a2c90_NeikiAnalytics.exe 83 PID 884 wrote to memory of 1728 884 96b8cb024abe1204a4b198b1240a2c90_NeikiAnalytics.exe 83 PID 884 wrote to memory of 1728 884 96b8cb024abe1204a4b198b1240a2c90_NeikiAnalytics.exe 83 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 1728 wrote to memory of 3976 1728 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 85 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 3964 wrote to memory of 4312 3964 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 99 PID 5096 wrote to memory of 2560 5096 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 109 PID 5096 wrote to memory of 2560 5096 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 109 PID 5096 wrote to memory of 2560 5096 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 109 PID 5096 wrote to memory of 2560 5096 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 109 PID 5096 wrote to memory of 2560 5096 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 109 PID 5096 wrote to memory of 2560 5096 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 109 PID 5096 wrote to memory of 2560 5096 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 109 PID 5096 wrote to memory of 2560 5096 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 109 PID 5096 wrote to memory of 2560 5096 97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\96b8cb024abe1204a4b198b1240a2c90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\96b8cb024abe1204a4b198b1240a2c90_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Roaming\WinSocket\97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3976
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4312
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\97b9cb024abe1204a4b199b1240a2c90_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD596b8cb024abe1204a4b198b1240a2c90
SHA125760a0e34b1fe16d11582d5861404f59644c8ca
SHA2560a8c2e2090ba8f696b483a616e7236ce490509a4db539571dd03f975b61cf863
SHA5127baf71c5eb11e6a39b53acaf41ad9e636d178aa5106b94161e5f77c21f6896c3e9483542f5d5a272d2c705f679c9a7f7bdac487f598f881caa5fd5fca92ff0b1
-
Filesize
22KB
MD502ec078a511d70540b19a11e9e95a5c4
SHA17b717f66b43b34672e4f852b09ab454c6a0c0c67
SHA256b6c39ff3286f431ff55829fce5b5c3e2d591d1204695850c68f5a7a016c01d03
SHA5124eb3680f4300fbac0f940049015500291c47fd687c2ec4d3819a6701f5303b043dca7718f080e1cb5829b73f0d82a8b554f15e53834d997dd12f55e29ea01dd5