Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
97ae8657494d62ab8ac69136cc9de610_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
97ae8657494d62ab8ac69136cc9de610_NeikiAnalytics.exe
-
Size
1023KB
-
MD5
97ae8657494d62ab8ac69136cc9de610
-
SHA1
4d65703c42cc4c56633a35e8452dbc3412813095
-
SHA256
a8598ae371984cf353fb785fd60a2a6794832fc0047f8d4179a0ec863324afe5
-
SHA512
4602a3022feabd52faf5d262a1d6d15e9f1fc9716c46dc8b4f67edbca430c171968a211b3c48453144a096c48e48a615cff0d0771336fc25bbe2a722c2395444
-
SSDEEP
24576:zQ5aILMCfmAUhrSO1YNWdvCzMPqdUD6dNDmwN7:E5aIwC+AUBsWsXH1
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2816-15-0x0000000002FD0000-0x0000000002FF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exepid process 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe 1488 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe Token: SeTcbPrivilege 1488 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
97ae8657494d62ab8ac69136cc9de610_NeikiAnalytics.exe98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exepid process 2816 97ae8657494d62ab8ac69136cc9de610_NeikiAnalytics.exe 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe 1488 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
97ae8657494d62ab8ac69136cc9de610_NeikiAnalytics.exe98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exedescription pid process target process PID 2816 wrote to memory of 4080 2816 97ae8657494d62ab8ac69136cc9de610_NeikiAnalytics.exe 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe PID 2816 wrote to memory of 4080 2816 97ae8657494d62ab8ac69136cc9de610_NeikiAnalytics.exe 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe PID 2816 wrote to memory of 4080 2816 97ae8657494d62ab8ac69136cc9de610_NeikiAnalytics.exe 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 4080 wrote to memory of 4084 4080 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1676 wrote to memory of 4644 1676 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1488 wrote to memory of 2476 1488 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1488 wrote to memory of 2476 1488 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1488 wrote to memory of 2476 1488 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1488 wrote to memory of 2476 1488 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1488 wrote to memory of 2476 1488 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1488 wrote to memory of 2476 1488 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1488 wrote to memory of 2476 1488 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1488 wrote to memory of 2476 1488 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe PID 1488 wrote to memory of 2476 1488 98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\97ae8657494d62ab8ac69136cc9de610_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\97ae8657494d62ab8ac69136cc9de610_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Roaming\WinSocket\98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4084
-
C:\Users\Admin\AppData\Roaming\WinSocket\98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4644
-
C:\Users\Admin\AppData\Roaming\WinSocket\98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\98ae9768494d72ab9ac79137cc9de710_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1023KB
MD597ae8657494d62ab8ac69136cc9de610
SHA14d65703c42cc4c56633a35e8452dbc3412813095
SHA256a8598ae371984cf353fb785fd60a2a6794832fc0047f8d4179a0ec863324afe5
SHA5124602a3022feabd52faf5d262a1d6d15e9f1fc9716c46dc8b4f67edbca430c171968a211b3c48453144a096c48e48a615cff0d0771336fc25bbe2a722c2395444
-
Filesize
35KB
MD5f0298aefef59a76d20986eaceeebf7f3
SHA1615ab4e4a56b7f409185fe3b8389910493776286
SHA2568b89ae8c13c14cdda890740a00796c84d720443507fb9f37b49e8ce455e5c231
SHA5120d51bf2bebd637df9e73ea383d78b031f52e39f0906d1669dbb955ba77717126ccf1dd4084427273571a7f375c199e50d7e8b5966f5253cada26d1ba41eef629