Analysis
-
max time kernel
136s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 22:23
Behavioral task
behavioral1
Sample
0e344c9e21a34872c00333e37372a6a0_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
0e344c9e21a34872c00333e37372a6a0_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
0e344c9e21a34872c00333e37372a6a0
-
SHA1
03485f15cfd96d90502a060e1c9ebc42499aa6f8
-
SHA256
89c60b82afbf0756ea95d7c13aa38ac57cf8f5e30f9b6c52f7c8b2aecb6ca76a
-
SHA512
de43bb5472d4dbce194f34975fd4e1da26358e226d3662498e498456a3e00e17fc0c6e2cebd2dd1a4f9116f6c62cf987ec6132f7297018764bf0711177be042d
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0JpPf:zQ5aILMCfmAUjzX6xQtjmssdqJih
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000233b3-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2392-15-0x0000000002A60000-0x0000000002A89000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 4928 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe Token: SeTcbPrivilege 4928 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2392 0e344c9e21a34872c00333e37372a6a0_NeikiAnalytics.exe 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 4928 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 4220 2392 0e344c9e21a34872c00333e37372a6a0_NeikiAnalytics.exe 83 PID 2392 wrote to memory of 4220 2392 0e344c9e21a34872c00333e37372a6a0_NeikiAnalytics.exe 83 PID 2392 wrote to memory of 4220 2392 0e344c9e21a34872c00333e37372a6a0_NeikiAnalytics.exe 83 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 4220 wrote to memory of 3932 4220 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 84 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 5096 wrote to memory of 3480 5096 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 98 PID 4928 wrote to memory of 800 4928 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 100 PID 4928 wrote to memory of 800 4928 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 100 PID 4928 wrote to memory of 800 4928 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 100 PID 4928 wrote to memory of 800 4928 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 100 PID 4928 wrote to memory of 800 4928 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 100 PID 4928 wrote to memory of 800 4928 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 100 PID 4928 wrote to memory of 800 4928 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 100 PID 4928 wrote to memory of 800 4928 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 100 PID 4928 wrote to memory of 800 4928 0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e344c9e21a34872c00333e37372a6a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0e344c9e21a34872c00333e37372a6a0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Roaming\WinSocket\0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3932
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3480
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\0e344c9e21a34982c00333e38382a7a0_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50e344c9e21a34872c00333e37372a6a0
SHA103485f15cfd96d90502a060e1c9ebc42499aa6f8
SHA25689c60b82afbf0756ea95d7c13aa38ac57cf8f5e30f9b6c52f7c8b2aecb6ca76a
SHA512de43bb5472d4dbce194f34975fd4e1da26358e226d3662498e498456a3e00e17fc0c6e2cebd2dd1a4f9116f6c62cf987ec6132f7297018764bf0711177be042d
-
Filesize
46KB
MD54574deca7012ccf1e9998fa78a9fa6e0
SHA1a41ef1fd802557470c8fae3638545733e6f45a60
SHA25619ad2ea32275475b0d890fdb50cde09d4d40c0cff18664a9cda9d25f73bf745e
SHA5128d8ec8626e3657eb68034462a5daba0142d17532996fadc1655f211abedb4fd1af35bf9ccb338b58e1488af65a2fa6885a90a49153874e6e9e4b803a40d21ce8