Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 23:19
Behavioral task
behavioral1
Sample
1622c1ac8a713a80a9569b9aad378480_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
1622c1ac8a713a80a9569b9aad378480_NeikiAnalytics.exe
-
Size
1.0MB
-
MD5
1622c1ac8a713a80a9569b9aad378480
-
SHA1
5975e440cf7a0275f6d82af8af35b70d706a5ae1
-
SHA256
550163c51d53b6b31bcb00bc3a00d7701dcccf088b21d3f6596cc7d15db82349
-
SHA512
39e4eab37b2e34579f79c593b644ae9deded9cbe540ffa696787851d39a0693bb9ed8d2145975577838e440926909c4b7fd314fc5a4c3d92cf970a923702883d
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0Jphp:zQ5aILMCfmAUjzX6xQtjmssdqK
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002342d-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2848-16-0x00000000021D0000-0x00000000021F9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 4268 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe Token: SeTcbPrivilege 4268 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2848 1622c1ac8a713a80a9569b9aad378480_NeikiAnalytics.exe 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 4268 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2848 wrote to memory of 1040 2848 1622c1ac8a713a80a9569b9aad378480_NeikiAnalytics.exe 84 PID 2848 wrote to memory of 1040 2848 1622c1ac8a713a80a9569b9aad378480_NeikiAnalytics.exe 84 PID 2848 wrote to memory of 1040 2848 1622c1ac8a713a80a9569b9aad378480_NeikiAnalytics.exe 84 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1040 wrote to memory of 3100 1040 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 85 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 1900 wrote to memory of 4796 1900 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 98 PID 4268 wrote to memory of 748 4268 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 100 PID 4268 wrote to memory of 748 4268 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 100 PID 4268 wrote to memory of 748 4268 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 100 PID 4268 wrote to memory of 748 4268 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 100 PID 4268 wrote to memory of 748 4268 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 100 PID 4268 wrote to memory of 748 4268 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 100 PID 4268 wrote to memory of 748 4268 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 100 PID 4268 wrote to memory of 748 4268 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 100 PID 4268 wrote to memory of 748 4268 1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1622c1ac8a713a80a9569b9aad378480_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1622c1ac8a713a80a9569b9aad378480_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\WinSocket\1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3100
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4796
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\1722c1ac9a813a90a9679b9aad389490_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD51622c1ac8a713a80a9569b9aad378480
SHA15975e440cf7a0275f6d82af8af35b70d706a5ae1
SHA256550163c51d53b6b31bcb00bc3a00d7701dcccf088b21d3f6596cc7d15db82349
SHA51239e4eab37b2e34579f79c593b644ae9deded9cbe540ffa696787851d39a0693bb9ed8d2145975577838e440926909c4b7fd314fc5a4c3d92cf970a923702883d
-
Filesize
12KB
MD5861889769bb4eafeba3c40f305adb86f
SHA17b3a9e13ce554d3a028387bec32aea93d62f19d6
SHA256f8cae12c649574752e03fbc650eeea8f310e16b95b4765655349c024d91a7895
SHA512b0e40a67e88596a0e2505979ac6273fa61df40b0d7e530b87a0962cf31b9903bc79dd1998ddba9d6e4637aaa443f579d8eef42705acaa65eb5e62311ed4857ca