Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 02:15
Behavioral task
behavioral1
Sample
2106bdccbf01788b5d105747aa808560_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
2106bdccbf01788b5d105747aa808560_NeikiAnalytics.exe
-
Size
1.0MB
-
MD5
2106bdccbf01788b5d105747aa808560
-
SHA1
5462b5b3f3b75d147560819f780ed01618111f5e
-
SHA256
2907d58797bb286aa70f3e90758cf0cebbfa8eb73b03d9502a551fecb71d28ac
-
SHA512
3d6ba8228e946f067952600abe1cd2b5a115b9fc1c7154e6f8bc213b5996cbeaf56845a8a92ad76b65f7767f850394bff97a956da9052c2b1f9626a4cee1268d
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSTsU95QyL:E5aIwC+Agr6SNasOL
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023428-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4792-15-0x0000000002A50000-0x0000000002A79000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 1440 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe Token: SeTcbPrivilege 1440 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4792 2106bdccbf01788b5d105747aa808560_NeikiAnalytics.exe 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 1440 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 1864 4792 2106bdccbf01788b5d105747aa808560_NeikiAnalytics.exe 83 PID 4792 wrote to memory of 1864 4792 2106bdccbf01788b5d105747aa808560_NeikiAnalytics.exe 83 PID 4792 wrote to memory of 1864 4792 2106bdccbf01788b5d105747aa808560_NeikiAnalytics.exe 83 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 1864 wrote to memory of 4796 1864 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 84 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 4116 wrote to memory of 3544 4116 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 97 PID 1440 wrote to memory of 1276 1440 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 99 PID 1440 wrote to memory of 1276 1440 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 99 PID 1440 wrote to memory of 1276 1440 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 99 PID 1440 wrote to memory of 1276 1440 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 99 PID 1440 wrote to memory of 1276 1440 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 99 PID 1440 wrote to memory of 1276 1440 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 99 PID 1440 wrote to memory of 1276 1440 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 99 PID 1440 wrote to memory of 1276 1440 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 99 PID 1440 wrote to memory of 1276 1440 2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2106bdccbf01788b5d105747aa808560_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2106bdccbf01788b5d105747aa808560_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Roaming\WinSocket\2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4796
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3544
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\2107bdccbf01899b6d106848aa909670_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD52106bdccbf01788b5d105747aa808560
SHA15462b5b3f3b75d147560819f780ed01618111f5e
SHA2562907d58797bb286aa70f3e90758cf0cebbfa8eb73b03d9502a551fecb71d28ac
SHA5123d6ba8228e946f067952600abe1cd2b5a115b9fc1c7154e6f8bc213b5996cbeaf56845a8a92ad76b65f7767f850394bff97a956da9052c2b1f9626a4cee1268d
-
Filesize
46KB
MD54b0349bf1b485f68fcd28fb9c7663763
SHA1415eed2596a93c9fce2065887539c02d3f1652c6
SHA256e64644bd1aaac34a35b928302a8bb45dc4908b1831d5acad7fa6533a67d10537
SHA51227b21b618bee4a5b69b2870a09b134b41b87683edccf7edd2be960385f8c28f78c31ac28657e5d1fd99ee2c3d152f0b4560f84528a7d011b646aeecd7197000f