Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 11:54
Behavioral task
behavioral1
Sample
af2ac746fb51132aa5d6266e68ab5830_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
af2ac746fb51132aa5d6266e68ab5830_NeikiAnalytics.exe
-
Size
1.5MB
-
MD5
af2ac746fb51132aa5d6266e68ab5830
-
SHA1
036df319006a04f641beb7995650102d1f58703d
-
SHA256
7ea178255387aef33cdfaefa90c45637bd746d1779d2343c7d9f829041197cf0
-
SHA512
561b9245d36884b8cd2fbebab8d72544cae149c8f45cc59b927e56f82f2987bf0f698e182c0d57c70fd9bb4aafae646b923165f36be638890aa8d20086a5d053
-
SSDEEP
24576:zQ5aILMCfmAUjzX677WOMcT/X2dI7T2FAoUcUOp6doF5ES/oko23JS1++:E5aIwC+Agr6tdlmU1/eoh25i
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002340c-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3528-15-0x0000000002200000-0x0000000002229000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 4572 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe Token: SeTcbPrivilege 4572 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3528 af2ac746fb51132aa5d6266e68ab5830_NeikiAnalytics.exe 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 4572 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3528 wrote to memory of 1612 3528 af2ac746fb51132aa5d6266e68ab5830_NeikiAnalytics.exe 81 PID 3528 wrote to memory of 1612 3528 af2ac746fb51132aa5d6266e68ab5830_NeikiAnalytics.exe 81 PID 3528 wrote to memory of 1612 3528 af2ac746fb51132aa5d6266e68ab5830_NeikiAnalytics.exe 81 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1612 wrote to memory of 3520 1612 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 82 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 1616 wrote to memory of 3264 1616 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 95 PID 4572 wrote to memory of 4636 4572 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 97 PID 4572 wrote to memory of 4636 4572 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 97 PID 4572 wrote to memory of 4636 4572 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 97 PID 4572 wrote to memory of 4636 4572 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 97 PID 4572 wrote to memory of 4636 4572 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 97 PID 4572 wrote to memory of 4636 4572 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 97 PID 4572 wrote to memory of 4636 4572 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 97 PID 4572 wrote to memory of 4636 4572 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 97 PID 4572 wrote to memory of 4636 4572 af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\af2ac746fb51132aa5d6266e68ab5830_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\af2ac746fb51132aa5d6266e68ab5830_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Roaming\WinSocket\af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3520
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3264
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\af2ac847fb61132aa6d7277e79ab6930_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5af2ac746fb51132aa5d6266e68ab5830
SHA1036df319006a04f641beb7995650102d1f58703d
SHA2567ea178255387aef33cdfaefa90c45637bd746d1779d2343c7d9f829041197cf0
SHA512561b9245d36884b8cd2fbebab8d72544cae149c8f45cc59b927e56f82f2987bf0f698e182c0d57c70fd9bb4aafae646b923165f36be638890aa8d20086a5d053
-
Filesize
35KB
MD51b6ecf5d8cbce9ed3ae3c2209b6bff06
SHA104a89d0cbbdff687c0ed045ee68d75bf2dfc18ed
SHA256e8bcb5b21874ea3277ec8492bd4d5d6c593dd2e09945911407c5bec2a13de98b
SHA512d2eb74266ebc3619bc53c8a798d7b771fbdffae2f77c0bc2cbc21ddcbaed3282065f38c58d9315adbf5cf61f65e1dc78f79925556b2f50959e91df08020084d7