Analysis
-
max time kernel
128s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 01:45
Behavioral task
behavioral1
Sample
27606be87c87d06ac6f8d0b31e488d60_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
27606be87c87d06ac6f8d0b31e488d60_NeikiAnalytics.exe
-
Size
1021KB
-
MD5
27606be87c87d06ac6f8d0b31e488d60
-
SHA1
b283abfeba1aefc4cccb0f2bf532afad875f2faf
-
SHA256
fd29704cc697e07511dee7bf0714b76fa44d43aa632b687d35ec536fd17aec51
-
SHA512
e12b543099a55fcbaa5544fbc8649e1d3a2233168e21d0a4e6cd028bffee87fa2e1a3e2b84c8b513d6afdecc2c7a094b44f7f771ff25b3c9ab6d1ec7f7f8c90e
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0JphE:zQ5aILMCfmAUjzX6xQtjmssdqP
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023420-22.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/312-15-0x0000000002BC0000-0x0000000002BE9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 1356 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe Token: SeTcbPrivilege 1356 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 312 27606be87c87d06ac6f8d0b31e488d60_NeikiAnalytics.exe 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 1356 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 312 wrote to memory of 2696 312 27606be87c87d06ac6f8d0b31e488d60_NeikiAnalytics.exe 84 PID 312 wrote to memory of 2696 312 27606be87c87d06ac6f8d0b31e488d60_NeikiAnalytics.exe 84 PID 312 wrote to memory of 2696 312 27606be87c87d06ac6f8d0b31e488d60_NeikiAnalytics.exe 84 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 2696 wrote to memory of 2708 2696 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 85 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 4888 wrote to memory of 5068 4888 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 103 PID 1356 wrote to memory of 4688 1356 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 113 PID 1356 wrote to memory of 4688 1356 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 113 PID 1356 wrote to memory of 4688 1356 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 113 PID 1356 wrote to memory of 4688 1356 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 113 PID 1356 wrote to memory of 4688 1356 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 113 PID 1356 wrote to memory of 4688 1356 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 113 PID 1356 wrote to memory of 4688 1356 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 113 PID 1356 wrote to memory of 4688 1356 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 113 PID 1356 wrote to memory of 4688 1356 28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\27606be87c87d06ac6f8d0b31e488d60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\27606be87c87d06ac6f8d0b31e488d60_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Users\Admin\AppData\Roaming\WinSocket\28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2708
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:5068
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\28707be98c98d07ac7f9d0b31e499d70_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1021KB
MD527606be87c87d06ac6f8d0b31e488d60
SHA1b283abfeba1aefc4cccb0f2bf532afad875f2faf
SHA256fd29704cc697e07511dee7bf0714b76fa44d43aa632b687d35ec536fd17aec51
SHA512e12b543099a55fcbaa5544fbc8649e1d3a2233168e21d0a4e6cd028bffee87fa2e1a3e2b84c8b513d6afdecc2c7a094b44f7f771ff25b3c9ab6d1ec7f7f8c90e
-
Filesize
71KB
MD55ada495863d5e4fe07b27ebc8216b596
SHA127c6fa5fbad704a69de5da2a5ea7fa04f19bc07f
SHA2564f2b4f64197de7fa68b723a8cec1f11ea41c98d868a0d07c0e336fded920fd23
SHA51238e024500a5e5c597987dd6a514a341e3e6239e6e75b33995d6ec5f3ed1c5b13fb0ce5679b4b09ffe46fecca9fe1b7580f5f26eb21f35cb2e09021f2e2776cd1