Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 04:43
Behavioral task
behavioral1
Sample
3b68decb16adaccbcc59ec9b06f00c00_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
3b68decb16adaccbcc59ec9b06f00c00_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
3b68decb16adaccbcc59ec9b06f00c00
-
SHA1
aa61660802140f478968719940caa377ed0caf2e
-
SHA256
c7526127cf979072079ca0c0b7947c3b940e51ff3ee0523f265495e3c5cd5b07
-
SHA512
b5f90bcc6c77401aea2e4892393448f70b588e30e5c04e1d9d753e9f22b897f9bbaa66a4ec2d2a86b49cfd9f8401aac9876286c71f83e23e055f8848a45eb03b
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0Jphc:zQ5aILMCfmAUjzX6xQtjmssdq6Rm
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1916-15-0x0000000002FD0000-0x0000000002FF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exepid process 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe 2252 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe Token: SeTcbPrivilege 2252 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
3b68decb16adaccbcc59ec9b06f00c00_NeikiAnalytics.exe3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exepid process 1916 3b68decb16adaccbcc59ec9b06f00c00_NeikiAnalytics.exe 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe 2252 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3b68decb16adaccbcc59ec9b06f00c00_NeikiAnalytics.exe3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exedescription pid process target process PID 1916 wrote to memory of 3844 1916 3b68decb16adaccbcc59ec9b06f00c00_NeikiAnalytics.exe 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe PID 1916 wrote to memory of 3844 1916 3b68decb16adaccbcc59ec9b06f00c00_NeikiAnalytics.exe 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe PID 1916 wrote to memory of 3844 1916 3b68decb16adaccbcc59ec9b06f00c00_NeikiAnalytics.exe 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3844 wrote to memory of 2040 3844 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 3260 wrote to memory of 4132 3260 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 2252 wrote to memory of 1040 2252 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 2252 wrote to memory of 1040 2252 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 2252 wrote to memory of 1040 2252 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 2252 wrote to memory of 1040 2252 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 2252 wrote to memory of 1040 2252 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 2252 wrote to memory of 1040 2252 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 2252 wrote to memory of 1040 2252 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 2252 wrote to memory of 1040 2252 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe PID 2252 wrote to memory of 1040 2252 3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b68decb16adaccbcc59ec9b06f00c00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3b68decb16adaccbcc59ec9b06f00c00_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Roaming\WinSocket\3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2040
-
C:\Users\Admin\AppData\Roaming\WinSocket\3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4132
-
C:\Users\Admin\AppData\Roaming\WinSocket\3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\3b79decb17adaccbcc69ec9b07f00c00_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53b68decb16adaccbcc59ec9b06f00c00
SHA1aa61660802140f478968719940caa377ed0caf2e
SHA256c7526127cf979072079ca0c0b7947c3b940e51ff3ee0523f265495e3c5cd5b07
SHA512b5f90bcc6c77401aea2e4892393448f70b588e30e5c04e1d9d753e9f22b897f9bbaa66a4ec2d2a86b49cfd9f8401aac9876286c71f83e23e055f8848a45eb03b
-
Filesize
58KB
MD554887a10b82bf69b2e9c34a93394f2db
SHA143d13416d23ef232d71393a057326433b7d05773
SHA256ed2945dd80ac066ed915d03cf63f5432ee3d597b933265f522e3f7762d80a3ae
SHA5126560344ba08f34ef6795ac2f730a25ea806aba487821fd056a9616ec22962726fc88824b7a34554aafb878f0e0230abc57b1ea19f535cf156a81610317442605