Analysis
-
max time kernel
136s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 00:24
Behavioral task
behavioral1
Sample
20b67549febb5f807d6d9a902d2e6260_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
20b67549febb5f807d6d9a902d2e6260_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
20b67549febb5f807d6d9a902d2e6260
-
SHA1
084b80ecd5661bfa9604e6ebeb9026e0ae585c01
-
SHA256
55da9e0e2a2c10ef69534c558e56c53fd81f22e7dc0b56dc55aa331bdf5f1122
-
SHA512
74175563b9169b3c7755d2d6b190fa7e0f6b449e2539277ecab68c627cd70decd8bf62c164093168e27e631331decd8f35d2c23e7b7111c68a9bbab7197d640f
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0JphX:zQ5aILMCfmAUjzX6xQtjmssdqexuXIf
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000233ba-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3404-15-0x00000000021F0000-0x0000000002219000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 3672 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe Token: SeTcbPrivilege 3672 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3404 20b67549febb5f807d6d9a902d2e6260_NeikiAnalytics.exe 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 3672 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3404 wrote to memory of 1104 3404 20b67549febb5f807d6d9a902d2e6260_NeikiAnalytics.exe 80 PID 3404 wrote to memory of 1104 3404 20b67549febb5f807d6d9a902d2e6260_NeikiAnalytics.exe 80 PID 3404 wrote to memory of 1104 3404 20b67549febb5f807d6d9a902d2e6260_NeikiAnalytics.exe 80 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 1104 wrote to memory of 1284 1104 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 81 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 2168 wrote to memory of 4480 2168 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 90 PID 3672 wrote to memory of 1504 3672 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 92 PID 3672 wrote to memory of 1504 3672 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 92 PID 3672 wrote to memory of 1504 3672 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 92 PID 3672 wrote to memory of 1504 3672 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 92 PID 3672 wrote to memory of 1504 3672 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 92 PID 3672 wrote to memory of 1504 3672 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 92 PID 3672 wrote to memory of 1504 3672 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 92 PID 3672 wrote to memory of 1504 3672 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 92 PID 3672 wrote to memory of 1504 3672 20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\20b67549febb5f807d6d9a902d2e6260_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\20b67549febb5f807d6d9a902d2e6260_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Roaming\WinSocket\20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1284
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4480
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\20b78649febb6f908d7d9a902d2e7270_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD520b67549febb5f807d6d9a902d2e6260
SHA1084b80ecd5661bfa9604e6ebeb9026e0ae585c01
SHA25655da9e0e2a2c10ef69534c558e56c53fd81f22e7dc0b56dc55aa331bdf5f1122
SHA51274175563b9169b3c7755d2d6b190fa7e0f6b449e2539277ecab68c627cd70decd8bf62c164093168e27e631331decd8f35d2c23e7b7111c68a9bbab7197d640f
-
Filesize
34KB
MD52c41d7893e940691584c374edc76d93c
SHA1180b4ad99b6137ea52413a67854e18d2bcc28c66
SHA2568a662c7da13c766d83acf0fad16c379d014f1440ba95c0655fe3221b6ef03f86
SHA5120e9cd10a0babed09178bd9675f0e8cade82bd3519189280a2591a78da076e0697f64a8681a165516974b2b70b34e563260069e7b4798f161676666775b02e149