Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 08:03
Behavioral task
behavioral1
Sample
6b5a7896debd0fb5839936dfd1735e00_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
6b5a7896debd0fb5839936dfd1735e00_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
6b5a7896debd0fb5839936dfd1735e00
-
SHA1
4061d31c112a8af0a942acb78c57c92847e3e7bf
-
SHA256
6fe8e8dbc6172e0e3ed76dba865035b711682482eae8bd22e833ae77240e2b4f
-
SHA512
086adec939263d1fb8b86ac6dec8deb2f72062970b03403b3f4b74fe4efe4e6123f313313f5e9cfad8c9503a3ce0d0cc317a58b376a1e33dd462617b59d0f3b1
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0JphZ:zQ5aILMCfmAUjzX6xQtjmssdqexO8
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2456-15-0x0000000002280000-0x00000000022A9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exepid process 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe 1620 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe Token: SeTcbPrivilege 1620 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
6b5a7896debd0fb5839936dfd1735e00_NeikiAnalytics.exe7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exepid process 2456 6b5a7896debd0fb5839936dfd1735e00_NeikiAnalytics.exe 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe 1620 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6b5a7896debd0fb5839936dfd1735e00_NeikiAnalytics.exe7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exedescription pid process target process PID 2456 wrote to memory of 388 2456 6b5a7896debd0fb5839936dfd1735e00_NeikiAnalytics.exe 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe PID 2456 wrote to memory of 388 2456 6b5a7896debd0fb5839936dfd1735e00_NeikiAnalytics.exe 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe PID 2456 wrote to memory of 388 2456 6b5a7896debd0fb5839936dfd1735e00_NeikiAnalytics.exe 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 388 wrote to memory of 1560 388 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 3944 wrote to memory of 5072 3944 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 1620 wrote to memory of 4416 1620 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 1620 wrote to memory of 4416 1620 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 1620 wrote to memory of 4416 1620 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 1620 wrote to memory of 4416 1620 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 1620 wrote to memory of 4416 1620 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 1620 wrote to memory of 4416 1620 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 1620 wrote to memory of 4416 1620 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 1620 wrote to memory of 4416 1620 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe PID 1620 wrote to memory of 4416 1620 7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b5a7896debd0fb5839936dfd1735e00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6b5a7896debd0fb5839936dfd1735e00_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Roaming\WinSocket\7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1560
-
C:\Users\Admin\AppData\Roaming\WinSocket\7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:5072
-
C:\Users\Admin\AppData\Roaming\WinSocket\7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\7b6a8997debd0fb6939937dfd1836e00_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD56b5a7896debd0fb5839936dfd1735e00
SHA14061d31c112a8af0a942acb78c57c92847e3e7bf
SHA2566fe8e8dbc6172e0e3ed76dba865035b711682482eae8bd22e833ae77240e2b4f
SHA512086adec939263d1fb8b86ac6dec8deb2f72062970b03403b3f4b74fe4efe4e6123f313313f5e9cfad8c9503a3ce0d0cc317a58b376a1e33dd462617b59d0f3b1
-
Filesize
40KB
MD58f999340c9b70bc5085273caaa7e424b
SHA1ca57248193f97a072cb4fdcd9aefaa4ba159e6c5
SHA256ef4aaf4ed7e6116c2a4811016684e713b4258e7b9d34d75f8ad59afd54f76dd4
SHA51216437a04b39fb6dc3986d6d92ec9ab62f5b80304fc2c58b09fafbfaf59cc35eb27abcfe32e6563379c1f4006a5f7f8daf21772c0fdb67e765b3d1d166ccb103c