Analysis
-
max time kernel
138s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 10:56
Behavioral task
behavioral1
Sample
b9db922510d5679773341aeb44223f90_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
b9db922510d5679773341aeb44223f90_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
b9db922510d5679773341aeb44223f90
-
SHA1
e32fde339b3f2f9469f25d63c651da4f0dea9fe2
-
SHA256
b15ee2d41b177774e6e93e0ab0d8952100a96a5b2bcafec52ba5cbf133a99ed8
-
SHA512
fafc9913ecdd89cb1d0719318c05dd307cf2a6f2fd35a145958971f705d5eb06395e3990eb91453d892a706442f481b9ec19dfc9d05f730b636a0e2d32222527
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0Jph5:zQ5aILMCfmAUjzX6xQtjmssdqext
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/896-15-0x0000000002200000-0x0000000002229000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
b9db922610d6789883341aeb44223f90_NeikiAnalytict.exeb9db922610d6789883341aeb44223f90_NeikiAnalytict.exeb9db922610d6789883341aeb44223f90_NeikiAnalytict.exepid process 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe 1204 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b9db922610d6789883341aeb44223f90_NeikiAnalytict.exeb9db922610d6789883341aeb44223f90_NeikiAnalytict.exedescription pid process Token: SeTcbPrivilege 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe Token: SeTcbPrivilege 1204 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
b9db922510d5679773341aeb44223f90_NeikiAnalytics.exeb9db922610d6789883341aeb44223f90_NeikiAnalytict.exeb9db922610d6789883341aeb44223f90_NeikiAnalytict.exeb9db922610d6789883341aeb44223f90_NeikiAnalytict.exepid process 896 b9db922510d5679773341aeb44223f90_NeikiAnalytics.exe 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe 1204 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b9db922510d5679773341aeb44223f90_NeikiAnalytics.exeb9db922610d6789883341aeb44223f90_NeikiAnalytict.exeb9db922610d6789883341aeb44223f90_NeikiAnalytict.exeb9db922610d6789883341aeb44223f90_NeikiAnalytict.exedescription pid process target process PID 896 wrote to memory of 3804 896 b9db922510d5679773341aeb44223f90_NeikiAnalytics.exe b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe PID 896 wrote to memory of 3804 896 b9db922510d5679773341aeb44223f90_NeikiAnalytics.exe b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe PID 896 wrote to memory of 3804 896 b9db922510d5679773341aeb44223f90_NeikiAnalytics.exe b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3804 wrote to memory of 3252 3804 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 3148 wrote to memory of 3628 3148 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 1204 wrote to memory of 3456 1204 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 1204 wrote to memory of 3456 1204 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 1204 wrote to memory of 3456 1204 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 1204 wrote to memory of 3456 1204 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 1204 wrote to memory of 3456 1204 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 1204 wrote to memory of 3456 1204 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 1204 wrote to memory of 3456 1204 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 1204 wrote to memory of 3456 1204 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe PID 1204 wrote to memory of 3456 1204 b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9db922510d5679773341aeb44223f90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b9db922510d5679773341aeb44223f90_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Roaming\WinSocket\b9db922610d6789883341aeb44223f90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3252
-
C:\Users\Admin\AppData\Roaming\WinSocket\b9db922610d6789883341aeb44223f90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3628
-
C:\Users\Admin\AppData\Roaming\WinSocket\b9db922610d6789883341aeb44223f90_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\b9db922610d6789883341aeb44223f90_NeikiAnalytict.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5b9db922510d5679773341aeb44223f90
SHA1e32fde339b3f2f9469f25d63c651da4f0dea9fe2
SHA256b15ee2d41b177774e6e93e0ab0d8952100a96a5b2bcafec52ba5cbf133a99ed8
SHA512fafc9913ecdd89cb1d0719318c05dd307cf2a6f2fd35a145958971f705d5eb06395e3990eb91453d892a706442f481b9ec19dfc9d05f730b636a0e2d32222527
-
Filesize
13KB
MD5e8cf5d72a7c5dc3d6cb00b3854c828ef
SHA138ac4622183adc7cda63420baaaa367fedd5c6a7
SHA256e7b86c7fc90db26026fd4e984ece27fd313b304457b08bf4b20fc055296186db
SHA51234b3a3e75ef57ae9fd6168df8dfed825f2ae07f2fdd0a1f792e4b5ba9f827f51f13b762202aada1183ba837f66bba024e1baa9e27489122491622d5990de0225