Analysis

  • max time kernel
    148s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 16:31

General

  • Target

    21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe

  • Size

    440KB

  • MD5

    21186cdce283361548dd219c73d3d010

  • SHA1

    f20ac5c333d7fb215780a733a285ce9c149a992b

  • SHA256

    496c2d0e3f938f6e8f02faa263b56fb1e7a6e487eaa33d1b7bbf8f34d3884817

  • SHA512

    8e7221732ad718909822bbe166136dc69188b241050f41dea980df29850dc1ab38512eec22f246b31732cda6c91d0cf7a73b24aac6e3f1383ab093e3ddf77953

  • SSDEEP

    6144:xozXQKqfmiiyWwuiFOLeyOV0R7YRXxMSaA6:xgXQKSLpOCtV0R8xMSaA6

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\Syslemnljpm.exe
      "C:\Users\Admin\AppData\Local\Temp\Syslemnljpm.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lpath.ini

    Filesize

    85B

    MD5

    aeca29d1a347f175059286e80a23bbf3

    SHA1

    79345493221db4c2d2f0a4cfd7fd28beb85fd721

    SHA256

    225b9a8b48211eeb29b82c28a1fc19e79e3b7f2a9b1d372911c8ac0a3ceb300e

    SHA512

    8a694d8276fedea4d97c9bb34acd7f7a9f142ac3cce6b52579889c62d88342c72a3b40d2fa80593474a1131dc6b91521005f8d96c3d83a35ed00c87ef12ca2f6

  • \Users\Admin\AppData\Local\Temp\Syslemnljpm.exe

    Filesize

    440KB

    MD5

    f38aecfcad42de0fd266c281d00a7d85

    SHA1

    5c592fead1ed9a885e751597259ba3a883ee91bd

    SHA256

    abb6265cb06a8db44a40bceb3c0c2fbe365ddc37b877babc7148c02b7cc343b8

    SHA512

    cf2121d88ce5bb0e16bed0715cfc12bf42470dcb3a1929fbdc8918a815507cd060b167e28d4cc196a802fd64761dc95791e5b2ff0ad5284aaf0d4613b5a04a16