Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 16:31
Behavioral task
behavioral1
Sample
21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe
-
Size
440KB
-
MD5
21186cdce283361548dd219c73d3d010
-
SHA1
f20ac5c333d7fb215780a733a285ce9c149a992b
-
SHA256
496c2d0e3f938f6e8f02faa263b56fb1e7a6e487eaa33d1b7bbf8f34d3884817
-
SHA512
8e7221732ad718909822bbe166136dc69188b241050f41dea980df29850dc1ab38512eec22f246b31732cda6c91d0cf7a73b24aac6e3f1383ab093e3ddf77953
-
SSDEEP
6144:xozXQKqfmiiyWwuiFOLeyOV0R7YRXxMSaA6:xgXQKSLpOCtV0R8xMSaA6
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x00070000000162cc-7.dat family_blackmoon -
Deletes itself 1 IoCs
pid Process 2664 Syslemnljpm.exe -
Executes dropped EXE 1 IoCs
pid Process 2664 Syslemnljpm.exe -
Loads dropped DLL 2 IoCs
pid Process 2268 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2268 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2268 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2268 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2268 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2268 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2268 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2268 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2268 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2268 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe 2664 Syslemnljpm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2664 2268 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 29 PID 2268 wrote to memory of 2664 2268 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 29 PID 2268 wrote to memory of 2664 2268 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 29 PID 2268 wrote to memory of 2664 2268 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\Syslemnljpm.exe"C:\Users\Admin\AppData\Local\Temp\Syslemnljpm.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85B
MD5aeca29d1a347f175059286e80a23bbf3
SHA179345493221db4c2d2f0a4cfd7fd28beb85fd721
SHA256225b9a8b48211eeb29b82c28a1fc19e79e3b7f2a9b1d372911c8ac0a3ceb300e
SHA5128a694d8276fedea4d97c9bb34acd7f7a9f142ac3cce6b52579889c62d88342c72a3b40d2fa80593474a1131dc6b91521005f8d96c3d83a35ed00c87ef12ca2f6
-
Filesize
440KB
MD5f38aecfcad42de0fd266c281d00a7d85
SHA15c592fead1ed9a885e751597259ba3a883ee91bd
SHA256abb6265cb06a8db44a40bceb3c0c2fbe365ddc37b877babc7148c02b7cc343b8
SHA512cf2121d88ce5bb0e16bed0715cfc12bf42470dcb3a1929fbdc8918a815507cd060b167e28d4cc196a802fd64761dc95791e5b2ff0ad5284aaf0d4613b5a04a16