Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 16:31

General

  • Target

    21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe

  • Size

    440KB

  • MD5

    21186cdce283361548dd219c73d3d010

  • SHA1

    f20ac5c333d7fb215780a733a285ce9c149a992b

  • SHA256

    496c2d0e3f938f6e8f02faa263b56fb1e7a6e487eaa33d1b7bbf8f34d3884817

  • SHA512

    8e7221732ad718909822bbe166136dc69188b241050f41dea980df29850dc1ab38512eec22f246b31732cda6c91d0cf7a73b24aac6e3f1383ab093e3ddf77953

  • SSDEEP

    6144:xozXQKqfmiiyWwuiFOLeyOV0R7YRXxMSaA6:xgXQKSLpOCtV0R8xMSaA6

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\Syslemwrcto.exe
      "C:\Users\Admin\AppData\Local\Temp\Syslemwrcto.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Syslemwrcto.exe

    Filesize

    440KB

    MD5

    aa1ab4e80a5fd0df3c4b6a993c880c47

    SHA1

    ffdcfc1e540fed37b4f09346f02702665ba1f5e6

    SHA256

    a286bae502bbadb561ff546f7d3c6485e8d21ff1508e41835ecd39eb69a41d48

    SHA512

    63229dd09e816bfbe5cec3560650800f2f468296a491573a85e9c56b08c8a710069027b496c660c50aa824a011ae1d61680581d928097beb057d1a9f8a0e10e4

  • C:\Users\Admin\AppData\Local\Temp\lpath.ini

    Filesize

    85B

    MD5

    aeca29d1a347f175059286e80a23bbf3

    SHA1

    79345493221db4c2d2f0a4cfd7fd28beb85fd721

    SHA256

    225b9a8b48211eeb29b82c28a1fc19e79e3b7f2a9b1d372911c8ac0a3ceb300e

    SHA512

    8a694d8276fedea4d97c9bb34acd7f7a9f142ac3cce6b52579889c62d88342c72a3b40d2fa80593474a1131dc6b91521005f8d96c3d83a35ed00c87ef12ca2f6