Analysis
-
max time kernel
149s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 16:31
Behavioral task
behavioral1
Sample
21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe
-
Size
440KB
-
MD5
21186cdce283361548dd219c73d3d010
-
SHA1
f20ac5c333d7fb215780a733a285ce9c149a992b
-
SHA256
496c2d0e3f938f6e8f02faa263b56fb1e7a6e487eaa33d1b7bbf8f34d3884817
-
SHA512
8e7221732ad718909822bbe166136dc69188b241050f41dea980df29850dc1ab38512eec22f246b31732cda6c91d0cf7a73b24aac6e3f1383ab093e3ddf77953
-
SSDEEP
6144:xozXQKqfmiiyWwuiFOLeyOV0R7YRXxMSaA6:xgXQKSLpOCtV0R8xMSaA6
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x0017000000021f87-8.dat family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe -
Deletes itself 1 IoCs
pid Process 3048 Syslemwrcto.exe -
Executes dropped EXE 1 IoCs
pid Process 3048 Syslemwrcto.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe 3048 Syslemwrcto.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2928 wrote to memory of 3048 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 87 PID 2928 wrote to memory of 3048 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 87 PID 2928 wrote to memory of 3048 2928 21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\21186cdce283361548dd219c73d3d010_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\Syslemwrcto.exe"C:\Users\Admin\AppData\Local\Temp\Syslemwrcto.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440KB
MD5aa1ab4e80a5fd0df3c4b6a993c880c47
SHA1ffdcfc1e540fed37b4f09346f02702665ba1f5e6
SHA256a286bae502bbadb561ff546f7d3c6485e8d21ff1508e41835ecd39eb69a41d48
SHA51263229dd09e816bfbe5cec3560650800f2f468296a491573a85e9c56b08c8a710069027b496c660c50aa824a011ae1d61680581d928097beb057d1a9f8a0e10e4
-
Filesize
85B
MD5aeca29d1a347f175059286e80a23bbf3
SHA179345493221db4c2d2f0a4cfd7fd28beb85fd721
SHA256225b9a8b48211eeb29b82c28a1fc19e79e3b7f2a9b1d372911c8ac0a3ceb300e
SHA5128a694d8276fedea4d97c9bb34acd7f7a9f142ac3cce6b52579889c62d88342c72a3b40d2fa80593474a1131dc6b91521005f8d96c3d83a35ed00c87ef12ca2f6