Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 02:11
Behavioral task
behavioral1
Sample
7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe
-
Size
88KB
-
MD5
7c738f47a48ae019fbc126a5af29ce20
-
SHA1
cebfde1971048795e89eb908ca64586713773756
-
SHA256
890948a0e6a52cf01668ed43fee0813dc8d7231de7f6dff7a3b1dfa3e9819959
-
SHA512
f4047df961c651df4352902c82d6e320a0146f7ae97ed8b2aa438a5c51b498a6c3347bfd0fc2143543472049bb6fc79f7ba91989610b57f215d958896e26b90b
-
SSDEEP
1536:5+4hkM3Yz8wMZhUD2XsjEQWOSkE+Ct6WKBex3GWU5FkWp+AmQwKGSZhCQbIo/tSz:dq6OLM3QasY5Ft71fqWWp+efG4hCQra
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/1336-7-0x0000000000400000-0x000000000047F000-memory.dmp family_blackmoon behavioral1/memory/2480-21-0x0000000000400000-0x000000000047F000-memory.dmp family_blackmoon -
Deletes itself 1 IoCs
pid Process 2480 Syslemhntyt.exe -
Executes dropped EXE 1 IoCs
pid Process 2480 Syslemhntyt.exe -
Loads dropped DLL 2 IoCs
pid Process 1336 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 1336 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/1336-0-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral1/memory/1336-7-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral1/files/0x00080000000155d9-9.dat upx behavioral1/memory/1336-11-0x0000000003190000-0x000000000320F000-memory.dmp upx behavioral1/memory/2480-21-0x0000000000400000-0x000000000047F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1336 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 1336 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 1336 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 1336 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 1336 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 1336 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 1336 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 1336 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe 2480 Syslemhntyt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1336 wrote to memory of 2480 1336 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 29 PID 1336 wrote to memory of 2480 1336 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 29 PID 1336 wrote to memory of 2480 1336 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 29 PID 1336 wrote to memory of 2480 1336 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\Syslemhntyt.exe"C:\Users\Admin\AppData\Local\Temp\Syslemhntyt.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85B
MD59921b63b8a559fda3151c7cb302dc979
SHA16ad016a5624212d3b64d48cf34448603dc0d2275
SHA2566e9b3d6b21627852c203d3bb47bb1ae9108bbeae980fb8836f9d4b418f3e9ed5
SHA512900c3caf7334e8257948c6c987c3e925deb89888e3c9584ab39d1fc487d0a63fb3e1403f866725f1889641caa04fa39dc61885856188b3faeb43247ec3b2caca
-
Filesize
88KB
MD53165f4b8091b3bfd13e2d0abb12d8ba2
SHA1401f834a17309b692d30a1f5ac9695b17e2955de
SHA256552360469278029e557cb9492d50d1a6ff9e80eccbdd5d7c0a65d7bc3a5f91dd
SHA512be391155c55adff63485ae46a2d5fb2244c622400df9ae4b383d25941adda9735996bd00d936d767db9d093c3a489b2acb106c3e7bd6e2e42d90051d398999bf