Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 02:11
Behavioral task
behavioral1
Sample
7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe
-
Size
88KB
-
MD5
7c738f47a48ae019fbc126a5af29ce20
-
SHA1
cebfde1971048795e89eb908ca64586713773756
-
SHA256
890948a0e6a52cf01668ed43fee0813dc8d7231de7f6dff7a3b1dfa3e9819959
-
SHA512
f4047df961c651df4352902c82d6e320a0146f7ae97ed8b2aa438a5c51b498a6c3347bfd0fc2143543472049bb6fc79f7ba91989610b57f215d958896e26b90b
-
SSDEEP
1536:5+4hkM3Yz8wMZhUD2XsjEQWOSkE+Ct6WKBex3GWU5FkWp+AmQwKGSZhCQbIo/tSz:dq6OLM3QasY5Ft71fqWWp+efG4hCQra
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral2/memory/2208-0-0x0000000000400000-0x000000000047F000-memory.dmp family_blackmoon behavioral2/memory/2208-15-0x0000000000400000-0x000000000047F000-memory.dmp family_blackmoon behavioral2/memory/688-17-0x0000000000400000-0x000000000047F000-memory.dmp family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe -
Deletes itself 1 IoCs
pid Process 688 Syslemmdmpd.exe -
Executes dropped EXE 1 IoCs
pid Process 688 Syslemmdmpd.exe -
resource yara_rule behavioral2/memory/2208-0-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x000500000002297a-9.dat upx behavioral2/memory/688-14-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/2208-15-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/688-17-0x0000000000400000-0x000000000047F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe 688 Syslemmdmpd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2208 wrote to memory of 688 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 91 PID 2208 wrote to memory of 688 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 91 PID 2208 wrote to memory of 688 2208 7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7c738f47a48ae019fbc126a5af29ce20_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Syslemmdmpd.exe"C:\Users\Admin\AppData\Local\Temp\Syslemmdmpd.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD55753f75e0d5e5ae223646ac5f37515b2
SHA1406eac5705416b88027613eb8c6c9b99f04f48fd
SHA25670ac1eb753979083164eb7849aab7dea3dbfff5c79f5b6c0dfa7cfde5e55b0ab
SHA512d9b2085955ac15022b95d5190ecfd18aa9b8086d71b63a2b9a07d0a8672aa81885d9055034d73646fba384e98fc7bdaa76c0196315174a050ee0d67c6a8c22f1
-
Filesize
85B
MD59921b63b8a559fda3151c7cb302dc979
SHA16ad016a5624212d3b64d48cf34448603dc0d2275
SHA2566e9b3d6b21627852c203d3bb47bb1ae9108bbeae980fb8836f9d4b418f3e9ed5
SHA512900c3caf7334e8257948c6c987c3e925deb89888e3c9584ab39d1fc487d0a63fb3e1403f866725f1889641caa04fa39dc61885856188b3faeb43247ec3b2caca