Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 19:26
Behavioral task
behavioral1
Sample
1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe
-
Size
88KB
-
MD5
1c3014837078c7a8a806efb1144f2c90
-
SHA1
209aa4ac443acc3d289964c9c2bf94f5fe7e9330
-
SHA256
678c9aeeecb6c2ceaae3295ec1041c24bea801345ed5836d2dc88646f04bb7ac
-
SHA512
302c23d6754f191886b811a780e6a901ae51152bc6f9171e72a1f86a83927c3f25e92f161e0d738d62f5a3016086e47e31d788b0df9932763819893b20e3d7dd
-
SSDEEP
1536:EF7p8VeHwYaBlAvXhRDtxY11686va0QgE9gHgMVnvLiDXs+u:K98VNTAP3BW1k81cLAUvLiDXsl
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral2/memory/452-0-0x0000000000400000-0x000000000047F000-memory.dmp family_blackmoon behavioral2/memory/452-15-0x0000000000400000-0x000000000047F000-memory.dmp family_blackmoon behavioral2/memory/3608-17-0x0000000000400000-0x000000000047F000-memory.dmp family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe -
Deletes itself 1 IoCs
pid Process 3608 Syslemreigj.exe -
Executes dropped EXE 1 IoCs
pid Process 3608 Syslemreigj.exe -
resource yara_rule behavioral2/memory/452-0-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0008000000022976-9.dat upx behavioral2/memory/3608-14-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/452-15-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/3608-17-0x0000000000400000-0x000000000047F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe 3608 Syslemreigj.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 452 wrote to memory of 3608 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 100 PID 452 wrote to memory of 3608 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 100 PID 452 wrote to memory of 3608 452 1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1c3014837078c7a8a806efb1144f2c90_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\Syslemreigj.exe"C:\Users\Admin\AppData\Local\Temp\Syslemreigj.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD52b1c2f08d9476fd6cd7bdf1bad5bdec2
SHA1e905494600b733efcbd3fee183aa2d51e280ebc6
SHA2561c215acfaab5ed269b93cb168556c1d348371cdecc0183f63bfc4f441bbd91fd
SHA5126fd3039de61c369ce02785118c861635925256941b8df0def3c2c9a17f5d4019c2b425087c2bc4f1784e4b18921cf7835ea8c6c3db5cd433a844ac0bf03c53c9
-
Filesize
85B
MD5e53ef5f419599d8772c9b4e8c4c6b2d4
SHA15bb5081462c2b67cd101ce614a507a01a4f48d65
SHA256427934a58da35f5a686592756f33979dfc3e87bdc219a4ef9ba3586f7650afbe
SHA5121903af19fdeb042c6bbd7d051e9899002074ef93c430b5e7f1db28ed22d97eeaaaa30bd93e0b6b529660bed66717d948562aae6f520f5b3b6e6cba499478f8e9