Analysis

  • max time kernel
    148s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 20:41

General

  • Target

    2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe

  • Size

    355KB

  • MD5

    2eca7433ec9b1b18d9500a69d8699790

  • SHA1

    54c2e6091297fe0b52f52a6d10c1b42d42ad2f00

  • SHA256

    f903e135a65eb8054aa175ae64f9bbaf89e317967ef03c6f9819f2847a9ca67f

  • SHA512

    ce0a2c309049b8d2e109ff4f93621c020026bc0fefe0c8071f5752a0def589aaa228794d400d097f4b38d7120013f5c1300be723cd87d4569bd61b7bc638a6f2

  • SSDEEP

    6144:/qvk3Q5ibjnNuuXckaL7pbRBkce97aw/N4L7ov:/qvMQ5ibjnwka3pbRC19Gw/Nsov

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\Systemugjwt.exe
      "C:\Users\Admin\AppData\Local\Temp\Systemugjwt.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2608

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\fpath.ini

          Filesize

          85B

          MD5

          8bcdbcd7589a230b292224bec6d18ace

          SHA1

          5f7b4d2276da92e84b76affb46810376b714f43a

          SHA256

          55f07d1c2363e33e65f2bdfaf833de69876055bb546ef4bb6b9e442a4ef06869

          SHA512

          0b98c7ac4640ac0ba4557cf110ab9596f471aba3af9dc04d74fa86ef161595e567c4abb61c8de4a84585f7071ce88657015b38c922fdd6fdb8f1954529c9194c

        • \Users\Admin\AppData\Local\Temp\Systemugjwt.exe

          Filesize

          355KB

          MD5

          a1f16ce1fa1b203e8a0ca16a08cdce76

          SHA1

          cc877848573e0a5511defacd01ac15df50b3df33

          SHA256

          2c4a2e70a57b32270ca69549b2c98a4ecd44bbe46c60e657007d9c3e12ae2d41

          SHA512

          77ffd0b959d2d654139470d19350649508ce277e8a3b02602e903337177483f7da9b091c994f609419cfde75b7b0190592b3b4fbb834ed22134de22133c952cf