Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 20:41

General

  • Target

    2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe

  • Size

    355KB

  • MD5

    2eca7433ec9b1b18d9500a69d8699790

  • SHA1

    54c2e6091297fe0b52f52a6d10c1b42d42ad2f00

  • SHA256

    f903e135a65eb8054aa175ae64f9bbaf89e317967ef03c6f9819f2847a9ca67f

  • SHA512

    ce0a2c309049b8d2e109ff4f93621c020026bc0fefe0c8071f5752a0def589aaa228794d400d097f4b38d7120013f5c1300be723cd87d4569bd61b7bc638a6f2

  • SSDEEP

    6144:/qvk3Q5ibjnNuuXckaL7pbRBkce97aw/N4L7ov:/qvMQ5ibjnwka3pbRC19Gw/Nsov

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\Systemugjwt.exe
      "C:\Users\Admin\AppData\Local\Temp\Systemugjwt.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fpath.ini

    Filesize

    85B

    MD5

    8bcdbcd7589a230b292224bec6d18ace

    SHA1

    5f7b4d2276da92e84b76affb46810376b714f43a

    SHA256

    55f07d1c2363e33e65f2bdfaf833de69876055bb546ef4bb6b9e442a4ef06869

    SHA512

    0b98c7ac4640ac0ba4557cf110ab9596f471aba3af9dc04d74fa86ef161595e567c4abb61c8de4a84585f7071ce88657015b38c922fdd6fdb8f1954529c9194c

  • \Users\Admin\AppData\Local\Temp\Systemugjwt.exe

    Filesize

    355KB

    MD5

    a1f16ce1fa1b203e8a0ca16a08cdce76

    SHA1

    cc877848573e0a5511defacd01ac15df50b3df33

    SHA256

    2c4a2e70a57b32270ca69549b2c98a4ecd44bbe46c60e657007d9c3e12ae2d41

    SHA512

    77ffd0b959d2d654139470d19350649508ce277e8a3b02602e903337177483f7da9b091c994f609419cfde75b7b0190592b3b4fbb834ed22134de22133c952cf