Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 20:41
Behavioral task
behavioral1
Sample
2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe
-
Size
355KB
-
MD5
2eca7433ec9b1b18d9500a69d8699790
-
SHA1
54c2e6091297fe0b52f52a6d10c1b42d42ad2f00
-
SHA256
f903e135a65eb8054aa175ae64f9bbaf89e317967ef03c6f9819f2847a9ca67f
-
SHA512
ce0a2c309049b8d2e109ff4f93621c020026bc0fefe0c8071f5752a0def589aaa228794d400d097f4b38d7120013f5c1300be723cd87d4569bd61b7bc638a6f2
-
SSDEEP
6144:/qvk3Q5ibjnNuuXckaL7pbRBkce97aw/N4L7ov:/qvMQ5ibjnwka3pbRC19Gw/Nsov
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x00070000000158d9-7.dat family_blackmoon -
Deletes itself 1 IoCs
pid Process 2608 Systemugjwt.exe -
Executes dropped EXE 1 IoCs
pid Process 2608 Systemugjwt.exe -
Loads dropped DLL 2 IoCs
pid Process 2184 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 2184 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2184 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 2184 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 2184 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 2184 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 2184 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 2184 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe 2608 Systemugjwt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2608 2184 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 29 PID 2184 wrote to memory of 2608 2184 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 29 PID 2184 wrote to memory of 2608 2184 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 29 PID 2184 wrote to memory of 2608 2184 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Systemugjwt.exe"C:\Users\Admin\AppData\Local\Temp\Systemugjwt.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85B
MD58bcdbcd7589a230b292224bec6d18ace
SHA15f7b4d2276da92e84b76affb46810376b714f43a
SHA25655f07d1c2363e33e65f2bdfaf833de69876055bb546ef4bb6b9e442a4ef06869
SHA5120b98c7ac4640ac0ba4557cf110ab9596f471aba3af9dc04d74fa86ef161595e567c4abb61c8de4a84585f7071ce88657015b38c922fdd6fdb8f1954529c9194c
-
Filesize
355KB
MD5a1f16ce1fa1b203e8a0ca16a08cdce76
SHA1cc877848573e0a5511defacd01ac15df50b3df33
SHA2562c4a2e70a57b32270ca69549b2c98a4ecd44bbe46c60e657007d9c3e12ae2d41
SHA51277ffd0b959d2d654139470d19350649508ce277e8a3b02602e903337177483f7da9b091c994f609419cfde75b7b0190592b3b4fbb834ed22134de22133c952cf