Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/05/2024, 20:41

General

  • Target

    2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe

  • Size

    355KB

  • MD5

    2eca7433ec9b1b18d9500a69d8699790

  • SHA1

    54c2e6091297fe0b52f52a6d10c1b42d42ad2f00

  • SHA256

    f903e135a65eb8054aa175ae64f9bbaf89e317967ef03c6f9819f2847a9ca67f

  • SHA512

    ce0a2c309049b8d2e109ff4f93621c020026bc0fefe0c8071f5752a0def589aaa228794d400d097f4b38d7120013f5c1300be723cd87d4569bd61b7bc638a6f2

  • SSDEEP

    6144:/qvk3Q5ibjnNuuXckaL7pbRBkce97aw/N4L7ov:/qvMQ5ibjnwka3pbRC19Gw/Nsov

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4180
    • C:\Users\Admin\AppData\Local\Temp\Systemmtugi.exe
      "C:\Users\Admin\AppData\Local\Temp\Systemmtugi.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Systemmtugi.exe

    Filesize

    355KB

    MD5

    f80984d496286d288d5626b28e4473e7

    SHA1

    388a8b83670b344b7eb020431ad0edf843b8892c

    SHA256

    88400d5ba16bf895e3d67488fddb2137198bdeeace70afd39b4f2b0d442624c6

    SHA512

    1779d0e0ed35cc85d9b28824f02b3be12b39dec7854acbd6b4ba7580cd0225944c7ca5092e6d861f1ebd69dcfa59f7d8d19610fd10db46ee4ae3996063c60f7c

  • C:\Users\Admin\AppData\Local\Temp\fpath.ini

    Filesize

    85B

    MD5

    8bcdbcd7589a230b292224bec6d18ace

    SHA1

    5f7b4d2276da92e84b76affb46810376b714f43a

    SHA256

    55f07d1c2363e33e65f2bdfaf833de69876055bb546ef4bb6b9e442a4ef06869

    SHA512

    0b98c7ac4640ac0ba4557cf110ab9596f471aba3af9dc04d74fa86ef161595e567c4abb61c8de4a84585f7071ce88657015b38c922fdd6fdb8f1954529c9194c