Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 20:41
Behavioral task
behavioral1
Sample
2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe
-
Size
355KB
-
MD5
2eca7433ec9b1b18d9500a69d8699790
-
SHA1
54c2e6091297fe0b52f52a6d10c1b42d42ad2f00
-
SHA256
f903e135a65eb8054aa175ae64f9bbaf89e317967ef03c6f9819f2847a9ca67f
-
SHA512
ce0a2c309049b8d2e109ff4f93621c020026bc0fefe0c8071f5752a0def589aaa228794d400d097f4b38d7120013f5c1300be723cd87d4569bd61b7bc638a6f2
-
SSDEEP
6144:/qvk3Q5ibjnNuuXckaL7pbRBkce97aw/N4L7ov:/qvMQ5ibjnwka3pbRC19Gw/Nsov
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x000c0000000233f5-8.dat family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe -
Deletes itself 1 IoCs
pid Process 4000 Systemmtugi.exe -
Executes dropped EXE 1 IoCs
pid Process 4000 Systemmtugi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe 4000 Systemmtugi.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4180 wrote to memory of 4000 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 89 PID 4180 wrote to memory of 4000 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 89 PID 4180 wrote to memory of 4000 4180 2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2eca7433ec9b1b18d9500a69d8699790_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\Systemmtugi.exe"C:\Users\Admin\AppData\Local\Temp\Systemmtugi.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD5f80984d496286d288d5626b28e4473e7
SHA1388a8b83670b344b7eb020431ad0edf843b8892c
SHA25688400d5ba16bf895e3d67488fddb2137198bdeeace70afd39b4f2b0d442624c6
SHA5121779d0e0ed35cc85d9b28824f02b3be12b39dec7854acbd6b4ba7580cd0225944c7ca5092e6d861f1ebd69dcfa59f7d8d19610fd10db46ee4ae3996063c60f7c
-
Filesize
85B
MD58bcdbcd7589a230b292224bec6d18ace
SHA15f7b4d2276da92e84b76affb46810376b714f43a
SHA25655f07d1c2363e33e65f2bdfaf833de69876055bb546ef4bb6b9e442a4ef06869
SHA5120b98c7ac4640ac0ba4557cf110ab9596f471aba3af9dc04d74fa86ef161595e567c4abb61c8de4a84585f7071ce88657015b38c922fdd6fdb8f1954529c9194c