Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 12:25
Behavioral task
behavioral1
Sample
28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe
-
Size
357KB
-
MD5
28b1d5a2a630ee3aadc78576c4c06010
-
SHA1
76bf2bc0e5ecbd81d9bdda78df2420701bcf039c
-
SHA256
84f9ab5a8e810fd027e7fe0d2e4004444b316a51d6f15951c5d17f0970068748
-
SHA512
b7a0f0fd547948e8228e99a6910c9f8b75f9b5e3913de19741ddcb5892e3fa0a6f141965c251deb8d0a6de50d1fba27154a023deafe8c361d0e795a7b10bd825
-
SSDEEP
6144:mvk3Q5ibjnNuuXckaL7pbRBkce97aw/N4L7om:mvMQ5ibjnwka3pbRC19Gw/Nsom
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Systemctwzw.exe family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe -
Deletes itself 1 IoCs
Processes:
Systemctwzw.exepid process 2436 Systemctwzw.exe -
Executes dropped EXE 1 IoCs
Processes:
Systemctwzw.exepid process 2436 Systemctwzw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exeSystemctwzw.exepid process 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe 2436 Systemctwzw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exedescription pid process target process PID 1764 wrote to memory of 2436 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe Systemctwzw.exe PID 1764 wrote to memory of 2436 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe Systemctwzw.exe PID 1764 wrote to memory of 2436 1764 28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe Systemctwzw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\28b1d5a2a630ee3aadc78576c4c06010_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Systemctwzw.exe"C:\Users\Admin\AppData\Local\Temp\Systemctwzw.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Systemctwzw.exeFilesize
357KB
MD534e18cd7d452a3e33e7742fd7b966476
SHA1f0f5722fa2aa2c8660a758b5e492aa21ab087ede
SHA256fd0dafd4109e2d7ab282982ea2cdd0d540c7c4018d1ec1d1d9d574da968fb913
SHA512cbc1231292623e6052ead204e655af1cde9ef1673af4352d7ba2f46515fbadb7af8773e166005fe6cd92714cf71e7b8bb636ed98a30a3ca35d9cc1cac5d7208f
-
C:\Users\Admin\AppData\Local\Temp\fpath.iniFilesize
85B
MD59a2e15a749720907053f3140197f0fd2
SHA1f5867ca663347afeeffdb0c93c7afdf6f347a53c
SHA2564e430aa94269a5ff8544190ed43230edd973f4239204e4b6f8e521930926ae87
SHA512c5935ff15e2434e88371cde780f12aaaa458e27fd6f4aa1df4d67979c566a841c06190ebd800ef806cd376461693c789d1ff1d06e61301dc6decf02ca82097e8