Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 04:15

General

  • Target

    cb23b945e5a6e1d94b6ada65b5dd3c80_NEIKI.exe

  • Size

    147KB

  • MD5

    cb23b945e5a6e1d94b6ada65b5dd3c80

  • SHA1

    e1f277ab6dc23a63836467c9183b2bb93ffbd020

  • SHA256

    45585ed83a9cb3fd3c76d75de1b58925e02314951c26d6fd3ae80e13002dd813

  • SHA512

    74605501cdb9fff729fde83de57a98200a06c7bae5525a4f24254e6e61faf6a498752e0bd5fb78bb1aa6cc857a2ff06c1b03b9fe45d694a75b8c13024024cd0d

  • SSDEEP

    3072:1OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPP1:1Is9OKofHfHTXQLzgvnzHPowYbvrjD/C

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb23b945e5a6e1d94b6ada65b5dd3c80_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\cb23b945e5a6e1d94b6ada65b5dd3c80_NEIKI.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    a33984bd771ba52f1bbc9f29d28e4a74

    SHA1

    2e21e29b336007877f5981c27b90e91de8a3ead6

    SHA256

    42a5937c16614b74c58d8087e88efa4f9a61ed818fa620e0671745ab81bdd4cc

    SHA512

    41418496f406d3746ae8566adcb35ee64347e3bff248cdb378e398cc9865daa799f4fb48da277d28765e51f8f94fac022bfc387e2a281b960afe47f61ccf088d

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    8a5a2d7dfb2ebf9ff039b5b96bb93033

    SHA1

    26e1c9a7e6f9e32b54e4c52928e44fee5702889e

    SHA256

    fd0786a0689bf5bfa67f3efb95cae1d2b12a9ffc3a334a0dc6706b33cae8f77a

    SHA512

    fd6f6043b5f9cf2f9aaea6b66cdb186265dfd19cff5a4e947a247045c94a9f98ef4664e51e6cf08b53d4ec901170e823daa189d0c8885473743b99585861c7ac

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    87becc7d131802bfed72ccfe5ac46878

    SHA1

    cda9646b63685f7074f586cbe8b1c4580054551c

    SHA256

    1022f15bbad4fb4cdd1f9221941f0535c4ba6c1e9825f3e339ea7da8b2167793

    SHA512

    7825c9b39db68029710174bbbf9b656cd567d32601f356a08da3107afae063ab1dafcac4b8211c6448e8cf70b13db7fcd1e9c26c47f07d4d771e059ab7971a70

  • \Windows\SysWOW64\smnss.exe

    Filesize

    147KB

    MD5

    5e68b2be36916b68a383c8632a4e3a62

    SHA1

    ea4ab4bdd99c0fb4f0ebbf680b949a325c17e94d

    SHA256

    94e00d9c5f3c94ccf03cddadd8dcbd87efb8bcb355a77e5f8c52006652b36ffb

    SHA512

    5b53d1fe661194e34f71360ffb22fa0a5895d80f0f282a560dc48dc8ab9bdf11e3c6b6d34e80690b49b871ae800325b8acda4e233e517b65d4f0dfd7a7f0439e

  • memory/2148-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2700-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2700-41-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2700-44-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2888-27-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2888-26-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2888-18-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/2888-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2888-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB