Analysis

  • max time kernel
    91s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 08:13

General

  • Target

    0029a4d756eb4f0126fb7f1b7b1dbce0_NEIKI.exe

  • Size

    120KB

  • MD5

    0029a4d756eb4f0126fb7f1b7b1dbce0

  • SHA1

    9ca6e91913e6b84dcf0f8c4e9aba01e0a3674b1a

  • SHA256

    3659c82b50bdc329cee38060a50eeb74f74f302b14a788b3757607791fc43f63

  • SHA512

    2e664ba816a113ad098be5e103f88439e6114f558c0adebd0fdb030d7952d0a8d51b26bd1412d2c3b3d9eae1d4187b2d789f19623824d0e59bcb387be284e439

  • SSDEEP

    3072:tOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:tIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0029a4d756eb4f0126fb7f1b7b1dbce0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\0029a4d756eb4f0126fb7f1b7b1dbce0_NEIKI.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3808
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:756
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:904
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 904 -s 1476
          4⤵
          • Program crash
          PID:4708
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 904 -ip 904
    1⤵
      PID:1844

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\ctfmen.exe

      Filesize

      4KB

      MD5

      7418f17acbfa696fa5c30157b2780f85

      SHA1

      eb0f4d2ce67f1f8107f74ae4f59d5c0c60d7efa9

      SHA256

      20dfc6f4683706824beed771de6e4a579c4540133a0c72cdd633f4b7c4f70e73

      SHA512

      4e633b4ae2675a0d5acc5a473538defb680ea3e4bf2af6522f688d8aaf3b2298569a880ca73351fe60f8d227fab7e3af66a65b711c7c2a3ae11846bbc3339be2

    • C:\Windows\SysWOW64\grcopy.dll

      Filesize

      120KB

      MD5

      20f80cc7d1d08691e131ea5ff07dfef6

      SHA1

      2f0925280eac214d575f719a2f9f40136bc2c559

      SHA256

      835765df1fe4dc9edca332433d5a34fb844398714efaef638c2d7ab0b0d0d5ec

      SHA512

      ba264f6fd2161d7e4502d7fac171310fbbe09e70f40f6c4072c4e632815fd8dc586fddd467e4863d86f6498401048e0bdd27117f39005dda57e62abcaa16a95d

    • C:\Windows\SysWOW64\satornas.dll

      Filesize

      183B

      MD5

      6a8252a7d9336f33dd38ce7f63bb3d0f

      SHA1

      a636270e3f1b2acc9376451fa8340eed3ae8b0cf

      SHA256

      5d910ecf2a4360c1290bd39ed56e634e890a2caa59539b966fca6be96eb33ed2

      SHA512

      e4cd970565c1a019ea518cd00953d01dbeaa649d6824015f825b1068764faa81bf3ca043705dd9ea7bbbe06c9e362a7aa0a4df500b7242048986c3b6aaf97f2e

    • C:\Windows\SysWOW64\shervans.dll

      Filesize

      8KB

      MD5

      6edc23e4c0f848a873a957bc5c7ff2a6

      SHA1

      3fdb3fb1f646d81e8e647c1daf12be8e2b33d7d9

      SHA256

      91b6d12fae451702da637e9adb923d6d8e2be7282d2482ede73213a874fbc208

      SHA512

      9a3ad65437e7986b2fccd7b15a8f423db2257adc5afc52a3aa8f5d8835c069f01bda9a79320f60ef37cc622e8b451d92552da847409bc296d03f084b752b5b75

    • memory/756-24-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/756-29-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/904-27-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/904-37-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/904-39-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3808-1-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3808-18-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/3808-23-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB