Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 08:24

General

  • Target

    042134ec70a227af1bab301e0b094cc0_NEIKI.exe

  • Size

    120KB

  • MD5

    042134ec70a227af1bab301e0b094cc0

  • SHA1

    df7d96df7f8e82bd617ebbe66635e2a47359f2f2

  • SHA256

    8e7db5c623e3a8415f28e4d1e6c327737ba20c023436b155dbfe81c9e1014550

  • SHA512

    1d323b699d6b67ba6dd6af83d2854e019f25093385ed9efca2b8c7e3e5e1d0d179a8de09a7b9f7b273e05288f80e359eb6641592be7b0fc1c1620ae6db4496e0

  • SSDEEP

    3072:0OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:0Is9OKofHfHTXQLzgvnzHPowYbvrjD/E

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\042134ec70a227af1bab301e0b094cc0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\042134ec70a227af1bab301e0b094cc0_NEIKI.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 824
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    d317180eb5533232b07a791862f6d08f

    SHA1

    f8e8bca60a4294d5a5ab3d92b3685250e47d0fde

    SHA256

    2445c8e748dd63b6be95d4f2982feb581e2d033d67781da36ab7e372f10811e2

    SHA512

    e5eb4fc615cf9842f7bad1a7b18e77c82753fa130f146b59ed5437ad6c44d4d2a9e53cbd7ab51560ccdeb55c271526667c89a4f6bde76de5a6bc44679b229c9f

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    c77c726724aced79dcca11690a67647e

    SHA1

    0e7c001b69264aa0dc90d566dc19416ba4160b21

    SHA256

    4db182cb79a4f893ce7cde6148ad83f7b2ea29d17279a1d122c23805e51f4433

    SHA512

    3dcf59db12c30671662a3b6bb50d55959811174efdc0da4cb691000dd76d88553e1f010ecdabb13a61031725fec75e4fa18b0cbc8df6987f86f1f95d57b8fe07

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    c98cebbbab5e0967b9432d63de5da939

    SHA1

    9cf9da37cc196e3f66dc31158a67756c0c86fb30

    SHA256

    e53410df35a78900e77e270b2f389f7739faf0dc72dbb14ad325615ee21a9d43

    SHA512

    c10828e1c92140d4d4a842170b927129e9535ec9bd6ce1fb79a32aee37630fff3ae1a85d1bb7c537a03819806ce29e8370f7b8dbdc0b62fa2a37f3e67d9aadfd

  • \Windows\SysWOW64\smnss.exe

    Filesize

    120KB

    MD5

    a7ccf6851d8871ce20f6640f7d81dc36

    SHA1

    417d01142d18204e30490e81a3dfa5bd74157c23

    SHA256

    e882caf66b7f53a85f55cca89d11a0185b026685f79ae43405490d8789496af5

    SHA512

    c9e5574e31e06f4c78c05b5a273ab0ccc547886d8d04f0103460f45577954c5591c42e9179335ccc6b712a5cb807d33b260f309a8ea051828dd9006bb1063ba4

  • memory/2240-26-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2240-19-0x00000000002D0000-0x00000000002D9000-memory.dmp

    Filesize

    36KB

  • memory/2240-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2240-27-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2240-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2580-31-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2580-30-0x0000000000320000-0x0000000000340000-memory.dmp

    Filesize

    128KB

  • memory/2724-35-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2724-42-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2724-48-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB