Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    09-05-2024 09:29

General

  • Target

    0ae12eb4d86de54faf576fe9d40d2e00_NEIKI.exe

  • Size

    119KB

  • MD5

    0ae12eb4d86de54faf576fe9d40d2e00

  • SHA1

    e56c4e0f59929edc5cbc01bf5bc73b9981e671ec

  • SHA256

    3a6be418113938752a3e317b6ca44192402912742751b5c89ba9b1cc3161bd31

  • SHA512

    fcc290dc7ced6624abf14de3fd0d529d5663e52d59afdbdc66ab827dad9afe1a7d5bff226753a3f4a358ace709191caae002a11eeba930461f39d92e36125557

  • SSDEEP

    3072:8OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:8Is9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ae12eb4d86de54faf576fe9d40d2e00_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\0ae12eb4d86de54faf576fe9d40d2e00_NEIKI.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    8c94a17569f2c20139a6f71bac89ca65

    SHA1

    774e05e622a8599021e9928a10d66566d228539f

    SHA256

    700f117c75ce3d6a0e0ffc8a6307c51d01e70e49a8ab55705929391e9ac5a8c6

    SHA512

    88f16d8c20e3a649cff9b2e64fede27bb2d499643187af1c7abe0740cd622a6cf4e03d362c338e7afdeefd4f2d1b4f68001e09d35042d8ec173b3c1f8e958e42

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    0d5c6fcc46db7a72f0cf8a427d85bb68

    SHA1

    ea8753f83cd0746c61bcef2a043e0ee9d28f0c0d

    SHA256

    a32cb4f8fb7191872cfaceda526ee88d084ecc95f03f7d414bd749e21c1f247b

    SHA512

    ec9acaa453eb2e00c019ba8b70c4f5d71bdc762248225d1bb219505ea392714acfd4b7873220f5023d119d605691df57949b3b432e1e473de020872328bf5cef

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    7d3bcfa8435c8bbba3122c6950884470

    SHA1

    bbe3c50ac99d8bd7e78e09fde55488c9e4135c28

    SHA256

    0267ab27dcab27ac16472cb7aed0f97115c39ce1c486628152ffb4c2543a9a8b

    SHA512

    119a127858a30ea6e34d6b1fdd473083992aecaf4e0bdea4fccea836447c823f5e2d2b5db5069aeb26473616ba69d2ead9fcbb041aa87ed6f0bd2e72fb067839

  • \Windows\SysWOW64\smnss.exe

    Filesize

    119KB

    MD5

    80abc4be9922f51af6f35fcd018394ff

    SHA1

    b0dafdfa7d56d6b3ac43a17cc96f9103624203e4

    SHA256

    25fae13ae0e68d9aaec8fa792f327bb0b3d29a24f9414539c9b26dc90123aa2a

    SHA512

    c10096c80298265f43b3f82907360c12a757852904d97df1c7cdaf1848ef197e024400c57b0827e9fec03170c39767bfa174bfb38a83b22f30dd9306ea88a671

  • memory/2004-18-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/2004-27-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2004-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2004-26-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2004-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2360-35-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2360-42-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2360-45-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2764-33-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2764-30-0x00000000003A0000-0x00000000003C0000-memory.dmp

    Filesize

    128KB