Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 03:36

General

  • Target

    5f643ed40d4fd1ea692d743a94edea70_NeikiAnalytics.exe

  • Size

    75KB

  • MD5

    5f643ed40d4fd1ea692d743a94edea70

  • SHA1

    b7739f4b32debf219a5d207006c92dab9b1bf2ae

  • SHA256

    8ee5d92d788815b08bc58f6ed3b2ff3eca992f33cd87971134c6bb026c0895c9

  • SHA512

    ef2a91f3629468259377a48a88d3ec76396b13a296d28ab8f00bf9720698856b16d15d8ac073d3f9f7c841a90362bd5180f1aa9edcb5370006dda4c5fc7ea724

  • SSDEEP

    1536:gx1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3v:IOjWuyt0ZsqsXOKofHfHTXQLzgvnzHP3

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f643ed40d4fd1ea692d743a94edea70_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5f643ed40d4fd1ea692d743a94edea70_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4260
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4016,i,6593821857742176458,13646536021844995125,262144 --variations-seed-version --mojo-platform-channel-handle=4456 /prefetch:8
    1⤵
      PID:2900

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\ctfmen.exe

      Filesize

      4KB

      MD5

      885360e4ee2ef0a8fca5eae5e3f6eb21

      SHA1

      3ff6b0c650871729be6875a6849cf325b0651212

      SHA256

      3bf85a132ccb63b3d4471377f100f5756767a730a4f5917140736ca6ba7277bc

      SHA512

      4b358c6efb846856abdeaece49dccf416101b33d248354b9f2f4861870e575a743e611dd0efa940a596c34cd66d3a16111d08dd96d9d3bbd7e4948e919092518

    • C:\Windows\SysWOW64\grcopy.dll

      Filesize

      75KB

      MD5

      a0dff4616758010aca801032b8cb6765

      SHA1

      360d59fb6600bd466df2de6bf7c824821ce61618

      SHA256

      0f5a62082c2c66d464f5bdab357f637c896b9546cd8adada456cf33f5f372942

      SHA512

      1d2552fe42e626de5f65fe43d5ffa89ca27b853ae1fb40877273d0b8798c934938ca478af53f83dc453f9ba2864e847139f79ee093fa0ae56dbdafe15f634448

    • C:\Windows\SysWOW64\satornas.dll

      Filesize

      183B

      MD5

      1c30f95f5a94b128aaae3f0466a5933f

      SHA1

      d02cf1e24e44a9e3ae2a9f37184977368c972739

      SHA256

      b1807de8f96300f842d4e02d7a45aee660dbdf8d6888dc899293f3df469234c0

      SHA512

      0304a5c9246e45ea765a48f374ad2e164b9c750dc97d9423538c2cfdf0d578841545ef3bc185a0c5dbec9e44558ac3927dc2a265d1a595fd32be2784f669d4fe

    • C:\Windows\SysWOW64\shervans.dll

      Filesize

      8KB

      MD5

      1001165da4ae5ff90f491a07e09079a1

      SHA1

      2c6fe9727633564b78f001d93d2fca2c4054677c

      SHA256

      6ca1fc0b412c77bd2fe060442cec15817f931d1ff593c63aabb382d7201c1b7a

      SHA512

      61504eae7fce6645190f66cbbab39c57daebabb026d5d47ba0ea37c09e514bb33601ad1aab92f96abb2264ca3ec2388b4242fc72b2cfaa6225e7f9affdfe5758

    • memory/944-26-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2252-17-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/2252-22-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/2252-20-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4260-38-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4260-48-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4260-35-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/4260-40-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4260-42-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4260-44-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4260-46-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4260-36-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4260-50-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4260-52-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4260-54-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4260-56-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4260-58-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4260-60-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4260-62-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB