Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 11:39

General

  • Target

    d47806fa15772365bb37ba7590715960_NeikiAnalytics.exe

  • Size

    119KB

  • MD5

    d47806fa15772365bb37ba7590715960

  • SHA1

    9c71fffb0c1a4fd31ac31d85f6a3e053ed4c0e77

  • SHA256

    3943b40e619040dac7ab390360c9f2aaa8f2d394513fbfd2dbe3ca58473f98db

  • SHA512

    169fc7b39177c5d31791ed5ae03621095195574f384df3b198c7544da3f84ec6bf49f07a1515f212c5630c0d3fdf1bd6397ea5e8e31c99294a5d36846a5dc0fe

  • SSDEEP

    3072:6OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:6Is9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d47806fa15772365bb37ba7590715960_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\d47806fa15772365bb37ba7590715960_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:464
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:3568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    b8eaacb3be42efcc7cddbb4cda838822

    SHA1

    6fc72ab25cd96e7b517ba932550e5427a3afe6bd

    SHA256

    707270ece5a84f04f63c106bff7f2a97f2aabf744d162f4184dcfa3ea283d83f

    SHA512

    4d06ccc4a5b4da9dd6ea90afe3c8594de4a834896588d56324844d457bc42411f2deb590cd0b2c7a53cc10c06e10f466ed797e58a801beb2908b703de6b2beee

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    119KB

    MD5

    99e16bc883440fd48085aeca36ab8c4a

    SHA1

    fa4bf924f0dc74ecb8f025397b15c901d02c7118

    SHA256

    ff6321eb7244778035b81c3e6f61e46d1d5589dfce70ebbd1293734d31ebae2c

    SHA512

    27041b5f988b4c057d63fa4ea40c0db7073d077a896763c76a752cbf5d3a59df2f7068c6c56336abe13440e8640a1ce0674985f1e7dc153e37a7cc52acc5de7e

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    27b2ec761188b37aa1668bf20f3e74f9

    SHA1

    dcd1827d37f37e675e823804d61c4b5c2ff677a4

    SHA256

    c60d9db6326d30f9fed0a63c769e567a1f024ded31f75fd6171d38870b3c778a

    SHA512

    2a2bb55a8a122b0ef35bab9747d7c0b9c69e3a9cf1802740ab2d4e247d70afe4339428878f95af7b710c26c9205069ec569d5f01ff96c4056aa944c15ee2943d

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    da1878705386015df73669da4e712d2d

    SHA1

    4ccbe6c30578e8c956554a1ac54cf70bac6504eb

    SHA256

    4dff8f53be07abe685a45d85eccc1169d9cf707cda1b65df48c8d8dab95e9dd7

    SHA512

    79efb4c1d1173f450ef11a4bdd59d8f8d06efbc8b52dc9736f1207bf7c63843ad14f0a83a77746423b260da93434cdc245bf8a34c1139dcdd458797a24b1b0c9

  • memory/464-25-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/464-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1012-22-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1012-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1012-23-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1012-18-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3568-30-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3568-37-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3568-40-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB