Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 16:37

General

  • Target

    23497637e6c889aad0d90c6a33cc3fa0_NeikiAnalytics.exe

  • Size

    119KB

  • MD5

    23497637e6c889aad0d90c6a33cc3fa0

  • SHA1

    476bd686657fad6139630bfb22b82663a187b652

  • SHA256

    c037f391bb609514b2a1c501adc82fdcc0f5cbfd0571656d1d3083d3dd8af374

  • SHA512

    7268070a3e13f2d19e197725af2273459f16f8f0a7b8a4fd1182778ddcb4926eb3c6d9418cd7d22789a5a29596258f1de78e3d9fdece509869dfcc79994c23ec

  • SSDEEP

    3072:mOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:mIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23497637e6c889aad0d90c6a33cc3fa0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\23497637e6c889aad0d90c6a33cc3fa0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4996
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    5932be27659b54c7636a733a6218cc4a

    SHA1

    656bee69a5270fc9331613833c38d8af4a1cb368

    SHA256

    467d01e1b4bf5448997e97c11718ad16030f73be138a34a9baf41c9c6eb30da8

    SHA512

    b8b40504ab30fd30bfa366d6afef7e6def636d1f00e6a03d5cbe45661d70c8e085749cd02467dc9246206e64880600b3b521c1fa1b0e7c8b1d2f79d97bfa3b3a

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    119KB

    MD5

    d97cfe7c7d2912ec47494bcc52180ae4

    SHA1

    dc8e6c97d614aeeaa05aeca3b0058ff9263187ec

    SHA256

    f1491b993ef44a90819994aebd2fa65f57e9b3d65ee8b7ef2e5c5bfcb0568bd0

    SHA512

    d09c9c4ae2c552f93749ec162bd3b2a482f53d25a4011c47a1e149db7d80610cd910ba5d51879232563787a5f76e2c9301150cb8267172de0ed546048d0ca04b

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    a650192feceecec24633f5e625b1f5cd

    SHA1

    46b1bc6ed7e00159f918408dc90b277d985dabd8

    SHA256

    0de872de10716c79354a611caf2fec35c6fc0c6fab53d09395a153a5b8b0e003

    SHA512

    52b5221c38afec56c5c435e79e4c3c3aaeb4fc8112803c41b41f7871a79c51405cd1c10b71c6fc10d104b1235d9e3420544b8a12d18314c3ab46732d5ea62da0

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    94797a50ea3e76ff5817bf309544f271

    SHA1

    b1706dfbe5e99251eb0afdf2565da6842d0a8229

    SHA256

    472ce4b5267b6a34741bcdc19dd2242ef741c55dd4a50a7c75ae1e3bda7b7aaf

    SHA512

    b13b4be9121b19ff12a3bee82c5a7946024a6ee126d9abc46281b65d40d51bfe1bd3efcf6e4755f0f16bd471a2576584deab53d44e76aeb93cf2b7472f5ef42b

  • memory/1984-29-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1984-37-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1984-40-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-18-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2684-24-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2684-23-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4996-25-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB