Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 16:38

General

  • Target

    238ac1d2d3c35aaf3ea4954e17176600_NeikiAnalytics.exe

  • Size

    224KB

  • MD5

    238ac1d2d3c35aaf3ea4954e17176600

  • SHA1

    dfeb2f6db52a79823b22412193679c7b7ca75c7b

  • SHA256

    fec7b9d70b3bade0df951c87b859b4c8514d003f69ade2a21ae9bae3c51ddbec

  • SHA512

    f3015635d240b0ecc259bbdc4cfac2a73559b4727195c4e7d0b7bfe59b0a89e858e5edf85c31ba9d07f428bff55d9b4a7652b04ae713fba0bcb7c0b10494c226

  • SSDEEP

    6144:yIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCtZy:fKofHfHTXQLzgvnzHPowYbvrjD/L7QPo

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\238ac1d2d3c35aaf3ea4954e17176600_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\238ac1d2d3c35aaf3ea4954e17176600_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    2e5ccf74efc1328137a75b174a3d29a9

    SHA1

    8a71b6b02376ecb1d54056c9e3258a5219731291

    SHA256

    b1352acd8067ee0c380629e96fc9738c8027b77ccada186cfc4811db85525366

    SHA512

    b5816018b48f5c89faaf62dc290c36874c06fd9bf2d7c4a60734a087822e87d9368fcc5ee19db84f6123f43b76e921ca0a378c2edc990cd39d75b4a4bb2295d5

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    f2b1b36fd08ae95e8d6c52ea5da96a91

    SHA1

    89d1cf3b66b50ff8ce1a39bfbd6119cf246756d7

    SHA256

    46dc39f98c8bbe9aa76fc0b41ccc5fac9f0d43991a76ac6cc092b4e5753bbe2e

    SHA512

    ec80b2e3ee10482637a3890d251410f2de5c71047318265dad156df194aee296d303298ef2cc125ff2504b9fb4079d5b6c7306c737547d190af7cd0fc92c6296

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    a80156a43d5e953f270b93966bcf1d93

    SHA1

    074d35dde794926011276da68c76c16c4ece83d7

    SHA256

    4c74b95bb27dc1052c0c1379184474e0095122a9faaf2e6d9de0461e8cb194a4

    SHA512

    98e0b1eccc47c5e0fed358c0c617e4e50d4ce584e15606d2ffb7ae8fff6f64ce4c2c506641fdb6c6159ed619b9095f1e80a335eab27b52f92779f25d73102936

  • \Windows\SysWOW64\smnss.exe

    Filesize

    224KB

    MD5

    b2d7631e08ae42479f4a26885048792f

    SHA1

    7906cb926cc0e3f52075a796929ba1321337fbc0

    SHA256

    82fa561f853de53ec187f439fe055db098c5c8f3628f3b350f731de07728bd22

    SHA512

    0b370a834774220fefaed97f95b96f92bb991864f7c11d4b362095f7b661bb5293f2d3caa90a13c51efb31798308e5c3ca41204e49bb3ce08a971bbd8525b81d

  • memory/2300-34-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2300-41-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2300-44-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2788-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2900-18-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/2900-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2900-26-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2900-27-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/2900-0-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2900-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB