Analysis

  • max time kernel
    155s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 18:57

General

  • Target

    4a16ccbdb6a101efe0225abe2f90fe00_NeikiAnalytics.exe

  • Size

    127KB

  • MD5

    4a16ccbdb6a101efe0225abe2f90fe00

  • SHA1

    b1c2816562de433bb0919ac45cef5fa8ed578598

  • SHA256

    3533fadcb2911b7458ab75b9ddd0b49cb318f04de41a38f548d0ee46501e2cf8

  • SHA512

    115af3db98518f2e5e0627b4862e3233bd66e55d410dbaba68fb426520cb9db10694e3f3267f8ca4d66295b70e3bce6cb8c2ffb2300e17017cb54a9714bfa23f

  • SSDEEP

    3072:6OjWuyt0ZHqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPL:6IH9OKofHfHTXQLzgvnzHPowYbvrjD/O

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a16ccbdb6a101efe0225abe2f90fe00_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4a16ccbdb6a101efe0225abe2f90fe00_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3664
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2908
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3096 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4472

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\ctfmen.exe

      Filesize

      4KB

      MD5

      5f1742b30e6833bf3619617e9158f076

      SHA1

      c08118aa646fc31dab5ce6d12a79a30f911a95f6

      SHA256

      582314015c8cd5ce8503d485b977aae85fdd01036e1f5565c60810d2761b6fed

      SHA512

      46a02b3bb13188c93454da3f92476b154430f8dd056f139fa67201f42a2c0a6d3768f1400d55cfcd3dce47f39a2526bc5a0b63883de15197932c1339f5c50b2b

    • C:\Windows\SysWOW64\grcopy.dll

      Filesize

      127KB

      MD5

      4ca5304c750ea0309a5aa5d413108447

      SHA1

      0e200b0d6ef9edeee2332c24be3adb0df1ca3b80

      SHA256

      d988d980b783dde5de908f53cb314de6766b64ec0fd627230d550047766dac33

      SHA512

      e6b4806c6149c0232be3f4746d99272ee34bf97ae028ac1304c5ea6f6c6a1937d1aec2070b485ed08b1fe3dbc672dac88b3deb9f1a0cc2fd0e751cbf23a20d02

    • C:\Windows\SysWOW64\satornas.dll

      Filesize

      183B

      MD5

      16acbe4bbc572386337d251b327beaa7

      SHA1

      7c4a314fa5ffba102b97738389308e2034282484

      SHA256

      f643f76a001a58e4c514239751439109921c84398b435d1b74ab4c46812e259b

      SHA512

      d9bdc689156c7dcda5083fc22d5ad4f2ad03112cbfab9a27586204d2b0ec210849c42ed411197e2c2853a41e26d80f8f04e70186ff867c16267bae34cbd50bbb

    • C:\Windows\SysWOW64\shervans.dll

      Filesize

      8KB

      MD5

      aaed7a7b023837c9d1b991e5d08bbf02

      SHA1

      e5fb53d2b07bae7a19ba7c61e3ebd0a7b830ab0f

      SHA256

      53df3d3371fee63726e02af93ecbb29364f400e091f7cf9521b4cda72266fab9

      SHA512

      177a1ead01ba80d7a5eab20e57306bc04438be98aeba65e657ea51dcac326ecfead2834b089422f468236c1a2169dd5f22e1e0f3180e4fb526db31a2b5cc8f64

    • memory/2908-27-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/2908-41-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/2908-38-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/3664-25-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3664-21-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3700-30-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/3700-31-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/3700-0-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/3700-12-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB