Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 15:01

General

  • Target

    21a8c11bceca7f899dff4023783d4b50_NeikiAnalytics.exe

  • Size

    239KB

  • MD5

    21a8c11bceca7f899dff4023783d4b50

  • SHA1

    ad5c89eafe80bb8a3889329933cc08cb75a58b4a

  • SHA256

    1d0c64a5fc860798c6dc893c24c216b9f61bf17e4ec520f8fa345a9b918a27de

  • SHA512

    ca6e51893eabe4ab7ae33f35736f4ad40ba94085dbd2b2132f9bb1df984173cdf2624c139dd35160313b98ec04118358ff2a3f83765f6c1c5671c746ebf25987

  • SSDEEP

    1536:Kq5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9bc:Kq5ud9qHFO8Kf3rIIbc

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21a8c11bceca7f899dff4023783d4b50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\21a8c11bceca7f899dff4023783d4b50_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 832
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    4997272090d9364e7832443a8c7406d5

    SHA1

    f36a07fe53c1c4d1ff7faa2e450a05d6c5e85eb9

    SHA256

    440fef5f27f6217f8a36dd776310734d85aaa3de40876676842c2731af7863a7

    SHA512

    b75ab160ca023a09e1969aa520816be0b59223455112498281567a1e5b39a42b1001d79bc5bc1f2c0ee7732a9be6273e4d7ce7b436b6247d03e768f0a1148192

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    5b8a235f0a107642e475d74a382fa2fa

    SHA1

    d4877516f34dd0560a68a411a50d71481b71a900

    SHA256

    9f1bae6b4bbb62e05b0f408b3792b2b36393b7423fd035d72eb428858c0ad68d

    SHA512

    ad12110e50630a0d672afc5cbfdccc02b3f7c89358fd5833fcdcfcb151857c82df9b18c0f9d624f47ada30640950fbf2fdf952cab42831ddec7336b5b8bbab2b

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    df4613fe7896796b8b6496b43296cff4

    SHA1

    8e243a0304377ed39db4309db269af1101f15074

    SHA256

    7ee8f276cff3d422669ff200b3cf562fd011e0c85c7c73ef159b0eb527ef7cbf

    SHA512

    5d0f8e11fc39f2230d63a9b5ad8474e1088a4ea3132a5a0812f5d2424485e655a9d01cd90d1f78e42393890d6642ade1cf28b82fd6be6e35868a435e9cf862c0

  • \Windows\SysWOW64\smnss.exe

    Filesize

    239KB

    MD5

    35ad31f13ed1fea6992cf89bc9209e65

    SHA1

    6d1004df53abbacc55cf5a529ea05e5d59a30090

    SHA256

    54d1bfb40431d02f1acddfcb2576b1d62e5c1fc60851454762f6730eb2782366

    SHA512

    e3f2cb51a5769b7622014601a92b0345904f3e4272df14f8cd42ddfde609a5704ff45dac1ead7839371dcd24e22d331ac1724f0d46a480795eb632122372a139

  • memory/2140-26-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2140-27-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2140-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2140-18-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/2140-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2664-36-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2664-43-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2664-47-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2992-30-0x00000000003A0000-0x00000000003C0000-memory.dmp

    Filesize

    128KB

  • memory/2992-35-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB