Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 16:26

General

  • Target

    2d9c42e47bc97fbaa36a6f84910fd860_NeikiAnalytics.exe

  • Size

    240KB

  • MD5

    2d9c42e47bc97fbaa36a6f84910fd860

  • SHA1

    2e6b3d03d1c3ef12d5bbf4991adc9ab02cd2960c

  • SHA256

    1f00f8a2dee7a3e882016aede44f6011ab2981d95ecfc7ffc78a8e5bd7f4b804

  • SHA512

    c89b57d69ca3a5474a42f61d83c9d8b057edda25d07f772cf600cffa4a7d16f2d178aedb0163d220c847e167b56ed0bead8c2116303fb1be9cc4cd1e124f29b3

  • SSDEEP

    1536:xq5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9bB:xq5ud9qHFO8Kf3rIIbB

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d9c42e47bc97fbaa36a6f84910fd860_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2d9c42e47bc97fbaa36a6f84910fd860_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    dce50dffcf2e11121ef168abb44b39cb

    SHA1

    4dedd480916ae5be41b407c27fd94389c05081a4

    SHA256

    3d03b5d76a8743ef35003744f77cbfac86f0438cb1c8f9ad42d82db4c473f539

    SHA512

    6a2dd48a2f633d637812a88041812e675bc8540114a5629638c26087cb3054f9f55896ab659633fd0586e26c7433f778e9a62ceed4971feef3d35a4e861fa818

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    ffaf6e7cb5dd55ca6b5300c214ad94b1

    SHA1

    7bf471cf308712626b722bf75b327bf2f19b5109

    SHA256

    3212fb71798dbfc34e1e9ca91a065ab320acf1daeb26e331419d39dd13a0d9df

    SHA512

    7643b5528c956714a7dac0a644b4a46818c78c6c3477b3bca8e3bd3f8d65d315a51a0461840ec7feb23652d9857c42e26eafa5396a0275f4abf2e90657591aeb

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    03de030380bc94c6daea192baed5cbca

    SHA1

    30a1f8ce9a74d6af8033a0df12ada2af97e5db99

    SHA256

    0b0046931ba0da4c68ac839cdb8ee1e4ac91037fb7198db00cfcb932a38ac757

    SHA512

    1361d29d5cd71defa950ffc47975d7f32289daee0324a3f9d46b0a656478ff2d0effcefb81f877ad5b15f06512f66b10ba5d0d86d50bafb8d51f9f8ab2162d08

  • \Windows\SysWOW64\smnss.exe

    Filesize

    240KB

    MD5

    7f3b438c81f89415b3c7c47260b7e9c6

    SHA1

    5c436916c37c143b8b3474575e188c18e7c007ea

    SHA256

    808c289ed63a0f9d5b8f03b7d120e46ae9659c54b5104f6aba0cd5122c1e456c

    SHA512

    564fd4b1b0527f26560c852514b0bf278715e56920c93c0d3ec6a73a8c2020f0c979f4c3e05a779eeebc0996b8ad45e838e4e1e4c5a858de098aa890d65f4870

  • memory/2408-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2408-19-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/2408-27-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2408-28-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2408-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2672-33-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2684-43-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-53-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-35-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-45-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-47-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-49-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-51-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-42-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2684-55-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-57-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-59-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-61-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-63-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-65-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-67-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2684-69-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB