Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 16:55

General

  • Target

    3137de807cb2fd299ef193650e21ecc0_NeikiAnalytics.exe

  • Size

    75KB

  • MD5

    3137de807cb2fd299ef193650e21ecc0

  • SHA1

    381beb442aea761d21d3aaff1f78c235b1b93aad

  • SHA256

    f4b026d4a3d130dc765bfbc002f808eb1b6d11d2cc383bf26365425935b40566

  • SHA512

    f89f93fada3a2e9a65d4d0030b171355b77b7b42554536a641b470a8298ac26237e274b3e1dd301842ef823aff35e52eb43b92a96b2330fb4e1cbab3bc7110f5

  • SSDEEP

    1536:Ux1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3s:8OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPE

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3137de807cb2fd299ef193650e21ecc0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3137de807cb2fd299ef193650e21ecc0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:936
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4084
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:3268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    ca12b4b0cd4f0a8af82b4b7f26e95b27

    SHA1

    2e81b9da4a949baffd35f13c314323a29560ea54

    SHA256

    33c9fc0fe2c03b4ab149b4b1803b0f6ca16c867a57b77dbe59cc12d8667d1c31

    SHA512

    fce89367f11e8a5cc66d4255e7f825f88b9a5aaa38fd0d4a2cc18ec4761bd2ceb6a7c70583e9e0b7f37aa5a24e625ece655bede275f68a4bbb6f12a82b0f6a20

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    75KB

    MD5

    759fe0d0473b2cfe7b1399177c11b864

    SHA1

    bde594a7c1ab1c967ec11f96f4225508613d6b43

    SHA256

    f1b43a0d3d82c04deb24eb39c88e991954f72eb10100d2668bf12b4ff72466e5

    SHA512

    335d0032222bb30ebf5706d57f681edd6b54d5814e4c58f0105311639ee68853ef3a51deb27e9f715907f41e4d7d35ec8d57458850bec45e66be5387608acdce

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    d3a9093c08d8ba03993d2e77324ea814

    SHA1

    1aab1ff7a98211b4c2a4573d2a103febfdc9ee1e

    SHA256

    f498fe6e2f5a474743ce169fd77e840e7d33a95acbe6e17eee4833feddec20a4

    SHA512

    47b84680739a026a2ad9231526776d82ba7569afc70801e1cf3e00c294d288fe6c8d2671decc4b3194f1f50dbe00b90dbc2ffdbd6695b8567943449e60e93468

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    b138944a4d877a5aeff815bb0bbcebfa

    SHA1

    005950c6601e5af9df965cb24da4ab616bed0a5a

    SHA256

    bf4ea7d27ed7a9e2114a2f4cc837f54ce0535734fb36b7c6089e575f565c72c1

    SHA512

    08a0d6329283d89e76b4b036f7c000585f443b811b5af855bf9d1249aad2ac24fd6d50e333e7735cec67e12163e6f3b970c538b5fd97207fb6d6d5b0b3ff2bb3

  • memory/936-17-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/936-20-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/936-22-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3268-38-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3268-46-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3268-36-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3268-62-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3268-40-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3268-42-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3268-44-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3268-35-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3268-48-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3268-50-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3268-52-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3268-54-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3268-56-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3268-58-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3268-60-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4084-24-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB