Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 19:59

General

  • Target

    4f0906512703644402e445341dca8a90_NeikiAnalytics.exe

  • Size

    127KB

  • MD5

    4f0906512703644402e445341dca8a90

  • SHA1

    becf5dca2c05f57e0e6b7921002b13b990c9f7f0

  • SHA256

    e95c71d80548efeb8f03c2dcc269167075c52156747b3b14a7300a88fcf7c8f2

  • SHA512

    e4f9cf00b39b98df09a542ee1dde2d5f35bc406121b17df69a2d2c44e71d7f8f4f85d8ee78f60193caea8d65859f9ad35568c09f3eaa5c1277ad61a2cf6e1dc6

  • SSDEEP

    3072:vOjWuyt0ZHqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPL:vIH9OKofHfHTXQLzgvnzHPowYbvrjD/O

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f0906512703644402e445341dca8a90_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4f0906512703644402e445341dca8a90_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4608
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:3932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    13eecf16b2d3702fdd33508293c0e47f

    SHA1

    bb8d15e95e724919f18192f22278a562ccbf76ae

    SHA256

    7aaa4e169b09febcad32bf03964d3d5472d5a81c6257dd48c866248ac760376e

    SHA512

    19210c1dedb2afe0e0f59d46ee8b95e6b6e2e0c5beedb9aa995abda457a6b61dfa30ea0be2b38b40d5ec6f15085080b30220af815d1a58277030ca10231cdbc3

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    127KB

    MD5

    d28c1f3f8f5bf4165e0fa40b36170996

    SHA1

    a4c5dd04506d51ea56a731660a71709313faee6b

    SHA256

    1ad4b265dd50d3127a746d1afd8c7218a3fde61414d2ba650d06422d837a8e6b

    SHA512

    67925f2db9f6f46439c5120f4eb27def5107ec97a1d4a13ef37514767e1b11113e5d68136f7ed1084909aa3c955491213a8d7140cc84964f6578059bd6890c31

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    da2bcf5cdcff849b648d8c8705d36ba9

    SHA1

    8cac43912469bf2d0bf7a4f01e32d1cf692c1e5b

    SHA256

    30bce5c90992ac047d472723bb7ce194f25f6c38464b6de6de0c40442549df17

    SHA512

    ba641ac53569e7c2ff3116344b2e0852eaa97597af90637cbc28a1a210e6abaa67b66c4b7e77cecdce6cfb5285c1bc3c930ca7278150d220e037f0b19d66bf83

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    74cd4e919152287280b9f7c58c7745a2

    SHA1

    47f94cfda6fe6e71cdf0fa007bee7f5865dc08dd

    SHA256

    799f654271a8454784bfcc8a1210cb1482d212ed673d1ec516ce43b6fc759e64

    SHA512

    bad00fff2b77d1659e441aa17490206e54e7746e6cccebcc1e7413bc6e5e293300bb1b91814ea75999210f39ccd2cc95e3d27d41a661fbc3ea684bfef27fe07a

  • memory/3448-22-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3448-23-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3448-0-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3448-18-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3932-32-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3932-38-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3932-41-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/4608-25-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4608-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB