Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 21:41

General

  • Target

    2e000872579b6dc89589b6b83075e850_NeikiAnalytics.exe

  • Size

    70KB

  • MD5

    2e000872579b6dc89589b6b83075e850

  • SHA1

    7702dca68ebbafbde695ff56ca2d5b669cdaa21a

  • SHA256

    231c45af1ea83f3e350187bb4a18915de2467df49f4e1477df798a827d5e8640

  • SHA512

    461ab8bc9cc1904932cf5c1ac300825e9ea04114589c07f8ad02b639eb2c46f198510bead9a57f84bf374ea08cedd363b4310da2d7ab55ce512ff121879f5720

  • SSDEEP

    1536:kq5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9b1YTjipvF2a:kq5ud9qHFO8Kf3rIIb1YvQd2a

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e000872579b6dc89589b6b83075e850_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2e000872579b6dc89589b6b83075e850_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    62847fb84141da922275eb7abe4f8bcd

    SHA1

    b8c9c09d0be2ecab9a57ed4525b3222929a60e43

    SHA256

    3248cb690a242d61783ae329d92628976142a628e9a25b28e075d22cd0aa8894

    SHA512

    a73d48cc4d1248a1d646ab45c1890dacd3ecc574bc36fe2a4ca355296c45bf80af88cab770871602a500c3717d6337feec11e3c0b124a9e89965622b6ddabd0e

  • C:\Windows\SysWOW64\smnss.exe

    Filesize

    70KB

    MD5

    fe48036a268b088cf7f0cfe3aec6d06d

    SHA1

    b57ab23df19d8c6e6d0c7f0dcee9ba795c53fb04

    SHA256

    b118b36ea747c009aeee4a68c6834d044aaee56ad3021770901f8b51c7c1137b

    SHA512

    91edb31ef14f8b3fdc688ddf6527d6b3597150649aef89e5f3e3272350a53b5bb671d722a1b6eb78ff52bbbcefc00755d510f0ddf9ebb5b732da93996a224c26

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    162cc5282ea41a79020775cb948d106a

    SHA1

    2963b130c4f5c8ca5c896aa2f88110a71b399d1b

    SHA256

    cea74aa3f004bf12faf8ebb2a36ede07376ef4c0db39d69f522b1858a9ab985c

    SHA512

    4b53e38de8d1c0af8a39be0f998be548518f17a9804f5d111c286382e1633b4cdd87097718d2687c653c7dee49101281e44f9907dc8b22bd0165057f1291eecd

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    130099ce5bf38af97d0d09f953acb2eb

    SHA1

    93f1b78252bc55f75b426f23e246870cbb11ba1e

    SHA256

    1a0fea7b86a195f77cad1ef4d1f5672993fcd357aff0ea5f2c34e046e4d90223

    SHA512

    461632835aaaf9d1c5b4ca5165d31f213638b4e62b10e0987ed7c29e8df41a59c1f598f0de435d65241fb127700399f5ed39719f8266d334fe657d4abfaa62a9

  • memory/2080-14-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2080-18-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/2080-28-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2080-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2080-27-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2544-57-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2544-51-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2544-42-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2544-43-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2544-45-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2544-47-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2544-49-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2544-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2544-53-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2544-69-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2544-59-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2544-61-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2544-63-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2544-65-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2544-67-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2564-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB