Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 04:26

General

  • Target

    778daa43bfe924ff8231b87c133a3f40_NeikiAnalytics.exe

  • Size

    352KB

  • MD5

    778daa43bfe924ff8231b87c133a3f40

  • SHA1

    d8e7d428f8c68c6e19e54875883197843e4f5853

  • SHA256

    02ada37b24aa81c8f6af56a6ac490ad2f3acad1372fefac7d5c4094a73cb9018

  • SHA512

    0c1518cc2cc0c08bd95599947efc5628a1f07326e3b0a7f3d28d4c6a3a15a8e15423a40c73d8b966f3d6ede8046a8d9e60318c3c40ad1680bd43d2240b3fa344

  • SSDEEP

    6144:6Is9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCe8i:3KofHfHTXQLzgvnzHPowYbvrjD/L7QPs

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\778daa43bfe924ff8231b87c133a3f40_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\778daa43bfe924ff8231b87c133a3f40_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3264
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:3996
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3720 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3920

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\ctfmen.exe

      Filesize

      4KB

      MD5

      9bcdb29e25a144ea165bd84f27cf42f0

      SHA1

      d4da61cd97d3d1d0f1dd5c0ac47daa079a8907ba

      SHA256

      a6adf228b7b5ba35c21036aff076cda307f36533eab914630e2910bdda138a9d

      SHA512

      8044435648d0e0c4db28b02dbc3da9ac5f7b4e26381f64c3a301031766d6910a173cdb1e5f9d6847f78dfb8a1147a69c8990f7eeae94151570a57fe3ac293eea

    • C:\Windows\SysWOW64\grcopy.dll

      Filesize

      352KB

      MD5

      8c61834c4d28bb964dcebb184af51f5d

      SHA1

      95683d8560bc0ec01fb648764b4cdbeba05ef08b

      SHA256

      a074d06ea32b57932da1c66b15f5738e71aa694c48e818e7f6e0e557e35a5d5e

      SHA512

      6222531101c5a9d66f5e9f61a99cc066c08e7df8f8451d2f94ed758be0da03cc111e3f3ccfe0bab2e3f92010aecb3dac9079f14261a194b46e8437356a50e296

    • C:\Windows\SysWOW64\satornas.dll

      Filesize

      183B

      MD5

      09c6369c856d714024fc527aa612e3b4

      SHA1

      c377fb604a09f457bb9eddd9370c77256d10b4e1

      SHA256

      1cac71585794a9160a2a3c05fa867843836d2724b95847643e6f02bfe66b0d54

      SHA512

      bbc02b469ab5cdc34236bc0ab37f997d1853f77d1016362f34100d610582e208ebd53b5731d90cb9a7d222f912431b29b3c76cdb14d64658153288536416b04b

    • C:\Windows\SysWOW64\shervans.dll

      Filesize

      8KB

      MD5

      0e3d54d624f3dc9ad247a30d6b6354f0

      SHA1

      d419ecb74711149a92fd23c7ffef5fddb5c42e8a

      SHA256

      16a4dc836ccc55979b2d434d9f30a4d0c1095af176ded432340082f67ec7feae

      SHA512

      ab4ead795320414f7518f24e675938aea0cf25306987bdba4cc481a5f10029d4bbd3a188c37e08c13ac3e2a7b13a58ea8d43acb9abbbc8a673d4bc87c14606cd

    • memory/2628-28-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2628-21-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3264-23-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/3264-24-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/3264-0-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/3264-12-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/3996-29-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/3996-37-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/3996-40-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB