Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 22:14

General

  • Target

    43ce2c26309f1f092297a30f1173b770_NeikiAnalytics.exe

  • Size

    41KB

  • MD5

    43ce2c26309f1f092297a30f1173b770

  • SHA1

    83d4f7fb996b569556a93fa3f1383f564c1138e5

  • SHA256

    c6e677eb3318efd6ae2873cfb29570b512e9d406fbe92c1314ac3f686b6184cf

  • SHA512

    3bada9071226f8b59ea41df7cc8f2332a60c53c498a31b2abd51358a3e88bbb435f9fa7a8bc8d60ae312823b0f838c5765fc75053cf13dedfa9374df9a9ea1aa

  • SSDEEP

    768:eeMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09Cy:eq5VwWDjDkdTRqHFOn8tIbbeYiuZIFSz

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43ce2c26309f1f092297a30f1173b770_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\43ce2c26309f1f092297a30f1173b770_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1808
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    7c239972c0e97449e8363d1e757cd6c0

    SHA1

    7093427d4aab63849cdcdb80b6e97362c75e05a0

    SHA256

    a42e587fe534d1d9c34feb49d36c61e0a03ca65e4abb543495ae0767b50be4e8

    SHA512

    21e9f814f01b446549cdd5a7665eba6e1d39fe27342ff18606abb263e014ecc6e688213a9f34e84ce6132cc7f987153d348ed000d9936a0ccc1b9ea795a1b3a7

  • C:\Windows\SysWOW64\smnss.exe

    Filesize

    41KB

    MD5

    e278b364d331202747c656a87b22f831

    SHA1

    13f9069fa4460a909f2e5e418e1eb7f279665279

    SHA256

    e18d98028edff207f010a5ebc84150367db96d369d0f273052108755ece90a0e

    SHA512

    6de9d9f08bb08eafba9c59bb6d62504a2b6c4c2180209b63aed292bd0fde41d2761d040d12f4aecd639a42e2283f15c15f0f8536bd57ac61ff391901ad650e24

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    7eb46d3ecc04767592020b04e8e15e78

    SHA1

    f67a95a7f890539be1a278fb2dac1da51e42e2bc

    SHA256

    34a0aeb3bcce4f5e842221c8f0e3c597d6a10ac1aa400eda6946cb2d4aeffd1a

    SHA512

    d61187ba22ac4f12e24d5f45986ea57a7d9ab3cf7e99c15f7307f1d9ba26934f08ff20a3b058aa02bd96a035fd8ed917a12697f97177b4a161faf062b5cfe00c

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    cd29fc2b427f23b0a5f992aee9a90901

    SHA1

    f2cbe6b93def527973f3be1931310bebfc3c9c03

    SHA256

    dbba5489b55f931d92652bdb77f249ed14766266543880abdc36a266e8eae604

    SHA512

    07ff8f96b2ae1d7bc4c9086b1d54231dd932ef44b2bc21ae31acb103bc8e990d79313682f10e940ba28ae5ae536f8460d811a453ab38bdb6f08a14e9b0599684

  • memory/1800-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1800-18-0x0000000000350000-0x0000000000359000-memory.dmp

    Filesize

    36KB

  • memory/1800-28-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1800-27-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1800-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1808-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2632-43-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-53-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-45-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-47-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-49-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-51-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-42-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2632-55-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-57-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-59-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-61-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-63-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-65-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-67-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2632-69-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB