Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 21:51

General

  • Target

    3ee5820fe4a5756b0e52e18548897d50_NeikiAnalytics.exe

  • Size

    70KB

  • MD5

    3ee5820fe4a5756b0e52e18548897d50

  • SHA1

    64a3def91c56b7b40af3c1a9daebd6b819e12d47

  • SHA256

    362e7ee1a606ce8bb98cfab283a5ceaeb63674723382f0f4b607fb3fb5674788

  • SHA512

    12973030a4eb264bd16020461ae689e0e39df3a4ed1d4a6e109cb0c482fbb8059f2467360b2124d60110b7e64103d241cfeb5ee67f7e362d208206b0f26e492b

  • SSDEEP

    1536:pq5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9b1YTjipvF2a:pq5ud9qHFO8Kf3rIIb1YvQd2a

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ee5820fe4a5756b0e52e18548897d50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3ee5820fe4a5756b0e52e18548897d50_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    2b20b236db0090427a504576ee855f5c

    SHA1

    a9ef747abd3d6c732da988c394da51ff9ffb99e9

    SHA256

    4cbcae5f2f86e85ea4a960cac9573a849b232f8aa2826216fea984f40f377f5b

    SHA512

    d79ff0a42b85a6018416475028ac5b5c93701f2e5a612c127718259358a8ea5ecd925a78554e2bcd76174b8f4dd9ccac2d23872024517a7a3c7848d75a725edb

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    c722f47ebfcdbc682be686d21f46fb7b

    SHA1

    4703b59f3956c912f41dd997875b720845af6031

    SHA256

    c9f771fb3d917c3a3d39fe67fa1ba4176f64a19dea7d106b27cd65d62b8939fe

    SHA512

    6a7061d13a45a060339b635c08ad9031db8d90a1ea13b0209038178b85b5ca85ed0a6fcc658c0b80dd17c9b7b7018aefb7f6d46d1305d9e77970e4c7b8fb273a

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    f2cdd0bf9c361379be9cbbb78d9d34c2

    SHA1

    086f6213bd820a17482b362b60ae347b42d40dea

    SHA256

    79b9b82bc9cf69658fc6c4f86becdc8b150f30039b9e11b9a84bce78a3b19505

    SHA512

    89eba4d305f11b872cdf7df91a3f4a3618b82f141b1828a4c0a349922edec16f0370ed28be9d1ad215cf33cc5c7c6c14065b7d9b69b404a2704118dc7859043d

  • \Windows\SysWOW64\smnss.exe

    Filesize

    70KB

    MD5

    68194107780052a6847811e2263fd4f9

    SHA1

    9c4558d0480d83a467a8517087906415243f1236

    SHA256

    51f5ab3b274c4915233ae587a144a57363bd91ee11729573cc186aa9402114a6

    SHA512

    722102575ef9bdf367d0c0b7cc0a9d3c5288d159fa3b289db664c5fe2f0e9af846ecf32aa78a58ef56a1cf1c8bcb7721a9237c0d438d677b16726ef98a17836c

  • memory/1044-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1044-26-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1044-25-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1044-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-54-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-52-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-70-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-68-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-43-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2608-44-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-46-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-48-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-50-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-36-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-66-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-56-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-58-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-60-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-62-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2608-64-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2724-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2724-30-0x00000000002B0000-0x00000000002CF000-memory.dmp

    Filesize

    124KB

  • memory/2724-35-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB