Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 01:12

General

  • Target

    6d9fe33ab93ad8a77776fa3a04b07bc0_NeikiAnalytics.exe

  • Size

    75KB

  • MD5

    6d9fe33ab93ad8a77776fa3a04b07bc0

  • SHA1

    3213f522ac1ae71700a562ee302183e4ca7e7938

  • SHA256

    90aeb0e87cf1bee47aa5db1b710a864420f442d21d929803cdf96213776aaa76

  • SHA512

    1823d2d4e31615ac09a7dfb62e8845c415bf3e5fca02b88e9338e49ce2232c61bddaeeeffdc842494ca16024d66f6e724bb0afdbb8b6c60afa7e4ba8b0e55ab3

  • SSDEEP

    1536:ox1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3s:AOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPE

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d9fe33ab93ad8a77776fa3a04b07bc0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6d9fe33ab93ad8a77776fa3a04b07bc0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    2da709c2830d620f35d7e4bdb50eb05a

    SHA1

    ababf10a00605aba9eafad726aa29d6853310dcb

    SHA256

    46f55c9f6efd67558e1ac94461d4688013a8c09a3453ff023f86e3bd83bc6563

    SHA512

    895e854d5f9566a0b7865b90f7dea7b01126f25ed0ab65d50e1ecc695db5941b3b8f9ff05f7a919c849b7e594688a7b683af165c302861e2f065d799ca269689

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    94f4d0e8ed29ec7501c5d366c55e31e6

    SHA1

    544111ddac6412ff21366b803301bcaf81f6e94f

    SHA256

    0cda4d2323d9b5114f607935b8c4787a6bc8744caa63896b86120995eb5e90d2

    SHA512

    a5da54e901a8f52ca01cde34fe7ed7d9700d09f6c35c69e9ef024dfbe9a12b75a0c475e4ebf12c4aab19ce6298780f172952e4f076f2fd18c0a4418f97f88375

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    411a487ec4f06649fb3bc688668c470d

    SHA1

    03f107ed1e1c18035e620d78c0b8fe9f21f918e6

    SHA256

    8e93bbcc68c9ce578f778ed787bb12711486c141f36999748c421b1998a792f6

    SHA512

    33a247a2fa563ca37bc3d8130174c1c0ec0c155acd3a7c240d6d59142aa21cd41ae2644f40a01999957dfeed1769e3d2a060b659b50eb4cebdb5f46f572892fd

  • \Windows\SysWOW64\smnss.exe

    Filesize

    75KB

    MD5

    2330094172d011126de5d57347427963

    SHA1

    927a88fb8afb379c64ea54e213f1c92b06c28a1d

    SHA256

    8d871e3a06973fd99875c7e122844bb3f67149e57f13b6cb88d57134f33b542e

    SHA512

    13c180ec4c2833d191767979bcd68dfc605aba2418e9824df06381336ad063d4f84185be9c86c8f7d1d0be5198adfeef181ac2b03f4d9a58fcab7c7b3da0641b

  • memory/2204-15-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2204-17-0x0000000000420000-0x0000000000429000-memory.dmp

    Filesize

    36KB

  • memory/2204-24-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2204-26-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2504-27-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2584-44-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2584-52-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2584-42-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2584-39-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2584-46-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2584-48-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2584-50-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2584-40-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2584-54-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2584-56-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2584-58-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2584-60-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2584-62-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2584-64-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2584-66-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB