Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 01:25

General

  • Target

    782968528cc13299b7a6bdb4adb2be30_NeikiAnalytics.exe

  • Size

    41KB

  • MD5

    782968528cc13299b7a6bdb4adb2be30

  • SHA1

    1187ded8fc262ca6cdc24e75f86f9f2711eb8a66

  • SHA256

    387d9356016fb583f80d29ac80e690ea16d20c72527a98cf47fb3dc0b99aba7d

  • SHA512

    6e551187ccb795a2fd07962225f9b52f80d0069999d63f3c41d077d99ebc8a7366a8b8921258d7c6ce0324acba018996aecf0986b05a0b32117f520ab71a5940

  • SSDEEP

    768:UeMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09sy:Uq5VwWDjDkdTRqHFOn8tIbbeYiuZIFSl

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\782968528cc13299b7a6bdb4adb2be30_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\782968528cc13299b7a6bdb4adb2be30_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2648

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\satornas.dll

          Filesize

          183B

          MD5

          3b1b336883271cad704a1c1f38d1f7b6

          SHA1

          aa5e927cc2957276b77806612a31eb413d644c52

          SHA256

          ac53939f3fa9d947966d73e809843d2030c044a0665fd36b8359297f8a16dd41

          SHA512

          7432faf6a96631b8e8380688951a12388f5786509b9393de903c9f2840e2b218c312c57a9ba3a3df5ca26398f79024b1e4eb31ad8eea73c30fe8b5993b64b91a

        • \Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          4d445985aa293cc99c743f0b06f38e61

          SHA1

          739cb0ca8ae5f9cd5ebdbb0a364f58f855a5a796

          SHA256

          ecd1539111c73c10c975c281b597610e63e648a70a0d7ec053bc7b5030492089

          SHA512

          5acd9858cbd1fad8c2ee742857c8112b08d14ed66dd2303c80295c761d64bcafe73e86f433fa9ec097e0a51aa5d086a5c7970690a1152a9652c85c1f56b1b681

        • \Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          6c92a70bd42613d178fb3f8d0c6565a9

          SHA1

          77517eb2cf8d88e51f230ed53d3bf0b58ccf4502

          SHA256

          deab7b357d2408baa3bc143fe4265ce0893e82cf16164d24bc19478fe3e3ffd9

          SHA512

          ce77e88bcbe97051ca7a652e151d885c094289aef8deb10071c5ae506302f9abec45884e9e5a65459f85de3c6e54f44b83419d02980bdce8c1c4b1c11bfb052b

        • \Windows\SysWOW64\smnss.exe

          Filesize

          41KB

          MD5

          537ca93f24a18fa95daa2d35b413547c

          SHA1

          f9e70f11a1100ab9da60eca98d1296a274f7d977

          SHA256

          1233e6b25a6cb9f57eccfffd4292aecbdafdf73b394e37df041642b024f9229c

          SHA512

          4c6f149213e92efba5aed6a5ad6e1f192a89181a0fa17c6ceca205166066ab3f7c3c8e6b714c783436b0dd0411087e8a1cb45ba0ee0f0cb169ac9b650ddcf4d7

        • memory/544-29-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/624-16-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/624-19-0x00000000003C0000-0x00000000003C9000-memory.dmp

          Filesize

          36KB

        • memory/624-28-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/624-27-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/624-0-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-43-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-53-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-35-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-45-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-47-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-49-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-51-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-42-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2648-55-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-57-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-59-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-61-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-63-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-65-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-67-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2648-69-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB