Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/05/2024, 19:33

General

  • Target

    21c60ea553c75baf4fa91b967c2ce120_NeikiAnalytics.exe

  • Size

    119KB

  • MD5

    21c60ea553c75baf4fa91b967c2ce120

  • SHA1

    e0ecece4e25ec0697bad3741313095589c941c36

  • SHA256

    9f4d207573abbfe726fc00f7eda854a319a475b9a19b08971161ebb79c63139e

  • SHA512

    b97a82d5b08185d07c49b9a8ee4c8768e0a24ec33a0f90b867c05318bc3fc42adcea3ca608a034ee95f468b93e0cc853b1ea5a0ae9ae78bea2f2d3c477f32b7d

  • SSDEEP

    3072:5OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:5Is9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21c60ea553c75baf4fa91b967c2ce120_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\21c60ea553c75baf4fa91b967c2ce120_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:5112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    e01ec53e007d8b002a47ac2966af6991

    SHA1

    849da9c96f7b3a967af580ef28dd1ac9beab0b4e

    SHA256

    785682ea59415ef9fe9d16e5b6abbfa3c36029b4e8d89dd4bbeeb24be3f975ba

    SHA512

    8692caec5125d6bb8821f6d37817b47d3dfa039852e5961f95cb1579decbe53c918ea20c6397c5bfe0d9b42d977f34c29e62fb80b342f527fc9fc763d0e8168e

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    119KB

    MD5

    21bb54b22dd394aa6defe79c3373a9c8

    SHA1

    2d7734ee85b7fbd539f27692104a03b7b5e4c49f

    SHA256

    cdd475baa698874ce18594f9ab741d2e8728823f8f1843d6e643d11968bdebb1

    SHA512

    4ad5b187d0b034bdbd762eb5b8be7851a489b1e45389b41a790f65a7779d34c4aec40d90d074ed432d3b2a52c1431dd7ab1041212179a664d9c7456ea0d365ad

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    ba1460b3cd7c33f6d8cf6500da3a7ab6

    SHA1

    c4dce8bd4c54785ace1153a7e3f03ee98a977d1c

    SHA256

    37e59fd5fed55be3cf77cd89293f094b6e61197bfaaa163dc4c6bd5103c6c040

    SHA512

    d101eafc3353038d9db50a37c58b72e286cb76c814b89d0087f70e216a54493d2b985e114e5f69856b020720937497db20f5aaced12a928529a3171bfbd4f878

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    891b4f7366a21fbd0651a9851c166ab5

    SHA1

    4f71225690b1404d9d8ad6cb06b46fc9dd79136e

    SHA256

    33d1a12df1a8d1f07e47cdcbeb4a6f0b33dafcbc98977fb1539d78f8651b77eb

    SHA512

    6b7b8416d1750ff2272b9e1ff5038af3022f49b4b9de9a91afdc5b95f2e8a578df6969252e2696cf86733adc0cd488d163442df5d58031ea223c3245a85603b3

  • memory/1968-24-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1968-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4476-22-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4476-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4476-23-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4476-18-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/5112-30-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/5112-38-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/5112-41-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB