Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-05-2024 20:51

General

  • Target

    30c4779bc83ec52691b894615d149130_NeikiAnalytics.exe

  • Size

    119KB

  • MD5

    30c4779bc83ec52691b894615d149130

  • SHA1

    f2ef22994f859b10618c65cc296d7e7c5c4080d7

  • SHA256

    36388108b901ca356d1fb3e2c06dc0db45c396d94f83a5e4706336cf0066d1ad

  • SHA512

    dcad4ecc17ec1715c9199face0bf0ad591996474dbea178d1843e640964241487897e060ec49ef883f4c7150db5b8e33ef495a9e783323526b9e1bb8cb88b310

  • SSDEEP

    3072:YOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:YIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30c4779bc83ec52691b894615d149130_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\30c4779bc83ec52691b894615d149130_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3092
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    e65a9952576987f40af61d1f23d4104f

    SHA1

    157a0ce7b576b65a23188e69bd4cd5dea8b3ac37

    SHA256

    67804016a39dd29a919ba70076c856b9ae71669eb6363b05591220c945696226

    SHA512

    c381d69243e74c1a7ea0df663c306091a0bc3fde3c4f7a52644bea9cefb5d3f6e08e22c331f0465e38f2e956a4457925053a42b8a2089d2cee3ca2f6aaba1ce8

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    119KB

    MD5

    79647ce5a4d294813baea1436cd96f27

    SHA1

    2e64929791fd9891447b148018c4ae6f22e4bc22

    SHA256

    5e7e454c0e1ef3377dda99fe6c027ecfd99e75708ba9890fe522674cd8067041

    SHA512

    4316e03f40b6148fc2b1a50c70388881040fdcb04d3c2b661f4900969e6c74617416c68f15fca985ed3b0cacd17b2f617a2f60ff445485ce0f5331fcd7001f87

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    ff1b9baacae748c86c4253594a49845c

    SHA1

    fa4d3aa2be916eb2769308f9ae9f5daab27fe92f

    SHA256

    ebeddaf38d52bd29fbcde497172332e41f77f6d67c902b999a21c4fa28690c2e

    SHA512

    ad9da663087327bfb8cf792ea9f494e8ba92f29246937936e019e4514449d02470b47ae03f0a2b3046cfa5a3a246060a56ab8bafa2fb7ebb8692f68ee542aeb9

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    f76468fe91d1ae43cab4ebba673ef816

    SHA1

    872dcf2caded5a4cfa5afbccaabe3d85fa996b59

    SHA256

    987c20640352144dcb03aba905004c5c0ba54e6eb096c82bf55e94c049753f76

    SHA512

    17eebfb22e384475ed76717ce15993bdf72af4cd9a3c1120aaad04bc377e77e434cd72d032af8be5183275c0cf35ad998a7080cc5fc3269db131801db6f828a8

  • memory/2964-23-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2964-22-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2964-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2964-18-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3092-25-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3092-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4976-30-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4976-38-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4976-41-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB