Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20-05-2024 00:32

General

  • Target

    6ed460803891b985edd871c21ab919f0_NeikiAnalytics.exe

  • Size

    75KB

  • MD5

    6ed460803891b985edd871c21ab919f0

  • SHA1

    351b50838095b158551f0a9e71ac33c95b974f38

  • SHA256

    6c48daef8bfbfa2250effd2e5c3d15ae1196de2d8acc491e6dcecd180235bd06

  • SHA512

    c504278b6dd7b02cb16f3cfeae484c7fc1184a8ff8f7c65626e0211aa76c27911153db2397d2bed773f0bcc766e12ad77209610413fd8f57abcba67273eda36c

  • SSDEEP

    1536:ix1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3s:COjWuyt0ZsqsXOKofHfHTXQLzgvnzHPE

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ed460803891b985edd871c21ab919f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6ed460803891b985edd871c21ab919f0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    d8c242c226d2e3e368049fe8c4f02877

    SHA1

    f79314b8bbd543b2bbbf865e3c78e2abab290a6d

    SHA256

    c00225da1a2cf51beec74ae065924bc387f378bedcd314d522f9e10bb5f48ead

    SHA512

    0cc66d54dc86a42aa4ab1db2c2088dbf51639d2c65aa08f8462dd5719a6a45f3144fa334347178907cdbe6cb06b547d760f5fd3761f195338f99ffdba2ab0fd8

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    350c852e518735cdee3dc8f79704a7ce

    SHA1

    204ca384b479efba51b205db38978f50dfe09b56

    SHA256

    66615c4d6627082b195af50354a513e6b07353fa36170601f89d089e835789b0

    SHA512

    bce6110fa2c342dd82d291a56369864f5b127101ec5b9988724aca1842ecc2515fb4acad817aea0798a6af3d5c5c6489679e0908596d07792ecb5aa31d93f67e

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    fc48aa401ee5eb6125a16093817ab624

    SHA1

    bbe8d4bea1685cfb11fc6be72100659ff17277f6

    SHA256

    6cd11fb011345abc9853398bafa48eec9398642e2c442f8d69920d5af2c5b20b

    SHA512

    dec0b78b338007eea17f48c928630ab37e9b3bd81e05d46699fa0d77ee983c72ba4f11c9fe57c7d9fcb0ba3f3efe6b6b76ab110d53d8b80c18077ad6fde8f383

  • \Windows\SysWOW64\smnss.exe

    Filesize

    75KB

    MD5

    43e68120f717fad62d7a0cf62326862a

    SHA1

    addfe9a61f4e78a05b7937417e0403147262c405

    SHA256

    da92aef23304124786eaf51ff647f75e4fa6891fda93085d28e3cbdcf82df628

    SHA512

    64b66bc175ae6110f48ce084356d4711e7b20265dfa0891d5f54e3a30bc9f83d97d17ec5ee82d3bac8bf33386d1db0850901259a279a7c6d2b7d4dbe593da69c

  • memory/1620-27-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1620-33-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2364-15-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2364-17-0x00000000003C0000-0x00000000003C9000-memory.dmp

    Filesize

    36KB

  • memory/2364-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2364-23-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2616-43-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2616-53-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2616-40-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2616-45-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2616-47-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2616-49-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2616-51-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2616-41-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2616-55-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2616-57-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2616-59-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2616-61-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2616-63-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2616-65-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2616-67-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB