Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/05/2024, 20:10

General

  • Target

    a9ce2dec6708302a68de0db61b070b50_NeikiAnalytics.exe

  • Size

    75KB

  • MD5

    a9ce2dec6708302a68de0db61b070b50

  • SHA1

    6ab4c1f29c7b80f298eb6eab5d9507dbdad154f9

  • SHA256

    709fb7c89cc95255f8465e6b22cccdd2f5416d6d905389d393dc3e986e628a2d

  • SHA512

    5c1a7091634a61f8c953bddac1babe29ccf1af02f89776a493fde735b84165990d0aad7bdc1a4e8daba2bb59786808b6a62237d3126bdabd1bfcd14bfe5d850e

  • SSDEEP

    1536:4x1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3s:wOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPE

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9ce2dec6708302a68de0db61b070b50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a9ce2dec6708302a68de0db61b070b50_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4848
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 1552
          4⤵
          • Program crash
          PID:3808
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4848 -ip 4848
    1⤵
      PID:1908

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\ctfmen.exe

            Filesize

            4KB

            MD5

            bb4186175bb0ed34fc475c14d455aefc

            SHA1

            be1f1296a0c2bd7f2ccdaea8e076ee2da264503c

            SHA256

            3aa3578a82fcee1b6519dd7cbdc73d9b0835cd98a24792d0743f8967307e322a

            SHA512

            6666afe329b1822e5f7e8f5557326dedfc89356c9f7ed501a99243780761c3ca3e1b577cb8aec3f66e4bc322482b682eaf48aa6fc72115a24a59131bbe3de3e3

          • C:\Windows\SysWOW64\grcopy.dll

            Filesize

            75KB

            MD5

            86f62b8bcad3d3ff4cba6c83879933f9

            SHA1

            4880e2b5bd30046c6acf91128745560c1277952c

            SHA256

            e8fa745b7e87333844fca8f22d40a17aa47e112017e7fdd21e6cc1593a7cc410

            SHA512

            4d6cb257c9f3c89dec70839160731eaf55dd50b26b7ac9037a3fe875237dc0f0cd678d3767467446da3ac66ddd51243f8ee7fa18301d6db00c4665a71b4f14cf

          • C:\Windows\SysWOW64\satornas.dll

            Filesize

            183B

            MD5

            4054acce3ad7c335533ac25448099051

            SHA1

            350be03491901ebbca254a59848956e89169938a

            SHA256

            8d319f8a7906c3b87346d985003273d7ffe4249ae5b6755861a456f45a728ed7

            SHA512

            972a9b5401f9edcb1d166b11133b707424282f2574a92dd7afe1cfc17ffe1fcb5c2653275d8479ca33686fda4a171d09733cd4a93464c809a7313e81fec70790

          • C:\Windows\SysWOW64\shervans.dll

            Filesize

            8KB

            MD5

            ce2374cc2ee6483907f74e111385baaa

            SHA1

            d7ffeb4b05abf7fb65b6e98336ffa1c8cafcee97

            SHA256

            922a2994929cadc46841b00f2a333011e60d776f32e5150120dc1786fb7ed6c8

            SHA512

            a350730632ef7572edb685c0cd46f02dc827b6c41215656cdb68437ad0d6e6e77bb5e322524a4eaf6cc9489a51e64ab8ebb2a7066ee3c64d65817f9c5e4ce42e

          • memory/2668-17-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB

          • memory/2668-21-0x0000000000400000-0x000000000041C000-memory.dmp

            Filesize

            112KB

          • memory/2668-24-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB

          • memory/4848-35-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB

          • memory/4848-37-0x0000000000400000-0x000000000041C000-memory.dmp

            Filesize

            112KB

          • memory/4848-39-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB

          • memory/5052-20-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/5052-27-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB