Analysis

  • max time kernel
    146s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 19:20

General

  • Target

    103eaa00dd2b113e05e1069e9d760f00_NeikiAnalytics.exe

  • Size

    316KB

  • MD5

    103eaa00dd2b113e05e1069e9d760f00

  • SHA1

    edabf2c1b8cb154f6a4c6ad40b76f410a159c7b3

  • SHA256

    0006ae9bddfa4a5d017ce9b759d6edfd802053dd74f571ce4550b7f804e7d3bf

  • SHA512

    bdf1ab0a1c85d980574e65685e427cce74c38e9d3b4422eff3caf40071146e7dc916f9187065cd50636b4884d5e86331c963e0d65d8cc3767a66f89998ecc8eb

  • SSDEEP

    6144:BIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPysEPArwVe:4KofHfHTXQLzgvnzHPowYbvrjD/L7QP7

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\103eaa00dd2b113e05e1069e9d760f00_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\103eaa00dd2b113e05e1069e9d760f00_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2692

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\satornas.dll

          Filesize

          183B

          MD5

          a3f094606c63de4ecbff5734ddfc394c

          SHA1

          3c3d6e9aa7a1ff9c64f6a78d3a05e5ff98fc5443

          SHA256

          a7fd84f2263bc7f88ee6324c103efb971d43746f4a8595a142f27b55face53f8

          SHA512

          630ee0ad13725215707acef6cafb2a3408a312b3f196d318a560a2f6b308c3974cd329c836ff099f467733149d335507ee18499e859f475a2a57c8c78b8cb857

        • \Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          9a7904f636971cbc5fc727dc9ac772ec

          SHA1

          fe334cae407267075b0322477ddfa9f2e5798d43

          SHA256

          addc16f151126e33babcd9880654e8215770656abb1809a5051aa7afd8f8c3b0

          SHA512

          588c9da919c3d14829dd5f612d913b7e6543f337b0de49040896c7cb88286719051f526a5e931ac2a328121e0946b83951daa1091e3375d1614af411c6006fd6

        • \Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          32b673560db2af995b449aa051a45a2f

          SHA1

          39df6a9808918506d26659660e13c88c8be1cac4

          SHA256

          8831d7119c7e4e6976c0a30b6bafcfd6b90145aaacf039229739cf4217a1d894

          SHA512

          a0fdd2697cfa5e49ed84b5cdf70d94b4d180046d2a5dc63595b6550f2d22a8bc11a122c034df187119af76070dc331fe9e63a798091cdcd403fc6b85f573c5ee

        • \Windows\SysWOW64\smnss.exe

          Filesize

          316KB

          MD5

          38f3c269f46897b0ecaf1e0ef42c887d

          SHA1

          4d4ae11c83c18a14061a1793242019a3e0d957bc

          SHA256

          921bd4105f43da930777cce6d557188ba5cc0573e0ffa58bd09f062d41bde3f0

          SHA512

          130aff55e6f8bee54f16b2fc90e1a1d1711091fc17180800450fc4b1e45e72ad3cb52458cb1819c2cf5233cccf8f3f96d38cc636718ae6715a2aa67d139dc18d

        • memory/1948-25-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1948-26-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/1948-0-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1948-18-0x0000000000340000-0x0000000000349000-memory.dmp

          Filesize

          36KB

        • memory/1948-16-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2540-29-0x00000000002B0000-0x00000000002D0000-memory.dmp

          Filesize

          128KB

        • memory/2540-34-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2692-37-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2692-42-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2692-45-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB