Analysis

  • max time kernel
    44s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 22:29

General

  • Target

    103eaa00dd2b113e05e1069e9d760f00_NeikiAnalytics.exe

  • Size

    316KB

  • MD5

    103eaa00dd2b113e05e1069e9d760f00

  • SHA1

    edabf2c1b8cb154f6a4c6ad40b76f410a159c7b3

  • SHA256

    0006ae9bddfa4a5d017ce9b759d6edfd802053dd74f571ce4550b7f804e7d3bf

  • SHA512

    bdf1ab0a1c85d980574e65685e427cce74c38e9d3b4422eff3caf40071146e7dc916f9187065cd50636b4884d5e86331c963e0d65d8cc3767a66f89998ecc8eb

  • SSDEEP

    6144:BIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPysEPArwVe:4KofHfHTXQLzgvnzHPowYbvrjD/L7QP7

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\103eaa00dd2b113e05e1069e9d760f00_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\103eaa00dd2b113e05e1069e9d760f00_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    316KB

    MD5

    8b786168b3e81b1b15843cce4c8b6490

    SHA1

    26c8b27a1936aef648b8d0079805c43a49ede9ab

    SHA256

    985dbd5655301de4f85cf97bced42a74f333f55ee641e8ff91eb6f7d723648a5

    SHA512

    e59894dde1109a5a258191f118fc36def0b169076339c4efe353e345e95057de02a71d0e1d7fa2b3dbbe7ace99b226b094f0fd3b311df6449b63f3ac2b4e3fbc

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    7ef8c1e79be566d1fb3bcf66c7739e32

    SHA1

    ee3405421f92ce68a62e73e1855c3bd1f7761ae9

    SHA256

    2fdc49dcaee9927c7763d20e6473e283ded182f30f56b65b3b175801dd83a8d8

    SHA512

    e1dd0b3c0932f7aedae87296312faadab6c0e59f501f4379e378fe707a37e3832df3e968673db45d4de5012391a8a5cca24d1063bab13cafeceb035dafb7fff5

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    9343b66e0490e5cddd2f12e17a6c7075

    SHA1

    bf508278d7261901995a9feba4ef68decb36d965

    SHA256

    9371fdddc430041fd5e589af21d2683073b19aea20582d647005c293fe7273bd

    SHA512

    a1189e80fe99df82102535b9dde27920aad5e6365c6e6c4c05ef5783d653bf2195e9a0adb76218da508ff4dcf5cbd9b60e8e33693975f854535ecccd8b9514cf

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    37c470705a698e8cbbb3e355d18bd720

    SHA1

    6f5a4d190c8ebfa00ef04f6c9951601302514cdd

    SHA256

    e4591006b26072997d05ec111370296d3256deb8778fa26cbd161661a9ecbdcb

    SHA512

    1f6d729c59c0d753d271af70d932df95b1734eb586c7b7d0d867b563bcd8191282246bfd5fc4bc672a24a03970a3a01fbc1604505d21134025b9b47d131b0642

  • memory/2172-18-0x0000000000320000-0x0000000000329000-memory.dmp

    Filesize

    36KB

  • memory/2172-27-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2172-26-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2172-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2172-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2604-34-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2604-41-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2604-44-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2628-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB