Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 04:47

General

  • Target

    40761e04586d7d32c37733b3b9e060d0_NeikiAnalytics.exe

  • Size

    41KB

  • MD5

    40761e04586d7d32c37733b3b9e060d0

  • SHA1

    e54913f5c548fd3c99e2377bb9b335492bbde8e7

  • SHA256

    3c41ee52bcda16f0fa4b469b6a19430e747b6b4b83999c57d500a10c9a7127d2

  • SHA512

    3004e9c2c4584cb9e907e1383c8c11c656b5022fa17db7964dc735c1c7b370c5039d26210f8f87d676c688a8065cbaa16ceb685706a2686b165cc27252de81a8

  • SSDEEP

    768:seMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09Cy:sq5VwWDjDkdTRqHFOn8tIbbeYiuZIFSz

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40761e04586d7d32c37733b3b9e060d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\40761e04586d7d32c37733b3b9e060d0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 832
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2480

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\satornas.dll

          Filesize

          183B

          MD5

          cd46ab334e65f0fb9bc5b2c98d600f0a

          SHA1

          95e8bf701e52c2c629666b607c6f6e582ff74b7b

          SHA256

          52ec14f5676bd5c5015701b0d5625f538b3cb111bd657022d3c314e54c9d7682

          SHA512

          42515c01ef342460cc8e16e600cbdd6a66a59ff61b34e0abc23878c10e5c313f80faf172b33547d4b47286ef5baf0435407228761cb4813b833c6b1ea0f4e090

        • C:\Windows\SysWOW64\smnss.exe

          Filesize

          41KB

          MD5

          d9c006eb3258ed4ecd6226cf6cd17f51

          SHA1

          a87dd4da68572c97030c521183d67ee30dda8633

          SHA256

          6ce7958a03ba38d182e4376c0659b2de4662548dec25e9f318e1bb37c1ca462d

          SHA512

          db93c453e5fc2a20c6a2659bd915fec123927f51a7e242810a8fb32dd09e9ffa5cb7caa08a79e2d425eecb457f65afad7d9f05acbfb32036d745fb8d66fab632

        • \Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          76771ee1828e001c281c64d78b6e8724

          SHA1

          7143725b5fff1a3645541124353a0d7a1f1dd48c

          SHA256

          d4b0c2556e513dfdeb94ff79cf682daafa09c60b61521b21fd9ea8dde6a59544

          SHA512

          f1adce9e28e3e06cc867c7699279606c103f7ef6a35565090c97b35a7bdea9930fecc38d18ebdfce21ea8b140a8c867de3c1445bd4bd770ee716d350217e4320

        • \Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          11671444b97103f8e3ef9c8f9f133d99

          SHA1

          de6ff057657aca70a14a247afefb4e4d7a167531

          SHA256

          5b8f5b6b0382cec6da9514b736b0fbff7da67d243452a986c87c489a95da4c3d

          SHA512

          8136878748b214601af27cbd59bfc33dd4c6a6a246e141714de30121dc638de8eb86da47781b676f1211e9f4f99285fa79c9c587179904f8f5c819d2346d387d

        • memory/2296-0-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2296-16-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2296-18-0x00000000002D0000-0x00000000002D9000-memory.dmp

          Filesize

          36KB

        • memory/2296-28-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2296-27-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2596-35-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2596-42-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2596-43-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2596-48-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2704-29-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB