Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 13:01

General

  • Target

    652e5c5ca83720cd9fb6902890af7af8776145352e4a9afa13e95a4161d07db8_NeikiAnalytics.exe

  • Size

    119KB

  • MD5

    1cd3aadd971541f7a5dcb5c714e4e0d0

  • SHA1

    135ed42948dd10a56f535218f6dabe5095d92bb3

  • SHA256

    652e5c5ca83720cd9fb6902890af7af8776145352e4a9afa13e95a4161d07db8

  • SHA512

    7f036f8a914ad45527de1c9ba6194fed2bb93a103a399dbd287ae68fb2bfd3127174fd7cf1f54179166cb207076e8870be8f023b035d76e94760ba27e5c999c1

  • SSDEEP

    3072:8OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:8Is9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\652e5c5ca83720cd9fb6902890af7af8776145352e4a9afa13e95a4161d07db8_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\652e5c5ca83720cd9fb6902890af7af8776145352e4a9afa13e95a4161d07db8_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1372
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    957f0b9d4f4261a197210017110bb0bf

    SHA1

    04f971d2a244b2a0c0dbc40b34287c793b9653ee

    SHA256

    aba10e27e413bcfb453df9d47eb814df620df89c9ee5fd8cade3e231e1efe34b

    SHA512

    3d3d112f0ff4fb548dac03b7be1070af3fe913504f7cbdd99f1948de341aa1c0765a2ad95921abdb4d68c50c7dfb36b68699c538584f506793237a2d0fc4d7f5

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    119KB

    MD5

    9de78788afdbc63334f8a07c7b3da18f

    SHA1

    1c502bac2315afb884ca5ac1f679e57815543a10

    SHA256

    aaca0c4e93d2074747f0112814cd4949d77482bde2a1164df941d515d36a2f63

    SHA512

    f2ccb3c58c76ceded2ef9f8b1f0d1c82635147dac6d3e1c9b73e63e8af9422c1babec0b31497b6eb34b093e410e7f628a23fb46423c38c38203573817bba499c

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    925463e7eafc9d5e4af5a3349673f9ff

    SHA1

    212c59139d059d7b32a35044b87aa6926471966e

    SHA256

    7a75236082d3a696521d6d49c100e03d8f8cbb878c73d48ba36e67bd95bae6a8

    SHA512

    ce33d8109b19dfd2f6ea1d228cba45775ec151ada1e045ce16e0dfe5422ed484cce234b40dccbad3766605f9974529f19c459766a2a05ec01e8d3ca2fbb3d7a3

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    a6f29e1896a2991c0f3f6bc30f599f14

    SHA1

    c0a442f289553b513985e4f9e1891b5ccead1ac3

    SHA256

    96fb2534c3581f72f40c2c623ffe2af93c2b146fd6b5e885da9aa71f08f8d497

    SHA512

    632951d48595a7a1a7e4cd429a2d24dd8d556c32f42e2a2dd1a9e62c2ce68dce2ddba3b0afaf8f3029da168bdf7cc6ac281fa6e0be70ea16d5c536fad83537d5

  • memory/1092-23-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1092-22-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1092-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1092-18-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1372-25-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1372-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2892-32-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2892-38-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2892-41-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB