Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 06:54

General

  • Target

    4c6630df7b3f14ff5534becf65b16cbd8686ef136552439822e44df672574b73_NeikiAnalytics.exe

  • Size

    352KB

  • MD5

    17c859aadd5fa61fbc5944149af1d850

  • SHA1

    9a29dce8f796c8c18ed4f29ade67797438be0e91

  • SHA256

    4c6630df7b3f14ff5534becf65b16cbd8686ef136552439822e44df672574b73

  • SHA512

    5b392be5abd3d44c374d0fe8e86abed275c4af3b5d5204b32a8c6dc9cd9f88a366cdc4392c72524f9f3bd3d7ac78cedb07f1d269c752b75ca936a2f4d93d579d

  • SSDEEP

    6144:zIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCe8i:WKofHfHTXQLzgvnzHPowYbvrjD/L7QPs

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c6630df7b3f14ff5534becf65b16cbd8686ef136552439822e44df672574b73_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4c6630df7b3f14ff5534becf65b16cbd8686ef136552439822e44df672574b73_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2596

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\satornas.dll

          Filesize

          183B

          MD5

          7d60b27682e5ce0895ce83fdf0ea25b4

          SHA1

          3ed8f5b539986cdb76665fa8190c6e726cdf9250

          SHA256

          6fccee378073a7a62538a628603f13a0cd3cd465884fdb40e7d37eee78e5afac

          SHA512

          19dd92d299ac171eae2fa0dda643c9998a0f8f17056353360bc522388e27451c7c69ab570b76de17a80461e832725d67ca031d206adaf13135dbd39d1ef74ec7

        • C:\Windows\SysWOW64\smnss.exe

          Filesize

          352KB

          MD5

          12f34dd8312a3951b156675281f729d5

          SHA1

          b86b877d5e770dd70a23af61d72b1be94106ae43

          SHA256

          e1401dee87e5e01d72a7069ec0ecab2e5190b8d304f56fe765b1d2e442461054

          SHA512

          37716ea672169e1331141ceabce23e54d5a7bb8775557e6c0ccc461b1c29a439fec0b382110cb7e6d9092ba9dbe44a947034300087ba50bb2c8b68c1d86bdfcc

        • \Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          cbac8c5ea42670cc528eb05d1ba14c92

          SHA1

          3cab588ec81864eaaa7464459dae751d10a0066f

          SHA256

          99435a4c436d5ad7deb17e89be7ed6ddcc7e348647808599aa068032e6882f5e

          SHA512

          28ac6c39182212279fe1311333f897ca46f350f4455811c0ee88519bb6f154790076802d8dd5cbfa8ee3a2b8358943ad5d03ba7ba28f83b70692574ec3cff05a

        • \Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          fb3bae5b12d54707578b13b970a6d305

          SHA1

          94fe0c538084ee89831824eaaa6c6afb9f6888ec

          SHA256

          377fefac919da3a10288422f0cbe16530f17f6ed5deffac22555b198d3299b05

          SHA512

          9f3a1f14526872b529041274dc2c4185411aa4b0aedf483f162dcf15044ab02cd86d4ba9985a75c9db74d6cb648c7b31de8ec76e162d0369bde9a682d06261eb

        • memory/2160-28-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2160-31-0x0000000000560000-0x00000000005C0000-memory.dmp

          Filesize

          384KB

        • memory/2216-27-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2216-0-0x0000000000400000-0x0000000000460000-memory.dmp

          Filesize

          384KB

        • memory/2216-26-0x0000000000400000-0x0000000000460000-memory.dmp

          Filesize

          384KB

        • memory/2216-18-0x0000000000340000-0x0000000000349000-memory.dmp

          Filesize

          36KB

        • memory/2216-16-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2596-35-0x0000000000400000-0x0000000000460000-memory.dmp

          Filesize

          384KB

        • memory/2596-42-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2596-45-0x0000000000400000-0x0000000000460000-memory.dmp

          Filesize

          384KB