Malware Analysis Report

2024-08-06 15:22

Sample ID 240518-wflq6afh58
Target 21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe
SHA256 b321b5eb0707fae8644961e20937d5ed75cd54e5b1b9fe9f9beaa8acf4a36b09
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b321b5eb0707fae8644961e20937d5ed75cd54e5b1b9fe9f9beaa8acf4a36b09

Threat Level: Known bad

The file 21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

Nanocore family

NanoCore

Adds Run key to start application

Checks whether UAC is enabled

Drops file in Program Files directory

Unsigned PE

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-18 17:51

Signatures

Nanocore family

nanocore

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-18 17:51

Reported

2024-05-18 17:54

Platform

win7-20240220-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Subsystem = "C:\\Program Files (x86)\\TCP Subsystem\\tcpss.exe" C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\TCP Subsystem\tcpss.exe C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe N/A
File created C:\Program Files (x86)\TCP Subsystem\tcpss.exe C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "TCP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp1526.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "TCP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp15B3.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp

Files

memory/2912-0-0x0000000074751000-0x0000000074752000-memory.dmp

memory/2912-1-0x0000000074750000-0x0000000074CFB000-memory.dmp

memory/2912-2-0x0000000074750000-0x0000000074CFB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp1526.tmp

MD5 82c0636e6fba969997ca47ac37b748b3
SHA1 7a568d0f27b1561629719637dc36ab0a77da71d6
SHA256 ecb01f6da3a8a966526dac91dbd0676d84aae2a6af20561a41c944e4fc46e9d6
SHA512 fd62bc0b5124c0a9f963ea2f1c6b4967ea404e98c960dfcd75903868ddcb296609da5cf2aa0d9ab74b2fc65a5fe83ae92a56ee25d333cf92dd201f7933d05028

C:\Users\Admin\AppData\Local\Temp\tmp15B3.tmp

MD5 4b7ef560289c0f62d0baf6f14f48a57a
SHA1 8331acb90dde588aa3196919f6e847f398fd06d1
SHA256 062844155306130d6fafc4fe10ac9e5ddd2ed462532b729c50cdc979c0d83207
SHA512 ecaa27c4b703d95f9f9b37d8c339982970482e7dab968c2010e0aa644bbfa31973111aafb827565af30c423d1d14e4ff997ec149614e713ff7ef3456894d02d8

memory/2912-10-0x0000000074750000-0x0000000074CFB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-18 17:51

Reported

2024-05-18 17:54

Platform

win10v2004-20240226-en

Max time kernel

150s

Max time network

160s

Command Line

"C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SMTP Subsystem = "C:\\Program Files (x86)\\SMTP Subsystem\\smtpss.exe" C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\SMTP Subsystem\smtpss.exe C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe N/A
File opened for modification C:\Program Files (x86)\SMTP Subsystem\smtpss.exe C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\21d145e4247c90a504ff4f9f8a04f260_NeikiAnalytics.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "SMTP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp1102.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "SMTP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp12B9.tmp"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1028 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
GB 142.250.200.42:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 pki.goog udp
US 8.8.8.8:53 pki.goog udp
US 216.239.32.29:80 pki.goog tcp
US 8.8.8.8:53 42.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 29.32.239.216.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
N/A 127.0.0.1:54984 tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
N/A 127.0.0.1:54984 tcp
US 13.107.246.64:443 tcp
N/A 127.0.0.1:54984 tcp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
N/A 127.0.0.1:54984 tcp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 213.143.182.52.in-addr.arpa udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
US 8.8.4.4:53 Ethxn-25787.portmap.host udp
US 8.8.8.8:53 Ethxn-25787.portmap.host udp
N/A 127.0.0.1:54984 tcp

Files

memory/4796-0-0x0000000074DE2000-0x0000000074DE3000-memory.dmp

memory/4796-1-0x0000000074DE0000-0x0000000075391000-memory.dmp

memory/4796-2-0x0000000074DE0000-0x0000000075391000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp1102.tmp

MD5 82c0636e6fba969997ca47ac37b748b3
SHA1 7a568d0f27b1561629719637dc36ab0a77da71d6
SHA256 ecb01f6da3a8a966526dac91dbd0676d84aae2a6af20561a41c944e4fc46e9d6
SHA512 fd62bc0b5124c0a9f963ea2f1c6b4967ea404e98c960dfcd75903868ddcb296609da5cf2aa0d9ab74b2fc65a5fe83ae92a56ee25d333cf92dd201f7933d05028

C:\Users\Admin\AppData\Local\Temp\tmp12B9.tmp

MD5 0339b45ef206f4becc88be0d65e24b9e
SHA1 6503a1851f4ccd8c80a31f96bd7ae40d962c9fad
SHA256 3d568a47a8944a47f4aed6982755ac7ff7dda469cc1c81c213ecaa5d89de1f83
SHA512 c98f4513db34d50510dd986e0d812545c442bd5bef26932032b165759627fab4e00c95fe907ab3416a8a1042bfa77aa516c479f1ff7d1ec2f21ae66df8f72551

memory/4796-10-0x0000000074DE0000-0x0000000075391000-memory.dmp

memory/4796-11-0x0000000074DE2000-0x0000000074DE3000-memory.dmp

memory/4796-12-0x0000000074DE0000-0x0000000075391000-memory.dmp

memory/4796-13-0x0000000074DE0000-0x0000000075391000-memory.dmp

memory/4796-14-0x0000000074DE0000-0x0000000075391000-memory.dmp