Malware Analysis Report

2024-08-06 15:24

Sample ID 240519-wv22paah88
Target 122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe
SHA256 f9a29be25f6de5b0d144453a5f97bdbb076416bd73f6ea369aa5728aac71df49
Tags
upx nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f9a29be25f6de5b0d144453a5f97bdbb076416bd73f6ea369aa5728aac71df49

Threat Level: Known bad

The file 122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

upx nanocore evasion keylogger persistence spyware stealer trojan

NanoCore

Drops startup file

UPX packed file

Adds Run key to start application

Checks whether UAC is enabled

AutoIT Executable

Suspicious use of SetThreadContext

Drops file in Program Files directory

Unsigned PE

Suspicious behavior: GetForegroundWindowSpam

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-19 18:15

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-19 18:15

Reported

2024-05-19 18:18

Platform

win7-20240508-en

Max time kernel

147s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PasswordOnWakeSettingFlyout.url C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NTFS Monitor = "C:\\Program Files (x86)\\NTFS Monitor\\ntfsmon.exe" C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1904 set thread context of 276 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\NTFS Monitor\ntfsmon.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A
File opened for modification C:\Program Files (x86)\NTFS Monitor\ntfsmon.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1904 wrote to memory of 276 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1904 wrote to memory of 276 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1904 wrote to memory of 276 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1904 wrote to memory of 276 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1904 wrote to memory of 276 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1904 wrote to memory of 276 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1904 wrote to memory of 276 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1904 wrote to memory of 276 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1904 wrote to memory of 276 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 276 wrote to memory of 1568 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 276 wrote to memory of 1568 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 276 wrote to memory of 1568 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 276 wrote to memory of 1568 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 276 wrote to memory of 848 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 276 wrote to memory of 848 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 276 wrote to memory of 848 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 276 wrote to memory of 848 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "NTFS Monitor" /xml "C:\Users\Admin\AppData\Local\Temp\tmp2839.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "NTFS Monitor Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp2897.tmp"

Network

Country Destination Domain Proto
NL 213.184.126.143:1993 tcp
NL 213.184.126.143:1993 tcp
NL 213.184.126.143:1993 tcp
NL 213.184.126.143:1993 tcp
NL 213.184.126.143:1993 tcp

Files

memory/1904-0-0x0000000000E00000-0x0000000000F48000-memory.dmp

memory/1904-1-0x0000000000E00000-0x0000000000F48000-memory.dmp

memory/1904-2-0x0000000000E00000-0x0000000000F48000-memory.dmp

memory/1904-3-0x0000000000E00000-0x0000000000F48000-memory.dmp

memory/1904-4-0x0000000000E00000-0x0000000000F48000-memory.dmp

memory/1904-5-0x0000000000E00000-0x0000000000F48000-memory.dmp

memory/1904-6-0x0000000000E00000-0x0000000000F48000-memory.dmp

memory/276-7-0x0000000000400000-0x0000000000438000-memory.dmp

memory/276-8-0x0000000000400000-0x0000000000438000-memory.dmp

memory/276-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/1904-16-0x0000000000130000-0x0000000000131000-memory.dmp

memory/276-15-0x0000000000400000-0x0000000000438000-memory.dmp

memory/276-14-0x0000000000400000-0x0000000000438000-memory.dmp

memory/276-17-0x0000000073C02000-0x0000000073C04000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp2839.tmp

MD5 c6f0625bf4c1cdfb699980c9243d3b22
SHA1 43de1fe580576935516327f17b5da0c656c72851
SHA256 8dfc4e937f0b2374e3ced25fce344b0731cf44b8854625b318d50ece2da8f576
SHA512 9ef2dbd4142ad0e1e6006929376ecb8011e7ffc801ee2101e906787d70325ad82752df65839de9972391fa52e1e5974ec1a5c7465a88aa56257633ebb7d70969

C:\Users\Admin\AppData\Local\Temp\tmp2897.tmp

MD5 981e126601526eaa5b0ad45c496c4465
SHA1 d610d6a21a8420cc73fcd3e54ddae75a5897b28b
SHA256 11ae277dfa39e7038b782ca6557339e7fe88533fe83705c356a1500a1402d527
SHA512 a59fb704d931ccb7e1ec1a7b98e24ccd8708be529066c6de4b673098cdebef539f7f50d9e051c43954b5a8e7f810862b3a4ede170f131e080dadc3e763ed4bdb

memory/1904-25-0x0000000000E00000-0x0000000000F48000-memory.dmp

memory/1904-26-0x0000000000E00000-0x0000000000F48000-memory.dmp

memory/1904-30-0x0000000000E00000-0x0000000000F48000-memory.dmp

memory/276-31-0x0000000073C02000-0x0000000073C04000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-19 18:15

Reported

2024-05-19 18:18

Platform

win10v2004-20240508-en

Max time kernel

148s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PasswordOnWakeSettingFlyout.url C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DHCP Service = "C:\\Program Files (x86)\\DHCP Service\\dhcpsv.exe" C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1628 set thread context of 5108 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\DHCP Service\dhcpsv.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A
File opened for modification C:\Program Files (x86)\DHCP Service\dhcpsv.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1628 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1628 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1628 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1628 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 1628 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 5108 wrote to memory of 2732 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 5108 wrote to memory of 2732 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 5108 wrote to memory of 2732 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 5108 wrote to memory of 4068 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 5108 wrote to memory of 4068 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 5108 wrote to memory of 4068 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\122869186f62a4ea5a47d42edad01dd0_NeikiAnalytics.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DHCP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp97E6.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DHCP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp9844.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
NL 213.184.126.143:1993 tcp
NL 213.184.126.143:1993 tcp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
NL 213.184.126.143:1993 tcp
NL 213.184.126.143:1993 tcp
NL 213.184.126.143:1993 tcp
US 8.8.8.8:53 13.173.189.20.in-addr.arpa udp

Files

memory/1628-0-0x0000000000610000-0x0000000000758000-memory.dmp

memory/1628-1-0x0000000000610000-0x0000000000758000-memory.dmp

memory/1628-2-0x0000000000610000-0x0000000000758000-memory.dmp

memory/1628-3-0x0000000000610000-0x0000000000758000-memory.dmp

memory/1628-4-0x0000000000610000-0x0000000000758000-memory.dmp

memory/1628-5-0x0000000000610000-0x0000000000758000-memory.dmp

memory/1628-6-0x0000000000610000-0x0000000000758000-memory.dmp

memory/5108-8-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1628-12-0x0000000000760000-0x0000000000761000-memory.dmp

memory/5108-13-0x0000000073892000-0x0000000073893000-memory.dmp

memory/5108-14-0x0000000073890000-0x0000000073E41000-memory.dmp

memory/5108-15-0x0000000073890000-0x0000000073E41000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp97E6.tmp

MD5 c6f0625bf4c1cdfb699980c9243d3b22
SHA1 43de1fe580576935516327f17b5da0c656c72851
SHA256 8dfc4e937f0b2374e3ced25fce344b0731cf44b8854625b318d50ece2da8f576
SHA512 9ef2dbd4142ad0e1e6006929376ecb8011e7ffc801ee2101e906787d70325ad82752df65839de9972391fa52e1e5974ec1a5c7465a88aa56257633ebb7d70969

C:\Users\Admin\AppData\Local\Temp\tmp9844.tmp

MD5 a77c223a0fc492dccd6fb9975f7a8766
SHA1 5e813636ae9b8138d78919348a5da3a6e8bd74b5
SHA256 589df7325d42409c50827600fedb240171ee4bdab85916474a37800c2382829e
SHA512 315cea8fde3c594404f5d3c96c710af1214cff6d08ccdb40634a739e108ff810e02624735a2b8c3e3720157b4a55327f317c3c23c3a681b46b9ab0f19060f7c0

memory/1628-23-0x0000000000610000-0x0000000000758000-memory.dmp

memory/1628-24-0x0000000000610000-0x0000000000758000-memory.dmp

memory/1628-28-0x0000000000610000-0x0000000000758000-memory.dmp

memory/5108-29-0x0000000073892000-0x0000000073893000-memory.dmp

memory/5108-30-0x0000000073890000-0x0000000073E41000-memory.dmp