Malware Analysis Report

2024-08-06 15:24

Sample ID 240520-ngbctahb79
Target f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe
SHA256 7deb16972ec377cc1381bae9a23e1e0add453fdd3067a1ac559f265b66a7429b
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7deb16972ec377cc1381bae9a23e1e0add453fdd3067a1ac559f265b66a7429b

Threat Level: Known bad

The file f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

NanoCore

Executes dropped EXE

Loads dropped DLL

Checks computer location settings

Adds Run key to start application

Checks whether UAC is enabled

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-20 11:21

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-20 11:21

Reported

2024-05-20 11:24

Platform

win7-20240508-en

Max time kernel

147s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2696 set thread context of 2576 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1728 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1728 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1728 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1728 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1728 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1728 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1728 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2696 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2696 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2696 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2696 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2696 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2696 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2696 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2696 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2696 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2696 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2696 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2696 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Processes

C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 sysupdate24.ddns.net udp

Files

memory/1728-0-0x0000000074C31000-0x0000000074C32000-memory.dmp

memory/1728-1-0x0000000074C30000-0x00000000751DB000-memory.dmp

memory/1728-2-0x0000000074C30000-0x00000000751DB000-memory.dmp

memory/1728-3-0x0000000074C30000-0x00000000751DB000-memory.dmp

\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

MD5 da8c50a0e3b458c8d35a65fd064f0da2
SHA1 06cb18b37f791b0e2e00b08deb4cd0948b316797
SHA256 c6cc5fa8ee7cee1fa2128e75e4a14fd101eb0131311d638f2eb9fac939bc3dde
SHA512 20a17188ad12276922edd6e08b338c2a2e2679add1fa3d2b6b6a3664f219f23b4db7b0f877b9ed012dddaf58ccf194d345c41e4599e30d70aa69bf5816981f11

memory/1728-13-0x0000000074C30000-0x00000000751DB000-memory.dmp

memory/2696-12-0x0000000074C30000-0x00000000751DB000-memory.dmp

memory/2696-14-0x0000000074C30000-0x00000000751DB000-memory.dmp

memory/2576-19-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2576-18-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2576-16-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2576-26-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2576-32-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2576-31-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2576-25-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2576-22-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2696-34-0x0000000074C30000-0x00000000751DB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-20 11:21

Reported

2024-05-20 11:24

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1824 set thread context of 1944 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 412 wrote to memory of 1824 N/A C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 412 wrote to memory of 1824 N/A C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 412 wrote to memory of 1824 N/A C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1824 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1824 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1824 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1824 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1824 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1824 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1824 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1824 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Processes

C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\f342b862c11a50a308d92372a3793d90_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 0.181.190.20.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp

Files

memory/412-0-0x0000000075482000-0x0000000075483000-memory.dmp

memory/412-1-0x0000000075480000-0x0000000075A31000-memory.dmp

memory/412-2-0x0000000075480000-0x0000000075A31000-memory.dmp

memory/412-3-0x0000000075480000-0x0000000075A31000-memory.dmp

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

MD5 3d9c7e713c13ee62e8d3804715f9e46c
SHA1 7172c973610468e5df27c89adad8c4541818d2b0
SHA256 87026af093dfd204e64a7f7209579b08c8aaa51af8e144df1224faadd82de405
SHA512 f9cb108f6c51fc8a0720426a26af91c20f596fdb1f27a94e99be34ef5f487dea616a81ee9222531cdaf43d79c246f2ebbc65bfc011d8efb460cdf00e6635e10d

memory/1824-18-0x0000000075480000-0x0000000075A31000-memory.dmp

memory/412-17-0x0000000075480000-0x0000000075A31000-memory.dmp

memory/1824-19-0x0000000075480000-0x0000000075A31000-memory.dmp

memory/1944-21-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1944-20-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1944-22-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1944-25-0x0000000075480000-0x0000000075A31000-memory.dmp

memory/1944-26-0x0000000075480000-0x0000000075A31000-memory.dmp

memory/1944-28-0x0000000075480000-0x0000000075A31000-memory.dmp

memory/1824-29-0x0000000075480000-0x0000000075A31000-memory.dmp

memory/1824-31-0x0000000075480000-0x0000000075A31000-memory.dmp

memory/1944-32-0x0000000075480000-0x0000000075A31000-memory.dmp

memory/1944-33-0x0000000075480000-0x0000000075A31000-memory.dmp