Malware Analysis Report

2024-08-06 14:57

Sample ID 240523-19pgcsba96
Target 979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe
SHA256 cc1fe58f179c798b1c04e8b95badda2f5f2d32345d12ef4df8f5f876c78e1c7d
Tags
upx nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

cc1fe58f179c798b1c04e8b95badda2f5f2d32345d12ef4df8f5f876c78e1c7d

Threat Level: Known bad

The file 979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

upx nanocore evasion keylogger persistence spyware stealer trojan

NanoCore

Drops startup file

UPX packed file

Adds Run key to start application

Checks whether UAC is enabled

AutoIT Executable

Suspicious use of SetThreadContext

Drops file in Program Files directory

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of SendNotifyMessage

Creates scheduled task(s)

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-23 22:21

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-23 22:21

Reported

2024-05-23 22:23

Platform

win7-20231129-en

Max time kernel

134s

Max time network

144s

Command Line

"C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PasswordOnWakeSettingFlyout.url C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Service = "C:\\Program Files (x86)\\TCP Service\\tcpsv.exe" C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2372 set thread context of 2496 N/A C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\TCP Service\tcpsv.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A
File opened for modification C:\Program Files (x86)\TCP Service\tcpsv.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2372 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 2372 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 2372 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 2372 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 2372 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 2372 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 2372 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 2372 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 2372 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
PID 2496 wrote to memory of 2744 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2496 wrote to memory of 2744 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2496 wrote to memory of 2744 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2496 wrote to memory of 2744 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2496 wrote to memory of 1900 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2496 wrote to memory of 1900 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2496 wrote to memory of 1900 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2496 wrote to memory of 1900 N/A C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "TCP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp992.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "TCP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpA00.tmp"

Network

Country Destination Domain Proto
NL 213.184.126.143:1993 tcp
NL 213.184.126.143:1993 tcp
NL 213.184.126.143:1993 tcp
NL 213.184.126.143:1993 tcp
NL 213.184.126.143:1993 tcp

Files

memory/2372-0-0x0000000000090000-0x00000000001D8000-memory.dmp

memory/2372-1-0x0000000000090000-0x00000000001D8000-memory.dmp

memory/2372-2-0x0000000000090000-0x00000000001D8000-memory.dmp

memory/2372-3-0x0000000000090000-0x00000000001D8000-memory.dmp

memory/2372-4-0x0000000000090000-0x00000000001D8000-memory.dmp

memory/2372-5-0x0000000000090000-0x00000000001D8000-memory.dmp

memory/2372-6-0x0000000000090000-0x00000000001D8000-memory.dmp

memory/2496-8-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2496-9-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2496-15-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2372-17-0x0000000000280000-0x0000000000281000-memory.dmp

memory/2496-16-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2496-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2496-18-0x0000000074772000-0x0000000074774000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp992.tmp

MD5 c6f0625bf4c1cdfb699980c9243d3b22
SHA1 43de1fe580576935516327f17b5da0c656c72851
SHA256 8dfc4e937f0b2374e3ced25fce344b0731cf44b8854625b318d50ece2da8f576
SHA512 9ef2dbd4142ad0e1e6006929376ecb8011e7ffc801ee2101e906787d70325ad82752df65839de9972391fa52e1e5974ec1a5c7465a88aa56257633ebb7d70969

C:\Users\Admin\AppData\Local\Temp\tmpA00.tmp

MD5 93fc3117767507c9889abd12dc667d22
SHA1 1096e4cfa0c35756e3c3fb866c1e4c1e59115df9
SHA256 684997dd4ce15031cec8f2f93933b1d41d7bf5cbbff655dd64377b07055c449a
SHA512 e403348ee77bd3e7c45245dd5dae81c3ea130d5cf342f630982772ce5f75548b292013480e2831d68cf51349b64afde4589d4eec94b567d20f0a01e3b9549bdc

memory/2372-26-0x0000000000090000-0x00000000001D8000-memory.dmp

memory/2372-27-0x0000000000090000-0x00000000001D8000-memory.dmp

memory/2372-31-0x0000000000090000-0x00000000001D8000-memory.dmp

memory/2496-32-0x0000000074772000-0x0000000074774000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-23 22:21

Reported

2024-05-23 22:23

Platform

win10v2004-20240508-en

Max time kernel

150s

Max time network

143s

Command Line

"C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PasswordOnWakeSettingFlyout.url C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DHCP Service = "C:\\Program Files (x86)\\DHCP Service\\dhcpsv.exe" C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 740 set thread context of 3480 N/A C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\979dea5c7b7dc078d511661fad60b9c0_NeikiAnalytics.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DHCP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp51F3.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DHCP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp5252.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 18.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
NL 23.62.61.193:443 www.bing.com tcp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 193.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 99.58.20.217.in-addr.arpa udp
NL 213.184.126.143:1993 tcp
NL 213.184.126.143:1993 tcp
US 8.8.8.8:53 107.211.222.173.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
NL 213.184.126.143:1993 tcp
NL 213.184.126.143:1993 tcp
NL 213.184.126.143:1993 tcp

Files

memory/740-0-0x00000000007D0000-0x0000000000918000-memory.dmp

memory/740-1-0x00000000007D0000-0x0000000000918000-memory.dmp

memory/740-2-0x00000000007D0000-0x0000000000918000-memory.dmp

memory/740-3-0x00000000007D0000-0x0000000000918000-memory.dmp

memory/740-4-0x00000000007D0000-0x0000000000918000-memory.dmp

memory/740-5-0x00000000007D0000-0x0000000000918000-memory.dmp

memory/740-6-0x00000000007D0000-0x0000000000918000-memory.dmp

memory/740-12-0x0000000000780000-0x0000000000781000-memory.dmp

memory/3480-7-0x0000000000400000-0x0000000000438000-memory.dmp

memory/740-13-0x00000000007D0000-0x0000000000918000-memory.dmp

memory/740-15-0x00000000007D0000-0x0000000000918000-memory.dmp

memory/740-19-0x00000000007D0000-0x0000000000918000-memory.dmp