Malware Analysis Report

2024-08-06 14:57

Sample ID 240523-j3qmeaad7s
Target 466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe
SHA256 e3805d671a90bbf845d63056b881f20abcfb8b57acb6c6eeab06810a78550c41
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e3805d671a90bbf845d63056b881f20abcfb8b57acb6c6eeab06810a78550c41

Threat Level: Known bad

The file 466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

NanoCore

Loads dropped DLL

Executes dropped EXE

Checks computer location settings

Adds Run key to start application

Checks whether UAC is enabled

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-23 08:11

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-23 08:11

Reported

2024-05-23 08:14

Platform

win7-20240221-en

Max time kernel

149s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2748 set thread context of 1496 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2456 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2456 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2456 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2456 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2456 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2456 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2456 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Processes

C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 sysupdate24.ddns.net udp

Files

memory/2456-0-0x0000000074C61000-0x0000000074C62000-memory.dmp

memory/2456-1-0x0000000074C60000-0x000000007520B000-memory.dmp

memory/2456-2-0x0000000074C60000-0x000000007520B000-memory.dmp

memory/2456-3-0x0000000074C60000-0x000000007520B000-memory.dmp

\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

MD5 15df993552310a4600b14fa1958c19c6
SHA1 946cfd7fb531a023aa0b122b7c9f594e3b9d10d3
SHA256 2aa8003261922d6a64413b5f7c634544ca2cbc7c55fcb6cba5818cb58fc76f7d
SHA512 71930ba9ed808a60924ca550165507299249c0813a46540859f391a13d4206fad174955533ef7fed54c2f92a1647c126a7c0779eb9b5e0546de44c2b1e7d092f

memory/2456-12-0x0000000074C60000-0x000000007520B000-memory.dmp

memory/2748-13-0x0000000074C60000-0x000000007520B000-memory.dmp

memory/2748-14-0x0000000074C60000-0x000000007520B000-memory.dmp

memory/2748-15-0x0000000074C60000-0x000000007520B000-memory.dmp

memory/2748-16-0x0000000074C60000-0x000000007520B000-memory.dmp

memory/1496-18-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1496-19-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1496-31-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1496-30-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1496-25-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/1496-24-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1496-22-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1496-20-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2748-33-0x0000000074C60000-0x000000007520B000-memory.dmp

memory/2748-34-0x0000000074C60000-0x000000007520B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-23 08:11

Reported

2024-05-23 08:14

Platform

win10v2004-20240426-en

Max time kernel

149s

Max time network

104s

Command Line

"C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3376 set thread context of 1324 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 952 wrote to memory of 3376 N/A C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 952 wrote to memory of 3376 N/A C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 952 wrote to memory of 3376 N/A C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 3376 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 3376 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 3376 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 3376 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 3376 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 3376 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 3376 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 3376 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Processes

C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\466ba796060b3ad9149c36468ddb74e0_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 131.253.33.237:443 g.bing.com tcp
NL 23.62.61.75:443 www.bing.com tcp
US 8.8.8.8:53 148.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 237.33.253.131.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 75.61.62.23.in-addr.arpa udp
NL 23.62.61.75:443 www.bing.com tcp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp

Files

memory/952-0-0x0000000074CD2000-0x0000000074CD3000-memory.dmp

memory/952-1-0x0000000074CD0000-0x0000000075281000-memory.dmp

memory/952-2-0x0000000074CD0000-0x0000000075281000-memory.dmp

memory/952-3-0x0000000074CD0000-0x0000000075281000-memory.dmp

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

MD5 92cd14316ca97a48e0a2dedf19fad77d
SHA1 099557d06fb0209662ff7ba1f635a0b668c145bd
SHA256 e708fd8926374c86e60c1f6e60ebcb51bd2e413963dae5c1f97f484b624960b9
SHA512 64102d11e8a288973dc857232cdc18723c1673747e2fa04f3c130e611c1081dc01bfa798ab1a86c46ae2dfa1cdb7281bde73c01f22eb6bc0691610d435170544

memory/3376-17-0x0000000074CD0000-0x0000000075281000-memory.dmp

memory/952-18-0x0000000074CD0000-0x0000000075281000-memory.dmp

memory/3376-19-0x0000000074CD0000-0x0000000075281000-memory.dmp

memory/3376-20-0x0000000074CD0000-0x0000000075281000-memory.dmp

memory/1324-23-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1324-22-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1324-21-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1324-26-0x0000000074CD0000-0x0000000075281000-memory.dmp

memory/1324-28-0x0000000074CD0000-0x0000000075281000-memory.dmp

memory/3376-29-0x0000000074CD0000-0x0000000075281000-memory.dmp

memory/3376-31-0x0000000074CD0000-0x0000000075281000-memory.dmp

memory/1324-32-0x0000000074CD0000-0x0000000075281000-memory.dmp

memory/1324-33-0x0000000074CD0000-0x0000000075281000-memory.dmp