Malware Analysis Report

2024-10-23 20:45

Sample ID 240528-1q5n8sfa46
Target 0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe
SHA256 f5d0b4c0ae4b1410fad3cdd51927d4597a8ce8fc4711ce221e2f6f4861d90eb9
Tags
pyinstaller njrat nvidia evasion persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f5d0b4c0ae4b1410fad3cdd51927d4597a8ce8fc4711ce221e2f6f4861d90eb9

Threat Level: Known bad

The file 0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

pyinstaller njrat nvidia evasion persistence trojan

njRAT/Bladabindi

Modifies Windows Firewall

Executes dropped EXE

Checks computer location settings

Loads dropped DLL

Drops startup file

Adds Run key to start application

Drops autorun.inf file

Detects Pyinstaller

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-28 21:52

Signatures

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-28 21:52

Reported

2024-05-28 21:54

Platform

win7-20240215-en

Max time kernel

120s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI27402\python310.dll

MD5 e9c0fbc99d19eeedad137557f4a0ab21
SHA1 8945e1811ceb4b26f21edcc7a36dcf2b1d34f0bf
SHA256 5783c5c5a3ffce181691f19d27de376a03010d32e41360b72bcdbd28467cfcc5
SHA512 74e1289683642ae2bc3cf780a07af1f27fed2011ef6cc67380f9c066c59d17a2fb2394a45a5c6cd75dad812a61093fdbd0f2108925f5c58fc6644c1c98be5c0b

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-28 21:52

Reported

2024-05-28 21:54

Platform

win10v2004-20240508-en

Max time kernel

150s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe"

Signatures

njRAT/Bladabindi

trojan njrat

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\INST.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\565c7299a2f18977caf93e5da2f7e3c1.exe C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\565c7299a2f18977caf93e5da2f7e3c1.exe C:\Users\Admin\AppData\Roaming\nvidia.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\INST.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\565c7299a2f18977caf93e5da2f7e3c1 = "\"C:\\Users\\Admin\\AppData\\Roaming\\nvidia.exe\" .." C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\565c7299a2f18977caf93e5da2f7e3c1 = "\"C:\\Users\\Admin\\AppData\\Roaming\\nvidia.exe\" .." C:\Users\Admin\AppData\Roaming\nvidia.exe N/A

Drops autorun.inf file

Description Indicator Process Target
File created C:\autorun.inf C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
File opened for modification C:\autorun.inf C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
File created D:\autorun.inf C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
File created F:\autorun.inf C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
File opened for modification F:\autorun.inf C:\Users\Admin\AppData\Roaming\nvidia.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\nvidia.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1564 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe
PID 1564 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe
PID 3432 wrote to memory of 3164 N/A C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe C:\Windows\SYSTEM32\cmd.exe
PID 3432 wrote to memory of 3164 N/A C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe C:\Windows\SYSTEM32\cmd.exe
PID 3432 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe C:\Windows\system32\cmd.exe
PID 3432 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe C:\Windows\system32\cmd.exe
PID 2900 wrote to memory of 5064 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\INST.exe
PID 2900 wrote to memory of 5064 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\INST.exe
PID 2900 wrote to memory of 5064 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\AppData\Local\Temp\INST.exe
PID 5064 wrote to memory of 1308 N/A C:\Users\Admin\AppData\Local\Temp\INST.exe C:\Users\Admin\AppData\Roaming\nvidia.exe
PID 5064 wrote to memory of 1308 N/A C:\Users\Admin\AppData\Local\Temp\INST.exe C:\Users\Admin\AppData\Roaming\nvidia.exe
PID 5064 wrote to memory of 1308 N/A C:\Users\Admin\AppData\Local\Temp\INST.exe C:\Users\Admin\AppData\Roaming\nvidia.exe
PID 1308 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe C:\Windows\SysWOW64\netsh.exe
PID 1308 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe C:\Windows\SysWOW64\netsh.exe
PID 1308 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Roaming\nvidia.exe C:\Windows\SysWOW64\netsh.exe

Processes

C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\0bbb931a074cedbe1f6ccb5e57eb9940_NeikiAnalytics.exe"

C:\Windows\SYSTEM32\cmd.exe

cmd /c echo %temp%

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\INST.exe

C:\Users\Admin\AppData\Local\Temp\INST.exe

C:\Users\Admin\AppData\Local\Temp\INST.exe

C:\Users\Admin\AppData\Roaming\nvidia.exe

"C:\Users\Admin\AppData\Roaming\nvidia.exe"

C:\Windows\SysWOW64\netsh.exe

netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\nvidia.exe" "nvidia.exe" ENABLE

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 9.244.122.92.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 kids-notified.at.ply.gg udp
PL 209.25.141.181:3845 kids-notified.at.ply.gg tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
PL 209.25.141.181:3845 kids-notified.at.ply.gg tcp
PL 209.25.141.181:3845 kids-notified.at.ply.gg tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
PL 209.25.141.181:3845 kids-notified.at.ply.gg tcp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
NL 23.62.61.155:443 www.bing.com tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 155.61.62.23.in-addr.arpa udp
PL 209.25.141.181:3845 kids-notified.at.ply.gg tcp
PL 209.25.141.181:3845 kids-notified.at.ply.gg tcp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI15642\python310.dll

MD5 e9c0fbc99d19eeedad137557f4a0ab21
SHA1 8945e1811ceb4b26f21edcc7a36dcf2b1d34f0bf
SHA256 5783c5c5a3ffce181691f19d27de376a03010d32e41360b72bcdbd28467cfcc5
SHA512 74e1289683642ae2bc3cf780a07af1f27fed2011ef6cc67380f9c066c59d17a2fb2394a45a5c6cd75dad812a61093fdbd0f2108925f5c58fc6644c1c98be5c0b

C:\Users\Admin\AppData\Local\Temp\_MEI15642\VCRUNTIME140.dll

MD5 f34eb034aa4a9735218686590cba2e8b
SHA1 2bc20acdcb201676b77a66fa7ec6b53fa2644713
SHA256 9d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1
SHA512 d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af

C:\Users\Admin\AppData\Local\Temp\_MEI15642\base_library.zip

MD5 8990ffed478799973e5dcd802405ebec
SHA1 d544b384b2da891fcdebd865ec20998945b6fbc2
SHA256 dc3af37f01115a5db58649c3b1415fabf6e98e5f86bd7855e7640bd6b3f45f49
SHA512 b5dfe7d225cace9434e2f5c174350736f7340d30c7547d7b6da7ebffcb426ca70c70819eaa32f86b68185d4b86813064a3c3b2708f681995ace9f2a3d525fdd6

C:\Users\Admin\AppData\Local\Temp\INST.exe

MD5 6e1d6b895a2fdcd7829b62f90195ed37
SHA1 b2e9bd7ce8ee786eb0b3dbd3165df2edfb1cea87
SHA256 aabe818eb50d5edfe01bd4ee79a3a61e5d25ffb55fbd187388ec51faf34a0871
SHA512 1d8c2a49f049fe641abdaaa35e9cc9b7d8fbfdd3c15db67a576c09b3e41ad787aa927299c07e03733879da235ca9650421e34607a16dd909aab3e7ee46e78c23

memory/5064-22-0x0000000075222000-0x0000000075223000-memory.dmp

memory/5064-23-0x0000000075220000-0x00000000757D1000-memory.dmp

memory/5064-24-0x0000000075220000-0x00000000757D1000-memory.dmp

memory/5064-34-0x0000000075220000-0x00000000757D1000-memory.dmp

memory/1308-35-0x0000000075220000-0x00000000757D1000-memory.dmp

memory/1308-36-0x0000000075220000-0x00000000757D1000-memory.dmp

memory/1308-47-0x0000000075220000-0x00000000757D1000-memory.dmp

memory/1308-57-0x0000000075220000-0x00000000757D1000-memory.dmp