Malware Analysis Report

2024-08-06 14:47

Sample ID 240619-ktd3paxemg
Target ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe
SHA256 a7be279163494aaf2132336eceddb5bbc397b44bb95e2c92ab2ca31d61e5cf0c
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a7be279163494aaf2132336eceddb5bbc397b44bb95e2c92ab2ca31d61e5cf0c

Threat Level: Known bad

The file ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

NanoCore

Checks computer location settings

Loads dropped DLL

Executes dropped EXE

Checks whether UAC is enabled

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious behavior: GetForegroundWindowSpam

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-19 08:53

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-19 08:53

Reported

2024-06-19 08:55

Platform

win7-20240508-en

Max time kernel

138s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2748 set thread context of 2644 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2756 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2756 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2756 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2756 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2756 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2756 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2756 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 2748 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 sysupdate24.ddns.net udp

Files

memory/2756-0-0x0000000074831000-0x0000000074832000-memory.dmp

memory/2756-1-0x0000000074830000-0x0000000074DDB000-memory.dmp

memory/2756-2-0x0000000074830000-0x0000000074DDB000-memory.dmp

memory/2756-3-0x0000000074830000-0x0000000074DDB000-memory.dmp

\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

MD5 2a306ddb77896e0855b36ba35b88cfb5
SHA1 2eafd5d894a7934b394a75c75f6cb9d72e99d569
SHA256 1a8e8a5f15855d8dc3aab930492f6fce027050329840c34a7b92575b2a74da4c
SHA512 3289ea8aa47e2e6a40e8de0208d28aa7d7700e394c441a2d2aaffa46eb612ad21c457af529f60204f43dd598eb4970e0d28c684985e82cfdfff11477a5a92256

memory/2756-13-0x0000000074830000-0x0000000074DDB000-memory.dmp

memory/2748-12-0x0000000074830000-0x0000000074DDB000-memory.dmp

memory/2748-14-0x0000000074830000-0x0000000074DDB000-memory.dmp

memory/2644-16-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2644-23-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2644-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2644-26-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2644-20-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2644-18-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2644-34-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2644-32-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2748-36-0x0000000074830000-0x0000000074DDB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-19 08:53

Reported

2024-06-19 08:55

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1804 set thread context of 2012 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1812 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1812 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1812 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1804 wrote to memory of 2012 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1804 wrote to memory of 2012 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1804 wrote to memory of 2012 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1804 wrote to memory of 2012 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1804 wrote to memory of 2012 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1804 wrote to memory of 2012 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1804 wrote to memory of 2012 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
PID 1804 wrote to memory of 2012 N/A C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\ae3767146c71a6b10de116b95662dcd0_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 sysupdate24.ddns.net udp
US 8.8.8.8:53 sysupdate24.ddns.net udp

Files

memory/1812-0-0x00000000750D2000-0x00000000750D3000-memory.dmp

memory/1812-1-0x00000000750D0000-0x0000000075681000-memory.dmp

memory/1812-2-0x00000000750D0000-0x0000000075681000-memory.dmp

memory/1812-3-0x00000000750D0000-0x0000000075681000-memory.dmp

C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

MD5 e8de8568d1af9377f5cf721cfcefb328
SHA1 77e1874df888f67ad21acefbf7a5b94093b7d946
SHA256 4d6f617ef14951a719152468dac0b7ab9ce2844208d1630bd441fece38fa3926
SHA512 bbfe0ba4bbbcc254a5f2b07a7636d289c2345efd9a2079bc61ef9e84963ca4af152e9708693c9b7b314cc34a9c86228424af3d9ea6db8545157f372336a7be11

memory/1804-18-0x00000000750D0000-0x0000000075681000-memory.dmp

memory/1804-20-0x00000000750D0000-0x0000000075681000-memory.dmp

memory/1812-19-0x00000000750D0000-0x0000000075681000-memory.dmp

memory/1804-17-0x00000000750D0000-0x0000000075681000-memory.dmp

memory/1804-21-0x00000000750D0000-0x0000000075681000-memory.dmp

memory/2012-25-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2012-23-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2012-22-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2012-27-0x00000000750D0000-0x0000000075681000-memory.dmp

memory/2012-28-0x00000000750D0000-0x0000000075681000-memory.dmp

memory/2012-30-0x00000000750D0000-0x0000000075681000-memory.dmp

memory/1804-31-0x00000000750D0000-0x0000000075681000-memory.dmp

memory/1804-33-0x00000000750D0000-0x0000000075681000-memory.dmp

memory/2012-34-0x00000000750D0000-0x0000000075681000-memory.dmp

memory/2012-35-0x00000000750D0000-0x0000000075681000-memory.dmp