Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
e48282011b4d855bcd15b6a938726270_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e48282011b4d855bcd15b6a938726270_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
e48282011b4d855bcd15b6a938726270_NEIKI.exe
-
Size
66KB
-
MD5
e48282011b4d855bcd15b6a938726270
-
SHA1
1772c8bfee0be0a4b8b86df0a215ff0d429ec2af
-
SHA256
d2febd149b9558dacf694e6c1a8e3d06bf05bd4d848a7a13083a429cd2b78543
-
SHA512
5ba1331939911ea157667cf5b5a5815eb6d6a1ee175fc50c095785c0b6f9008a2929488554c865406f496e2bd11330bb38969cc7ff70c33d312ab268d3f91436
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXik:IeklMMYJhqezw/pXzH9ik
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral1/memory/2560-55-0x0000000072940000-0x0000000072A93000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2532 explorer.exe 2240 spoolsv.exe 2560 svchost.exe 320 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 996 e48282011b4d855bcd15b6a938726270_NEIKI.exe 996 e48282011b4d855bcd15b6a938726270_NEIKI.exe 2532 explorer.exe 2532 explorer.exe 2240 spoolsv.exe 2240 spoolsv.exe 2560 svchost.exe 2560 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe e48282011b4d855bcd15b6a938726270_NEIKI.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 996 e48282011b4d855bcd15b6a938726270_NEIKI.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2532 explorer.exe 2560 svchost.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe 2560 svchost.exe 2532 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2532 explorer.exe 2560 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 996 e48282011b4d855bcd15b6a938726270_NEIKI.exe 996 e48282011b4d855bcd15b6a938726270_NEIKI.exe 2532 explorer.exe 2532 explorer.exe 2240 spoolsv.exe 2240 spoolsv.exe 2560 svchost.exe 2560 svchost.exe 320 spoolsv.exe 320 spoolsv.exe 2532 explorer.exe 2532 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 996 wrote to memory of 2532 996 e48282011b4d855bcd15b6a938726270_NEIKI.exe 28 PID 996 wrote to memory of 2532 996 e48282011b4d855bcd15b6a938726270_NEIKI.exe 28 PID 996 wrote to memory of 2532 996 e48282011b4d855bcd15b6a938726270_NEIKI.exe 28 PID 996 wrote to memory of 2532 996 e48282011b4d855bcd15b6a938726270_NEIKI.exe 28 PID 2532 wrote to memory of 2240 2532 explorer.exe 29 PID 2532 wrote to memory of 2240 2532 explorer.exe 29 PID 2532 wrote to memory of 2240 2532 explorer.exe 29 PID 2532 wrote to memory of 2240 2532 explorer.exe 29 PID 2240 wrote to memory of 2560 2240 spoolsv.exe 30 PID 2240 wrote to memory of 2560 2240 spoolsv.exe 30 PID 2240 wrote to memory of 2560 2240 spoolsv.exe 30 PID 2240 wrote to memory of 2560 2240 spoolsv.exe 30 PID 2560 wrote to memory of 320 2560 svchost.exe 31 PID 2560 wrote to memory of 320 2560 svchost.exe 31 PID 2560 wrote to memory of 320 2560 svchost.exe 31 PID 2560 wrote to memory of 320 2560 svchost.exe 31 PID 2560 wrote to memory of 2768 2560 svchost.exe 32 PID 2560 wrote to memory of 2768 2560 svchost.exe 32 PID 2560 wrote to memory of 2768 2560 svchost.exe 32 PID 2560 wrote to memory of 2768 2560 svchost.exe 32 PID 2560 wrote to memory of 1276 2560 svchost.exe 36 PID 2560 wrote to memory of 1276 2560 svchost.exe 36 PID 2560 wrote to memory of 1276 2560 svchost.exe 36 PID 2560 wrote to memory of 1276 2560 svchost.exe 36 PID 2560 wrote to memory of 2896 2560 svchost.exe 38 PID 2560 wrote to memory of 2896 2560 svchost.exe 38 PID 2560 wrote to memory of 2896 2560 svchost.exe 38 PID 2560 wrote to memory of 2896 2560 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\e48282011b4d855bcd15b6a938726270_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\e48282011b4d855bcd15b6a938726270_NEIKI.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:996 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:320
-
-
C:\Windows\SysWOW64\at.exeat 05:34 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2768
-
-
C:\Windows\SysWOW64\at.exeat 05:35 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1276
-
-
C:\Windows\SysWOW64\at.exeat 05:36 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2896
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD53bf5f9f6ac2485652a1ae7cff195e825
SHA14385982fb8527f78ba4f7a061c844e0c5f310b08
SHA256af3a4163aa565587e8ad9349db85aac7c8201f4ed2a42e7b34917208dc6594e5
SHA512e735fe5152e5cd721e08e6dca3c49214dfa3a2a49183d81763293bf2bb450938e64f0a549824bab19a146347634ce68e2f0a763fdeff4e94b9a256950393b1f1
-
Filesize
66KB
MD573b17774cafa062acfe77ae4330bee3d
SHA1c686b55efddc65b1de62521a4f34e842420fd41a
SHA256252c12929328e959cff3227d61abedefb6261677467b47e14c038f521219dc5f
SHA512b84e95d228673e9c28e27ad47eb38fbf96d1820120f8209c4f11db8f5ee825a9a628810b3f7185beb66edb0f25e802d5c2d8286f3d311726b1cc45c16041f1ce
-
Filesize
66KB
MD50a15be927409f49201c37a4a5166d5a8
SHA1ebd79e0e3d1d43ea329291ff35b33573784cdc94
SHA256b0def7d1b6edba57c7dc294bb2ab4fe71553aa65124f2b2799733d6af5658ef3
SHA51208ab234099799c48024295a160842f19477fb013cf80abfb73d84a1017e2633d16673c3c43c9181a1d3855502f57846d8cd6a3547ad629c2fe5d5036559d73f0
-
Filesize
66KB
MD590e69b67fec651ec544e379fe8186b5c
SHA1f4009a75c3c623b00fd18414b94cbf09f9cfad6c
SHA25687f64e55026a5cd5aaeb48ab28a061002745a4c407f9fb8e056fc8a5e926fdca
SHA5120988870137f96212e77ee8b725da6f292e2b7f53426bf8faee33c961799a7e45014928b114cb600009730cced588643be3201f234f02641ce2f3c5e0a64ec7b9