Analysis
-
max time kernel
150s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 05:31
Static task
static1
Behavioral task
behavioral1
Sample
e48282011b4d855bcd15b6a938726270_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e48282011b4d855bcd15b6a938726270_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
e48282011b4d855bcd15b6a938726270_NEIKI.exe
-
Size
66KB
-
MD5
e48282011b4d855bcd15b6a938726270
-
SHA1
1772c8bfee0be0a4b8b86df0a215ff0d429ec2af
-
SHA256
d2febd149b9558dacf694e6c1a8e3d06bf05bd4d848a7a13083a429cd2b78543
-
SHA512
5ba1331939911ea157667cf5b5a5815eb6d6a1ee175fc50c095785c0b6f9008a2929488554c865406f496e2bd11330bb38969cc7ff70c33d312ab268d3f91436
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXik:IeklMMYJhqezw/pXzH9ik
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral2/memory/1648-38-0x0000000075600000-0x000000007575D000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 5020 explorer.exe 3720 spoolsv.exe 1648 svchost.exe 4348 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe e48282011b4d855bcd15b6a938726270_NEIKI.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1596 e48282011b4d855bcd15b6a938726270_NEIKI.exe 1596 e48282011b4d855bcd15b6a938726270_NEIKI.exe 5020 explorer.exe 5020 explorer.exe 5020 explorer.exe 5020 explorer.exe 5020 explorer.exe 5020 explorer.exe 1648 svchost.exe 1648 svchost.exe 1648 svchost.exe 1648 svchost.exe 5020 explorer.exe 5020 explorer.exe 1648 svchost.exe 1648 svchost.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 1648 svchost.exe 5020 explorer.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 1648 svchost.exe 5020 explorer.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 5020 explorer.exe 1648 svchost.exe 1648 svchost.exe 5020 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1648 svchost.exe 5020 explorer.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1596 e48282011b4d855bcd15b6a938726270_NEIKI.exe 1596 e48282011b4d855bcd15b6a938726270_NEIKI.exe 5020 explorer.exe 5020 explorer.exe 3720 spoolsv.exe 3720 spoolsv.exe 1648 svchost.exe 1648 svchost.exe 4348 spoolsv.exe 4348 spoolsv.exe 5020 explorer.exe 5020 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1596 wrote to memory of 5020 1596 e48282011b4d855bcd15b6a938726270_NEIKI.exe 84 PID 1596 wrote to memory of 5020 1596 e48282011b4d855bcd15b6a938726270_NEIKI.exe 84 PID 1596 wrote to memory of 5020 1596 e48282011b4d855bcd15b6a938726270_NEIKI.exe 84 PID 5020 wrote to memory of 3720 5020 explorer.exe 85 PID 5020 wrote to memory of 3720 5020 explorer.exe 85 PID 5020 wrote to memory of 3720 5020 explorer.exe 85 PID 3720 wrote to memory of 1648 3720 spoolsv.exe 86 PID 3720 wrote to memory of 1648 3720 spoolsv.exe 86 PID 3720 wrote to memory of 1648 3720 spoolsv.exe 86 PID 1648 wrote to memory of 4348 1648 svchost.exe 87 PID 1648 wrote to memory of 4348 1648 svchost.exe 87 PID 1648 wrote to memory of 4348 1648 svchost.exe 87 PID 1648 wrote to memory of 4916 1648 svchost.exe 88 PID 1648 wrote to memory of 4916 1648 svchost.exe 88 PID 1648 wrote to memory of 4916 1648 svchost.exe 88 PID 1648 wrote to memory of 512 1648 svchost.exe 109 PID 1648 wrote to memory of 512 1648 svchost.exe 109 PID 1648 wrote to memory of 512 1648 svchost.exe 109 PID 1648 wrote to memory of 4480 1648 svchost.exe 123 PID 1648 wrote to memory of 4480 1648 svchost.exe 123 PID 1648 wrote to memory of 4480 1648 svchost.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\e48282011b4d855bcd15b6a938726270_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\e48282011b4d855bcd15b6a938726270_NEIKI.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3720 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4348
-
-
C:\Windows\SysWOW64\at.exeat 05:34 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4916
-
-
C:\Windows\SysWOW64\at.exeat 05:35 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:512
-
-
C:\Windows\SysWOW64\at.exeat 05:36 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4480
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD544a2375bbbb5bfc0fe6c36a0e58ec8d2
SHA13a481d85886bc66ce88bb3d4481796c75e606848
SHA2565d75298d2bba4fab94fcb938fb4ccc5883638e46c9a8faa92fcb6511eacb2199
SHA512e98254895a7e062b39857d1bfd3e5eed499b7e59b1b31b155626f39350796080263bdf2220d514e9e6ff58784e522d0ad88c9ef050fdad6eae559ec7bebba34c
-
Filesize
66KB
MD53272249970ae7efbd50691dee89e84f1
SHA13a2eba2c68ad7829e2f314d6d9f0ca98f753ff75
SHA256662dfa7c9337381e9c3cf564c120a64393fcfc8faf0ed39b8c9a9c858ffcab66
SHA5128de3c91412f919c5f394285cdd94ef869a2e1a3c1f1a2d3e78e9a1d00bb7c66dcbeba79eae0c9ce429d2b19187e012642b25f1378b71daa7659ef69e977e7526
-
Filesize
66KB
MD58a90b73170c36a60cb30c21e69326071
SHA183e751e947e75e8c38933b3d65ec9204b3ca4080
SHA256e7619a525b361b50f3ec113014d4ecb14962cc0cdc0e0092f33d5d476bf2d760
SHA51247d7cfc164d7e2f02f0145181eb3d607804ca6a2657e58d67de71210a522fc33ffbe6007c11a1a0a8ca26455df928601ed71cb05260f3cbb61672da1d1ef3b48
-
Filesize
66KB
MD53caa0825ef2ef30e905717d9d7aac992
SHA10c880c85c92eecfaa0f0766c4641ae84f69f5d65
SHA256aca4608c7f9672131c8174bc5e492775b5bd2a564451e24334a3852bbb84f3c0
SHA512fa38cda23fe103721d1d86aa8cd845c5ea5b05ca1529f448185b7c49122b02f571df6841fb66bf334f8e5d75b5c0ac28d64e5c1f2dd9235d7b59ba9638cac856