Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 03:50
Static task
static1
Behavioral task
behavioral1
Sample
751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe
-
Size
66KB
-
MD5
751dd87e2d9386c084b1c5a37606f8e0
-
SHA1
822c1b5e3bf75c4aaf3dc005ba1a39fb5432ed09
-
SHA256
62d7ffee1160f332be5a1031c236f0088f02a2915eb4c22dd3475a81f93ed219
-
SHA512
970c02f1ada79b3ea3e4ae4adbc5fca6a23f43e10b5faa4b2625c45927d9850a0228916dc549fef31498b2e1cb5462d0aefa97b5a870322fc01c22040829503f
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXi1:IeklMMYJhqezw/pXzH9i1
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral1/memory/2472-58-0x0000000072940000-0x0000000072A93000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1536 explorer.exe 2648 spoolsv.exe 2472 svchost.exe 2624 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2696 751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe 2696 751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe 1536 explorer.exe 1536 explorer.exe 2648 spoolsv.exe 2648 spoolsv.exe 2472 svchost.exe 2472 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2696 751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 1536 explorer.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 1536 explorer.exe 2472 svchost.exe 1536 explorer.exe 1536 explorer.exe 2472 svchost.exe 1536 explorer.exe 2472 svchost.exe 2472 svchost.exe 1536 explorer.exe 1536 explorer.exe 2472 svchost.exe 2472 svchost.exe 1536 explorer.exe 2472 svchost.exe 1536 explorer.exe 1536 explorer.exe 2472 svchost.exe 2472 svchost.exe 1536 explorer.exe 2472 svchost.exe 1536 explorer.exe 2472 svchost.exe 1536 explorer.exe 1536 explorer.exe 2472 svchost.exe 2472 svchost.exe 1536 explorer.exe 1536 explorer.exe 2472 svchost.exe 1536 explorer.exe 2472 svchost.exe 1536 explorer.exe 2472 svchost.exe 2472 svchost.exe 1536 explorer.exe 1536 explorer.exe 2472 svchost.exe 2472 svchost.exe 1536 explorer.exe 1536 explorer.exe 2472 svchost.exe 2472 svchost.exe 1536 explorer.exe 1536 explorer.exe 2472 svchost.exe 1536 explorer.exe 2472 svchost.exe 1536 explorer.exe 2472 svchost.exe 1536 explorer.exe 2472 svchost.exe 1536 explorer.exe 2472 svchost.exe 2472 svchost.exe 1536 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1536 explorer.exe 2472 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2696 751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe 2696 751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe 1536 explorer.exe 1536 explorer.exe 2648 spoolsv.exe 2648 spoolsv.exe 2472 svchost.exe 2472 svchost.exe 2624 spoolsv.exe 2624 spoolsv.exe 1536 explorer.exe 1536 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2696 wrote to memory of 1536 2696 751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe 28 PID 2696 wrote to memory of 1536 2696 751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe 28 PID 2696 wrote to memory of 1536 2696 751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe 28 PID 2696 wrote to memory of 1536 2696 751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe 28 PID 1536 wrote to memory of 2648 1536 explorer.exe 29 PID 1536 wrote to memory of 2648 1536 explorer.exe 29 PID 1536 wrote to memory of 2648 1536 explorer.exe 29 PID 1536 wrote to memory of 2648 1536 explorer.exe 29 PID 2648 wrote to memory of 2472 2648 spoolsv.exe 30 PID 2648 wrote to memory of 2472 2648 spoolsv.exe 30 PID 2648 wrote to memory of 2472 2648 spoolsv.exe 30 PID 2648 wrote to memory of 2472 2648 spoolsv.exe 30 PID 2472 wrote to memory of 2624 2472 svchost.exe 31 PID 2472 wrote to memory of 2624 2472 svchost.exe 31 PID 2472 wrote to memory of 2624 2472 svchost.exe 31 PID 2472 wrote to memory of 2624 2472 svchost.exe 31 PID 2472 wrote to memory of 2992 2472 svchost.exe 32 PID 2472 wrote to memory of 2992 2472 svchost.exe 32 PID 2472 wrote to memory of 2992 2472 svchost.exe 32 PID 2472 wrote to memory of 2992 2472 svchost.exe 32 PID 2472 wrote to memory of 2708 2472 svchost.exe 36 PID 2472 wrote to memory of 2708 2472 svchost.exe 36 PID 2472 wrote to memory of 2708 2472 svchost.exe 36 PID 2472 wrote to memory of 2708 2472 svchost.exe 36 PID 2472 wrote to memory of 2232 2472 svchost.exe 38 PID 2472 wrote to memory of 2232 2472 svchost.exe 38 PID 2472 wrote to memory of 2232 2472 svchost.exe 38 PID 2472 wrote to memory of 2232 2472 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\751dd87e2d9386c084b1c5a37606f8e0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
C:\Windows\SysWOW64\at.exeat 03:52 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2992
-
-
C:\Windows\SysWOW64\at.exeat 03:53 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2708
-
-
C:\Windows\SysWOW64\at.exeat 03:54 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2232
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD51c731338314fc307594395606d76fefa
SHA185f48a5d7485b65efd1b968445358b326a498c27
SHA256193f0fe0e6da76cf52751829696f4e33e658246b65d4d1bdaed456e30915ca85
SHA5126e1e91dafb2155318d53981cac56175b8ff98912da7663904cf5e8dd36e1a8d4e018edc257c36f413d48f3eb2bc538e243aab72885d2548d3e57f04cf3cbbea5
-
Filesize
66KB
MD5d44528f11d9798062b0d949e28eb7769
SHA16047a4cbd2639a9978f696ac7f4c98d9b17d4178
SHA256970d1719d734cb68b6e7af5941e52e13a86f77d74244f005d9c0a50538540fd1
SHA51250744d8b5ea83f636014b64f350df4a0a72eea9c92904281ef8f030d9308ec6238f646462367a173640f9bba0c7f05d7b0191bd20c732f25e8b2f7266e7ffc9c
-
Filesize
66KB
MD518015c06639024e80e0bb51f82f92ad6
SHA183a98a4da5cde9dc3e7e362128849411fd3bfed4
SHA25677ca938cfe7ece8a6018cdecb4f56dfb91478f9b9c64f62e47af377a2ab8afbb
SHA512d696768d4dadb18f1950bf670cc5b5e84e99d38ac063586509213ff682cd357133c45cbc24ea4d58c618e09656fef35df0c21279d240a59f6d62278bad445ccd
-
Filesize
66KB
MD5ecb79ad651b74f1b950a75794dcfe5f8
SHA124cab541386ce2d86d6d09f546a8061be3330bd1
SHA25667d15c7e7571d55b88e60549602fd2ffc008d70be5c4ffb946ad86326c4ebf4d
SHA512d73d59034dab6693076fbd17607bf83a72bbcc0c89361bb860f0c8c8bced78bc8ef2e3ca8e1698028fb4e4c2f358173ac777cf64d8205538916b2ca7cd923291