Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe
-
Size
66KB
-
MD5
aa517970dcecccf371649e1cb8b53af0
-
SHA1
824f1382e42c9a1a0337db8f24cfd7c836c92a25
-
SHA256
f7fda77d4d9a347e73cbc1461412cac9f7fcb0ab19a6fb3a238604d1307b9dcf
-
SHA512
682124d9bc8bd84fda67afd04a25c5e99c3b4150e1a8e5c5e90d6b8230545483970e50b7d36e08fc64360f42983dabcd2c16589073321e0eeaa51841db9ab3ee
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXi8:IeklMMYJhqezw/pXzH9i8
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral1/memory/2936-57-0x0000000072940000-0x0000000072A93000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2564 explorer.exe 2668 spoolsv.exe 2936 svchost.exe 2532 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 1904 aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe 1904 aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe 2564 explorer.exe 2564 explorer.exe 2668 spoolsv.exe 2668 spoolsv.exe 2936 svchost.exe 2936 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1904 aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2564 explorer.exe 2936 svchost.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe 2936 svchost.exe 2564 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2564 explorer.exe 2936 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1904 aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe 1904 aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe 2564 explorer.exe 2564 explorer.exe 2668 spoolsv.exe 2668 spoolsv.exe 2936 svchost.exe 2936 svchost.exe 2532 spoolsv.exe 2532 spoolsv.exe 2564 explorer.exe 2564 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2564 1904 aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe 28 PID 1904 wrote to memory of 2564 1904 aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe 28 PID 1904 wrote to memory of 2564 1904 aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe 28 PID 1904 wrote to memory of 2564 1904 aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe 28 PID 2564 wrote to memory of 2668 2564 explorer.exe 29 PID 2564 wrote to memory of 2668 2564 explorer.exe 29 PID 2564 wrote to memory of 2668 2564 explorer.exe 29 PID 2564 wrote to memory of 2668 2564 explorer.exe 29 PID 2668 wrote to memory of 2936 2668 spoolsv.exe 30 PID 2668 wrote to memory of 2936 2668 spoolsv.exe 30 PID 2668 wrote to memory of 2936 2668 spoolsv.exe 30 PID 2668 wrote to memory of 2936 2668 spoolsv.exe 30 PID 2936 wrote to memory of 2532 2936 svchost.exe 31 PID 2936 wrote to memory of 2532 2936 svchost.exe 31 PID 2936 wrote to memory of 2532 2936 svchost.exe 31 PID 2936 wrote to memory of 2532 2936 svchost.exe 31 PID 2936 wrote to memory of 844 2936 svchost.exe 32 PID 2936 wrote to memory of 844 2936 svchost.exe 32 PID 2936 wrote to memory of 844 2936 svchost.exe 32 PID 2936 wrote to memory of 844 2936 svchost.exe 32 PID 2936 wrote to memory of 2784 2936 svchost.exe 36 PID 2936 wrote to memory of 2784 2936 svchost.exe 36 PID 2936 wrote to memory of 2784 2936 svchost.exe 36 PID 2936 wrote to memory of 2784 2936 svchost.exe 36 PID 2936 wrote to memory of 3064 2936 svchost.exe 38 PID 2936 wrote to memory of 3064 2936 svchost.exe 38 PID 2936 wrote to memory of 3064 2936 svchost.exe 38 PID 2936 wrote to memory of 3064 2936 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\aa517970dcecccf371649e1cb8b53af0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2532
-
-
C:\Windows\SysWOW64\at.exeat 05:58 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:844
-
-
C:\Windows\SysWOW64\at.exeat 05:59 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2784
-
-
C:\Windows\SysWOW64\at.exeat 06:00 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3064
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD558f5d42f0c20e751a1ac6d7438bbd159
SHA10add6334d764cda18220dbf1413aad93a0d6e45d
SHA25621f4b725ecfa6b78735cbca59753513f95c7615b6ce92545f468d8eed94d3b93
SHA5121253f34cbfa2fd760ec451bc34c86a5cacb4c6912184f8aff39cfdd7db45e7f94d9b9511ed110fa5312f1550d2d8b0646dc589f0f8f92e502b9852fc6bd2daab
-
Filesize
66KB
MD5d668ea5237324509d842650161543ac7
SHA17a7249c56ce525f42eb7ddd1d70968dda4807b36
SHA256b593f579314358ef11b8b8e35a1338b5916c6f12a62022ef8b54a04d80128afa
SHA512886746d185bb5d0911a8696cfc5ca32a0963ef901e717855bcd40ec4e197346d8219d42c9340b09046f91e1d7484d5956211cb7f1e8ad6ad5793e45e5d1ededa
-
Filesize
66KB
MD51fd45e1d96ad94b021d18ee1be25fee4
SHA100e10a8ddc3389f14a790b1a6a6eab4664b230c8
SHA2562c013feb212ce18e558651ffb70a57b6b285387f8f696ee5fc6d4c3ace165f69
SHA512482196cd27f14a21bb256459eb3f653d62f1ed622db22fd68b4659c724bb4bb07414faec86691804e050b8e3c102ce21180150ab5de7f2ce4e43409bf64f5e6c
-
Filesize
66KB
MD5f7309a423b9894cdd41319ea5b071991
SHA132df3f0a079ba2cdbbd7ec0be097db0c31c19899
SHA2565d3d56b24ed556ff8255c237161469986cd80c2c2551ffdb8570af573fdb7557
SHA5125c5036148b0999ffbf317cfaa3015b52f9e84c509a7f7b215ae5a4db7a5c7d8934ee3bdfb39c1732c1db1ab7deda06d0fe2113a536375f4e0f97368d328f2771