Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe
-
Size
66KB
-
MD5
807fa82223d9efb45b19a7d551a3d5f0
-
SHA1
dbdae440d9c948761177b28ed02b1a33195b0066
-
SHA256
a27c7cc1c1de613d6c43a5951d356d37ba516ed8f80377f12684ed5116a957ba
-
SHA512
771ac4b465fe3294e8fcee221a592c76c79e5b9669539df641ed89c9aaacc70ee8750bfdd17bf0c10b8d356112991bfe688e2c7813b6b14cb924c1f6d024e383
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXil:IeklMMYJhqezw/pXzH9il
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral2/memory/2188-35-0x00000000754B0000-0x000000007560D000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3096 explorer.exe 4584 spoolsv.exe 2188 svchost.exe 1400 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4692 807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe 4692 807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe 3096 explorer.exe 3096 explorer.exe 3096 explorer.exe 3096 explorer.exe 3096 explorer.exe 3096 explorer.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 3096 explorer.exe 3096 explorer.exe 2188 svchost.exe 2188 svchost.exe 3096 explorer.exe 3096 explorer.exe 2188 svchost.exe 2188 svchost.exe 3096 explorer.exe 3096 explorer.exe 2188 svchost.exe 2188 svchost.exe 3096 explorer.exe 3096 explorer.exe 2188 svchost.exe 2188 svchost.exe 3096 explorer.exe 3096 explorer.exe 2188 svchost.exe 2188 svchost.exe 3096 explorer.exe 3096 explorer.exe 2188 svchost.exe 2188 svchost.exe 3096 explorer.exe 3096 explorer.exe 2188 svchost.exe 2188 svchost.exe 3096 explorer.exe 3096 explorer.exe 2188 svchost.exe 2188 svchost.exe 3096 explorer.exe 3096 explorer.exe 2188 svchost.exe 2188 svchost.exe 3096 explorer.exe 3096 explorer.exe 2188 svchost.exe 2188 svchost.exe 3096 explorer.exe 3096 explorer.exe 2188 svchost.exe 2188 svchost.exe 3096 explorer.exe 3096 explorer.exe 2188 svchost.exe 2188 svchost.exe 3096 explorer.exe 3096 explorer.exe 2188 svchost.exe 2188 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3096 explorer.exe 2188 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4692 807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe 4692 807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe 3096 explorer.exe 3096 explorer.exe 4584 spoolsv.exe 4584 spoolsv.exe 2188 svchost.exe 2188 svchost.exe 1400 spoolsv.exe 1400 spoolsv.exe 3096 explorer.exe 3096 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3096 4692 807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe 85 PID 4692 wrote to memory of 3096 4692 807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe 85 PID 4692 wrote to memory of 3096 4692 807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe 85 PID 3096 wrote to memory of 4584 3096 explorer.exe 86 PID 3096 wrote to memory of 4584 3096 explorer.exe 86 PID 3096 wrote to memory of 4584 3096 explorer.exe 86 PID 4584 wrote to memory of 2188 4584 spoolsv.exe 87 PID 4584 wrote to memory of 2188 4584 spoolsv.exe 87 PID 4584 wrote to memory of 2188 4584 spoolsv.exe 87 PID 2188 wrote to memory of 1400 2188 svchost.exe 88 PID 2188 wrote to memory of 1400 2188 svchost.exe 88 PID 2188 wrote to memory of 1400 2188 svchost.exe 88 PID 2188 wrote to memory of 3448 2188 svchost.exe 89 PID 2188 wrote to memory of 3448 2188 svchost.exe 89 PID 2188 wrote to memory of 3448 2188 svchost.exe 89 PID 2188 wrote to memory of 5092 2188 svchost.exe 104 PID 2188 wrote to memory of 5092 2188 svchost.exe 104 PID 2188 wrote to memory of 5092 2188 svchost.exe 104 PID 2188 wrote to memory of 3908 2188 svchost.exe 113 PID 2188 wrote to memory of 3908 2188 svchost.exe 113 PID 2188 wrote to memory of 3908 2188 svchost.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4692 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3096 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4584 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1400
-
-
C:\Windows\SysWOW64\at.exeat 01:54 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3448
-
-
C:\Windows\SysWOW64\at.exeat 01:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:5092
-
-
C:\Windows\SysWOW64\at.exeat 01:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3908
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5ae6aca78e092164b6db1c9a84bb6c006
SHA1e39f7ca192990707aeda65a9ac0ff7e1152a3b33
SHA256605ce4abbdb5f5d14e4883c090e6e794a040925cbb922686d063492b1a1b3722
SHA5124c37499e06cfd52d817dcc708eda42a7b227f0d3a5c07e2aea22b1fbe15fd7ab2ed8bf4fe3398c83da3b2ab6d7627abedfe08f2f0c4a05b6c6ddfeed54946730
-
Filesize
66KB
MD589291281ca1b54e229e84c60b2add7af
SHA1c02e301691997f5c9e23f49de722756ea1192bae
SHA256961c59b0f5b29355964ed3fdcbc967ecbd588e3bf8b314a9215248063e9d3e5d
SHA5126526583c0e34ce9f26ee3247902c29e573f60a6acad9394422dfb951a2c0529e119a9af6dc6c3f1ec1482a5042fc24fad2743e1d5fc687da6f164bbb8a47c978
-
Filesize
66KB
MD51dd9744a066eea658fb3672c1fe42b12
SHA1406440bc76cd37dffda0c15d06a7ea7e0cba5514
SHA256d8a3273d532edb8350e6d07c4beda99109d8ca4bb47136b826308bdc47d157e3
SHA51263d513cc4408f90fe6190fe5ca34e135fc928d3223647679df0cb50cbd5e20a49abfa85deae060ac4bc78a20dc0fac5429d4f187c9a72f0c5757b117b1adaab2
-
Filesize
66KB
MD5aa4a3c019af4df1baf84c0747727720c
SHA1f04844af77f35fb627bacf41f7f3f866905ed6f3
SHA2568f06fe093ca61709b502f2763d32d10ee12b731a1ca4b1bd68e9a7b2006ea9a8
SHA512cb14597ea81817d3f67bdaff3f64904384941dca8514f1c659c7a85d519a79692526e912062ccbd779947d805f208be8af1df681b6743bce5da82c0671ce7680