Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/05/2024, 01:52

General

  • Target

    807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe

  • Size

    66KB

  • MD5

    807fa82223d9efb45b19a7d551a3d5f0

  • SHA1

    dbdae440d9c948761177b28ed02b1a33195b0066

  • SHA256

    a27c7cc1c1de613d6c43a5951d356d37ba516ed8f80377f12684ed5116a957ba

  • SHA512

    771ac4b465fe3294e8fcee221a592c76c79e5b9669539df641ed89c9aaacc70ee8750bfdd17bf0c10b8d356112991bfe688e2c7813b6b14cb924c1f6d024e383

  • SSDEEP

    1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXil:IeklMMYJhqezw/pXzH9il

Malware Config

Signatures

  • Detects BazaLoader malware 1 IoCs

    BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\807fa82223d9efb45b19a7d551a3d5f0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4692
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3096
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4584
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2188
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1400
          • C:\Windows\SysWOW64\at.exe
            at 01:54 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:3448
            • C:\Windows\SysWOW64\at.exe
              at 01:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:5092
              • C:\Windows\SysWOW64\at.exe
                at 01:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:3908

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          66KB

          MD5

          ae6aca78e092164b6db1c9a84bb6c006

          SHA1

          e39f7ca192990707aeda65a9ac0ff7e1152a3b33

          SHA256

          605ce4abbdb5f5d14e4883c090e6e794a040925cbb922686d063492b1a1b3722

          SHA512

          4c37499e06cfd52d817dcc708eda42a7b227f0d3a5c07e2aea22b1fbe15fd7ab2ed8bf4fe3398c83da3b2ab6d7627abedfe08f2f0c4a05b6c6ddfeed54946730

        • C:\Windows\System\svchost.exe

          Filesize

          66KB

          MD5

          89291281ca1b54e229e84c60b2add7af

          SHA1

          c02e301691997f5c9e23f49de722756ea1192bae

          SHA256

          961c59b0f5b29355964ed3fdcbc967ecbd588e3bf8b314a9215248063e9d3e5d

          SHA512

          6526583c0e34ce9f26ee3247902c29e573f60a6acad9394422dfb951a2c0529e119a9af6dc6c3f1ec1482a5042fc24fad2743e1d5fc687da6f164bbb8a47c978

        • \??\c:\windows\system\explorer.exe

          Filesize

          66KB

          MD5

          1dd9744a066eea658fb3672c1fe42b12

          SHA1

          406440bc76cd37dffda0c15d06a7ea7e0cba5514

          SHA256

          d8a3273d532edb8350e6d07c4beda99109d8ca4bb47136b826308bdc47d157e3

          SHA512

          63d513cc4408f90fe6190fe5ca34e135fc928d3223647679df0cb50cbd5e20a49abfa85deae060ac4bc78a20dc0fac5429d4f187c9a72f0c5757b117b1adaab2

        • \??\c:\windows\system\spoolsv.exe

          Filesize

          66KB

          MD5

          aa4a3c019af4df1baf84c0747727720c

          SHA1

          f04844af77f35fb627bacf41f7f3f866905ed6f3

          SHA256

          8f06fe093ca61709b502f2763d32d10ee12b731a1ca4b1bd68e9a7b2006ea9a8

          SHA512

          cb14597ea81817d3f67bdaff3f64904384941dca8514f1c659c7a85d519a79692526e912062ccbd779947d805f208be8af1df681b6743bce5da82c0671ce7680

        • memory/1400-47-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1400-42-0x00000000754B0000-0x000000007560D000-memory.dmp

          Filesize

          1.4MB

        • memory/2188-35-0x00000000754B0000-0x000000007560D000-memory.dmp

          Filesize

          1.4MB

        • memory/2188-34-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2188-56-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2188-40-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3096-13-0x00000000754B0000-0x000000007560D000-memory.dmp

          Filesize

          1.4MB

        • memory/3096-65-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3096-15-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3096-55-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4584-51-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4584-24-0x00000000754B0000-0x000000007560D000-memory.dmp

          Filesize

          1.4MB

        • memory/4692-5-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/4692-53-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/4692-3-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4692-52-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4692-2-0x00000000754B0000-0x000000007560D000-memory.dmp

          Filesize

          1.4MB

        • memory/4692-0-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/4692-1-0x00000000001C0000-0x00000000001C4000-memory.dmp

          Filesize

          16KB