Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
3053f39320e0e0d7d8c776d1067c599736ac16b5c24a3e4ba7992bf991c0fa45_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3053f39320e0e0d7d8c776d1067c599736ac16b5c24a3e4ba7992bf991c0fa45_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3053f39320e0e0d7d8c776d1067c599736ac16b5c24a3e4ba7992bf991c0fa45_NeikiAnalytics.exe
-
Size
66KB
-
MD5
b105f60607582574f11caf1e2aeb0cb0
-
SHA1
4118aeaba2a85060baba2e2b048061fdd8962d72
-
SHA256
3053f39320e0e0d7d8c776d1067c599736ac16b5c24a3e4ba7992bf991c0fa45
-
SHA512
5500c191fc6093e133cdb4ef145373a16b7aa4087fc64e56b7e5fc83b73653992ead932f98f1cafddd543999890739facf0486460f75efe969c4aece9a8e6569
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiW:IeklMMYJhqezw/pXzH9iW
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral2/memory/2892-38-0x00000000752A0000-0x00000000753FD000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2704 explorer.exe 3408 spoolsv.exe 2892 svchost.exe 2856 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 3053f39320e0e0d7d8c776d1067c599736ac16b5c24a3e4ba7992bf991c0fa45_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4384 3053f39320e0e0d7d8c776d1067c599736ac16b5c24a3e4ba7992bf991c0fa45_NeikiAnalytics.exe 4384 3053f39320e0e0d7d8c776d1067c599736ac16b5c24a3e4ba7992bf991c0fa45_NeikiAnalytics.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2704 explorer.exe 2892 svchost.exe 2892 svchost.exe 2892 svchost.exe 2892 svchost.exe 2704 explorer.exe 2704 explorer.exe 2892 svchost.exe 2892 svchost.exe 2704 explorer.exe 2704 explorer.exe 2892 svchost.exe 2892 svchost.exe 2704 explorer.exe 2704 explorer.exe 2892 svchost.exe 2892 svchost.exe 2704 explorer.exe 2704 explorer.exe 2892 svchost.exe 2892 svchost.exe 2704 explorer.exe 2704 explorer.exe 2892 svchost.exe 2892 svchost.exe 2704 explorer.exe 2704 explorer.exe 2892 svchost.exe 2892 svchost.exe 2704 explorer.exe 2704 explorer.exe 2892 svchost.exe 2892 svchost.exe 2704 explorer.exe 2704 explorer.exe 2892 svchost.exe 2892 svchost.exe 2704 explorer.exe 2704 explorer.exe 2892 svchost.exe 2892 svchost.exe 2704 explorer.exe 2704 explorer.exe 2892 svchost.exe 2892 svchost.exe 2704 explorer.exe 2704 explorer.exe 2892 svchost.exe 2892 svchost.exe 2704 explorer.exe 2704 explorer.exe 2892 svchost.exe 2892 svchost.exe 2704 explorer.exe 2704 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2704 explorer.exe 2892 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4384 3053f39320e0e0d7d8c776d1067c599736ac16b5c24a3e4ba7992bf991c0fa45_NeikiAnalytics.exe 4384 3053f39320e0e0d7d8c776d1067c599736ac16b5c24a3e4ba7992bf991c0fa45_NeikiAnalytics.exe 2704 explorer.exe 2704 explorer.exe 3408 spoolsv.exe 3408 spoolsv.exe 2892 svchost.exe 2892 svchost.exe 2856 spoolsv.exe 2856 spoolsv.exe 2704 explorer.exe 2704 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4384 wrote to memory of 2704 4384 3053f39320e0e0d7d8c776d1067c599736ac16b5c24a3e4ba7992bf991c0fa45_NeikiAnalytics.exe 82 PID 4384 wrote to memory of 2704 4384 3053f39320e0e0d7d8c776d1067c599736ac16b5c24a3e4ba7992bf991c0fa45_NeikiAnalytics.exe 82 PID 4384 wrote to memory of 2704 4384 3053f39320e0e0d7d8c776d1067c599736ac16b5c24a3e4ba7992bf991c0fa45_NeikiAnalytics.exe 82 PID 2704 wrote to memory of 3408 2704 explorer.exe 83 PID 2704 wrote to memory of 3408 2704 explorer.exe 83 PID 2704 wrote to memory of 3408 2704 explorer.exe 83 PID 3408 wrote to memory of 2892 3408 spoolsv.exe 84 PID 3408 wrote to memory of 2892 3408 spoolsv.exe 84 PID 3408 wrote to memory of 2892 3408 spoolsv.exe 84 PID 2892 wrote to memory of 2856 2892 svchost.exe 85 PID 2892 wrote to memory of 2856 2892 svchost.exe 85 PID 2892 wrote to memory of 2856 2892 svchost.exe 85 PID 2892 wrote to memory of 2684 2892 svchost.exe 87 PID 2892 wrote to memory of 2684 2892 svchost.exe 87 PID 2892 wrote to memory of 2684 2892 svchost.exe 87 PID 2892 wrote to memory of 1460 2892 svchost.exe 103 PID 2892 wrote to memory of 1460 2892 svchost.exe 103 PID 2892 wrote to memory of 1460 2892 svchost.exe 103 PID 2892 wrote to memory of 3696 2892 svchost.exe 112 PID 2892 wrote to memory of 3696 2892 svchost.exe 112 PID 2892 wrote to memory of 3696 2892 svchost.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\3053f39320e0e0d7d8c776d1067c599736ac16b5c24a3e4ba7992bf991c0fa45_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3053f39320e0e0d7d8c776d1067c599736ac16b5c24a3e4ba7992bf991c0fa45_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4384 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3408 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2856
-
-
C:\Windows\SysWOW64\at.exeat 09:53 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2684
-
-
C:\Windows\SysWOW64\at.exeat 09:54 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1460
-
-
C:\Windows\SysWOW64\at.exeat 09:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3696
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD540d6eb543eaa48214a05cdb486a71feb
SHA13e785a5501a546dff6a35fa480e99e5905ca3951
SHA256b068a9cab54f1553246a07d0483b614f30dcf6955bf1e0e671a5ad97e41ac47d
SHA512384c38c16a271086a8cf2b6712eeeb59a57a627e1c08f55d743ac0ad1e35d34539d7ba47dfcfc3da636b4d8c712a8916aaf01e565e833bb8d820ce178449ec97
-
Filesize
66KB
MD510b1133e2ba38f63508b5ff4b90dcb86
SHA128d026598d111e9aa2da861e681f31b6f3c5a5e2
SHA25687857d8a14a990986bb7f9f3b892c4445673368b4c93c8a461357bfbf09c0a8a
SHA512adbfb4bb31c452bca583876c03e42f7a9e104a23d3825b7e2008e513201ee333418030ad73a6ebf95b62093fa7a4844cdd0fd91b84ebd2c27ab1e43f459ab684
-
Filesize
66KB
MD52a593ab07e8b5c1b7f3fb12ef600dc3d
SHA1da3efc55597bce8832b2a66513160ae369cd5076
SHA2569003e2bcb9bc1d2508bd684e5f45f9a6a04ea53f2001d1406a9e4f5f32da115c
SHA5128b797fbd87b6f6f00bd0a802852592bdd6b9617365e7aaf1a78706601952b6c92ce4d3865f72e740eb6faefbedb4f20b43b81a883c6ebc66160b478444ee6002
-
Filesize
66KB
MD5ac963d898ca847fbf4f61ee41dcfda7b
SHA14fc1383439c82da0465bd81368e66a3405a745eb
SHA25669d14661ba5a9299205dad2b9c1965e5321e082fa489c6105d7a8670c9db9085
SHA51253c8032aa921e166085c7fc2538af0c2a14e86c9665c01eba36afcd2306d51de7c6e4d341514dfaddafd039c7c997f74da76e22bead2e77dad61b67974071dbd