Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 11:11
Static task
static1
Behavioral task
behavioral1
Sample
3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe
-
Size
65KB
-
MD5
082459c751345ef3318b564fc94fbdd0
-
SHA1
5bac779dfdad36ea77a8714f26fadcc2b45dff9e
-
SHA256
3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef
-
SHA512
d5a454f0b367012a2e7d11a627b52f57d322b9022b17ce5b17dd66751be90744c2c728415931f793ef6ba6364ffd5498c8d1cb8d45dc9f2985fd766029604b70
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Oul:7WNqkOJWmo1HpM0MkTUmul
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral1/memory/2504-56-0x0000000072940000-0x0000000072A93000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2316 explorer.exe 2704 spoolsv.exe 2504 svchost.exe 2480 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2956 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 2956 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 2316 explorer.exe 2316 explorer.exe 2704 spoolsv.exe 2704 spoolsv.exe 2504 svchost.exe 2504 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2956 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2316 explorer.exe 2504 svchost.exe 2504 svchost.exe 2316 explorer.exe 2504 svchost.exe 2504 svchost.exe 2316 explorer.exe 2316 explorer.exe 2504 svchost.exe 2316 explorer.exe 2504 svchost.exe 2504 svchost.exe 2316 explorer.exe 2504 svchost.exe 2316 explorer.exe 2316 explorer.exe 2504 svchost.exe 2504 svchost.exe 2316 explorer.exe 2316 explorer.exe 2504 svchost.exe 2504 svchost.exe 2316 explorer.exe 2316 explorer.exe 2504 svchost.exe 2316 explorer.exe 2504 svchost.exe 2316 explorer.exe 2504 svchost.exe 2316 explorer.exe 2504 svchost.exe 2504 svchost.exe 2316 explorer.exe 2504 svchost.exe 2316 explorer.exe 2316 explorer.exe 2504 svchost.exe 2316 explorer.exe 2504 svchost.exe 2316 explorer.exe 2504 svchost.exe 2316 explorer.exe 2504 svchost.exe 2504 svchost.exe 2316 explorer.exe 2316 explorer.exe 2504 svchost.exe 2504 svchost.exe 2316 explorer.exe 2316 explorer.exe 2504 svchost.exe 2504 svchost.exe 2316 explorer.exe 2504 svchost.exe 2316 explorer.exe 2316 explorer.exe 2504 svchost.exe 2504 svchost.exe 2316 explorer.exe 2504 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2316 explorer.exe 2504 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2956 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 2956 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 2316 explorer.exe 2316 explorer.exe 2704 spoolsv.exe 2704 spoolsv.exe 2504 svchost.exe 2504 svchost.exe 2480 spoolsv.exe 2480 spoolsv.exe 2316 explorer.exe 2316 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2316 2956 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 28 PID 2956 wrote to memory of 2316 2956 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 28 PID 2956 wrote to memory of 2316 2956 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 28 PID 2956 wrote to memory of 2316 2956 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 28 PID 2316 wrote to memory of 2704 2316 explorer.exe 29 PID 2316 wrote to memory of 2704 2316 explorer.exe 29 PID 2316 wrote to memory of 2704 2316 explorer.exe 29 PID 2316 wrote to memory of 2704 2316 explorer.exe 29 PID 2704 wrote to memory of 2504 2704 spoolsv.exe 30 PID 2704 wrote to memory of 2504 2704 spoolsv.exe 30 PID 2704 wrote to memory of 2504 2704 spoolsv.exe 30 PID 2704 wrote to memory of 2504 2704 spoolsv.exe 30 PID 2504 wrote to memory of 2480 2504 svchost.exe 31 PID 2504 wrote to memory of 2480 2504 svchost.exe 31 PID 2504 wrote to memory of 2480 2504 svchost.exe 31 PID 2504 wrote to memory of 2480 2504 svchost.exe 31 PID 2504 wrote to memory of 1860 2504 svchost.exe 32 PID 2504 wrote to memory of 1860 2504 svchost.exe 32 PID 2504 wrote to memory of 1860 2504 svchost.exe 32 PID 2504 wrote to memory of 1860 2504 svchost.exe 32 PID 2504 wrote to memory of 2116 2504 svchost.exe 36 PID 2504 wrote to memory of 2116 2504 svchost.exe 36 PID 2504 wrote to memory of 2116 2504 svchost.exe 36 PID 2504 wrote to memory of 2116 2504 svchost.exe 36 PID 2504 wrote to memory of 344 2504 svchost.exe 38 PID 2504 wrote to memory of 344 2504 svchost.exe 38 PID 2504 wrote to memory of 344 2504 svchost.exe 38 PID 2504 wrote to memory of 344 2504 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2480
-
-
C:\Windows\SysWOW64\at.exeat 11:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1860
-
-
C:\Windows\SysWOW64\at.exeat 11:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2116
-
-
C:\Windows\SysWOW64\at.exeat 11:15 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:344
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD57d7e52c3fda5830876d4ab8313f5dbef
SHA1a1b724c4e32175d2c98f0cd05762c002ab0b0649
SHA25630474c5ec98ae8cec43642c94da4ec42f538dcbc95af527ec3179dab636a5673
SHA512a2f436c7aae68f728b8749ca0a81f7747f3b7ac48cf8fe3de2723db7cbee29c798ee3516e9279a1bb57a7d61b892dfdc82cf39c96815fd654ea418591576873b
-
Filesize
65KB
MD557c22d32455f48c145654301dc5b2fc1
SHA1840324815dd081d078982d29bb2be4a4ce93366e
SHA2565c2c24f41adee3ca75eacbdc51fbdb3d134def9edd9b5d51b5a1d9320cb05dab
SHA512e734a6226c0dbbdef0be9fefc305a7a0dea4ad46990454cd38a6682117d3f3ac909026e9cd98ecc5af0ab1b3654de28eb91ed8732f93d75fbe7503ba40f57261
-
Filesize
65KB
MD514dcec03b8b01712730351e22eaaefe2
SHA16a0389c1838c52a99d2d4c6277c8f9748d0a9d6e
SHA256d7d405556e0f7b3b8c52a43ea5e1ba188cedec589cd1699252af8b5481f8cb51
SHA512c26646bcdbf4ffc90808fd42042607f2cbdb41168c86dfd28815d1d543c8eae1ed96811b8eeea08f5b2af646a39c8a9c33e26a9034aa812a7acf5d4dbafc4bb5
-
Filesize
65KB
MD51b8f2584a402f9c6b21eb7593bb9d463
SHA1849d7de39d024441fc4803783a62b24ab9a9d3a2
SHA256671800c83a4ab05059604ad4b544f9efb62e769612d67805856ff517be76a45c
SHA512dd507376f769f418b116cdbc98682ccfeac2dae5da959d8886e5ab3adc363f32be12e9d9efea8dbc8499d2ec1863adc8dcdba56b53284534747af2ce34ad0f8a