Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 11:11
Static task
static1
Behavioral task
behavioral1
Sample
3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe
-
Size
65KB
-
MD5
082459c751345ef3318b564fc94fbdd0
-
SHA1
5bac779dfdad36ea77a8714f26fadcc2b45dff9e
-
SHA256
3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef
-
SHA512
d5a454f0b367012a2e7d11a627b52f57d322b9022b17ce5b17dd66751be90744c2c728415931f793ef6ba6364ffd5498c8d1cb8d45dc9f2985fd766029604b70
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Oul:7WNqkOJWmo1HpM0MkTUmul
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral2/memory/2460-35-0x0000000074DE0000-0x0000000074F3D000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 5100 explorer.exe 692 spoolsv.exe 2460 svchost.exe 3016 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 2392 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 5100 explorer.exe 5100 explorer.exe 5100 explorer.exe 5100 explorer.exe 5100 explorer.exe 5100 explorer.exe 5100 explorer.exe 5100 explorer.exe 2460 svchost.exe 2460 svchost.exe 2460 svchost.exe 2460 svchost.exe 2460 svchost.exe 5100 explorer.exe 5100 explorer.exe 2460 svchost.exe 2460 svchost.exe 5100 explorer.exe 2460 svchost.exe 5100 explorer.exe 5100 explorer.exe 2460 svchost.exe 5100 explorer.exe 2460 svchost.exe 2460 svchost.exe 5100 explorer.exe 2460 svchost.exe 5100 explorer.exe 5100 explorer.exe 2460 svchost.exe 5100 explorer.exe 2460 svchost.exe 5100 explorer.exe 2460 svchost.exe 5100 explorer.exe 2460 svchost.exe 5100 explorer.exe 5100 explorer.exe 2460 svchost.exe 2460 svchost.exe 5100 explorer.exe 5100 explorer.exe 2460 svchost.exe 2460 svchost.exe 5100 explorer.exe 5100 explorer.exe 2460 svchost.exe 2460 svchost.exe 5100 explorer.exe 5100 explorer.exe 2460 svchost.exe 2460 svchost.exe 5100 explorer.exe 5100 explorer.exe 2460 svchost.exe 2460 svchost.exe 5100 explorer.exe 5100 explorer.exe 2460 svchost.exe 2460 svchost.exe 5100 explorer.exe 5100 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5100 explorer.exe 2460 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2392 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 2392 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 5100 explorer.exe 5100 explorer.exe 692 spoolsv.exe 692 spoolsv.exe 2460 svchost.exe 2460 svchost.exe 3016 spoolsv.exe 3016 spoolsv.exe 5100 explorer.exe 5100 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2392 wrote to memory of 5100 2392 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 83 PID 2392 wrote to memory of 5100 2392 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 83 PID 2392 wrote to memory of 5100 2392 3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe 83 PID 5100 wrote to memory of 692 5100 explorer.exe 84 PID 5100 wrote to memory of 692 5100 explorer.exe 84 PID 5100 wrote to memory of 692 5100 explorer.exe 84 PID 692 wrote to memory of 2460 692 spoolsv.exe 85 PID 692 wrote to memory of 2460 692 spoolsv.exe 85 PID 692 wrote to memory of 2460 692 spoolsv.exe 85 PID 2460 wrote to memory of 3016 2460 svchost.exe 86 PID 2460 wrote to memory of 3016 2460 svchost.exe 86 PID 2460 wrote to memory of 3016 2460 svchost.exe 86 PID 2460 wrote to memory of 2556 2460 svchost.exe 88 PID 2460 wrote to memory of 2556 2460 svchost.exe 88 PID 2460 wrote to memory of 2556 2460 svchost.exe 88 PID 2460 wrote to memory of 1112 2460 svchost.exe 102 PID 2460 wrote to memory of 1112 2460 svchost.exe 102 PID 2460 wrote to memory of 1112 2460 svchost.exe 102 PID 2460 wrote to memory of 3200 2460 svchost.exe 110 PID 2460 wrote to memory of 3200 2460 svchost.exe 110 PID 2460 wrote to memory of 3200 2460 svchost.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3d364486f01d9f10416d369463b5d5fa097192602634dbcd85fd59b75f78dcef_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5100 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:692 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3016
-
-
C:\Windows\SysWOW64\at.exeat 11:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2556
-
-
C:\Windows\SysWOW64\at.exeat 11:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1112
-
-
C:\Windows\SysWOW64\at.exeat 11:15 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3200
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD53369b1354203d4d70cc3d0990d0e2ae4
SHA1d01b8039262a39a4389eb33af58caf893bbab4ba
SHA256f1cfa27a74fb85fe3a595bd81c48b56417c63ddc880ff4bae8ea1731eca761ae
SHA51229266ff978bd5987d43d6943bebec84bb6634484015ff300d5ccb5b7c69e70208acae4fd6fccaeb114f549dcf1a9b897fae2b4a98e7d4c6d5afa4a0aedec6afd
-
Filesize
65KB
MD56a1824a5a3417b5a96214379125755e4
SHA12e1b84989b5a21dfc33d2616f427fa6f97ff4013
SHA2560e72de8f7ee01701a3eacdeb3b68cf9c51370ba9e7281c46ac9f280b886c31df
SHA51213989620dc9aaf1132deaa1a2251a45ceb3f08e09e17260da137443baf3388635a1747af139a17eb095555ad394aef828ec97a6f7c9ec1125e61820bb664549e
-
Filesize
65KB
MD56a15e02f921c3c75701ff5f6e03f8f38
SHA1507547c7f74305bb966c4ecc0f6e1e8a5003de6c
SHA256c1e2ddab24e4f6ec5f892a063d9f8117574e57a68aa778838837134b380da1a4
SHA51263a9c0d59b1ef9fef9ca3547d39be3ac1cd1ec7018b2bcd3266046e4e727af120c782914a2d99249a4c7d4864ecbba9468e9a1853137c1980a28d1c68df5296e
-
Filesize
65KB
MD5bde5254d9854efe9d6bb3f726b673934
SHA1858ac9eab8c5f671a2d065f7a6571230daac5607
SHA25663af883763dc56885f7d9d9bc9b8b6df16e236f6b9a7150348b541da29c8511d
SHA512e4d6d7d46d6636ee666b500a6b14e22ea908b655cda35bea4dca6908754f299044254697577b3c1e2c611e8904bb5e916a153464d6cc1fb1745df67f46fe5e95