Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
c5be2eaed2a940fa4b3545322ebac4a0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c5be2eaed2a940fa4b3545322ebac4a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
c5be2eaed2a940fa4b3545322ebac4a0_NeikiAnalytics.exe
-
Size
66KB
-
MD5
c5be2eaed2a940fa4b3545322ebac4a0
-
SHA1
280c79589508cc336c6b3bfe424c8e00b9ea3637
-
SHA256
64ef539c620423838fcb48120111f9b18c1e055d56738066779eeba3abd5a296
-
SHA512
82023191c21adb460c967c3b4df57210a8bdd9efea84a882d7d4c9a2232bdf9f9d61e2b8f3c200f5a85f8c2f6d34c066adb3f5944b5f5be47751fa5252751c2c
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXi511111111111111111111e:IeklMMYJhqezw/pXzH9i51111111111y
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral2/memory/3864-38-0x00000000753C0000-0x000000007551D000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4944 explorer.exe 1096 spoolsv.exe 3864 svchost.exe 1740 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe c5be2eaed2a940fa4b3545322ebac4a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2660 c5be2eaed2a940fa4b3545322ebac4a0_NeikiAnalytics.exe 2660 c5be2eaed2a940fa4b3545322ebac4a0_NeikiAnalytics.exe 4944 explorer.exe 4944 explorer.exe 4944 explorer.exe 4944 explorer.exe 4944 explorer.exe 4944 explorer.exe 4944 explorer.exe 4944 explorer.exe 3864 svchost.exe 3864 svchost.exe 3864 svchost.exe 3864 svchost.exe 4944 explorer.exe 4944 explorer.exe 3864 svchost.exe 3864 svchost.exe 4944 explorer.exe 4944 explorer.exe 3864 svchost.exe 3864 svchost.exe 4944 explorer.exe 4944 explorer.exe 3864 svchost.exe 3864 svchost.exe 4944 explorer.exe 4944 explorer.exe 3864 svchost.exe 3864 svchost.exe 4944 explorer.exe 4944 explorer.exe 3864 svchost.exe 3864 svchost.exe 4944 explorer.exe 4944 explorer.exe 3864 svchost.exe 3864 svchost.exe 4944 explorer.exe 4944 explorer.exe 3864 svchost.exe 3864 svchost.exe 4944 explorer.exe 4944 explorer.exe 3864 svchost.exe 3864 svchost.exe 4944 explorer.exe 4944 explorer.exe 3864 svchost.exe 3864 svchost.exe 4944 explorer.exe 4944 explorer.exe 3864 svchost.exe 3864 svchost.exe 4944 explorer.exe 4944 explorer.exe 3864 svchost.exe 3864 svchost.exe 4944 explorer.exe 4944 explorer.exe 3864 svchost.exe 3864 svchost.exe 4944 explorer.exe 4944 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4944 explorer.exe 3864 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2660 c5be2eaed2a940fa4b3545322ebac4a0_NeikiAnalytics.exe 2660 c5be2eaed2a940fa4b3545322ebac4a0_NeikiAnalytics.exe 4944 explorer.exe 4944 explorer.exe 1096 spoolsv.exe 1096 spoolsv.exe 3864 svchost.exe 3864 svchost.exe 1740 spoolsv.exe 1740 spoolsv.exe 4944 explorer.exe 4944 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2660 wrote to memory of 4944 2660 c5be2eaed2a940fa4b3545322ebac4a0_NeikiAnalytics.exe 83 PID 2660 wrote to memory of 4944 2660 c5be2eaed2a940fa4b3545322ebac4a0_NeikiAnalytics.exe 83 PID 2660 wrote to memory of 4944 2660 c5be2eaed2a940fa4b3545322ebac4a0_NeikiAnalytics.exe 83 PID 4944 wrote to memory of 1096 4944 explorer.exe 84 PID 4944 wrote to memory of 1096 4944 explorer.exe 84 PID 4944 wrote to memory of 1096 4944 explorer.exe 84 PID 1096 wrote to memory of 3864 1096 spoolsv.exe 85 PID 1096 wrote to memory of 3864 1096 spoolsv.exe 85 PID 1096 wrote to memory of 3864 1096 spoolsv.exe 85 PID 3864 wrote to memory of 1740 3864 svchost.exe 86 PID 3864 wrote to memory of 1740 3864 svchost.exe 86 PID 3864 wrote to memory of 1740 3864 svchost.exe 86 PID 3864 wrote to memory of 3976 3864 svchost.exe 88 PID 3864 wrote to memory of 3976 3864 svchost.exe 88 PID 3864 wrote to memory of 3976 3864 svchost.exe 88 PID 3864 wrote to memory of 2596 3864 svchost.exe 105 PID 3864 wrote to memory of 2596 3864 svchost.exe 105 PID 3864 wrote to memory of 2596 3864 svchost.exe 105 PID 3864 wrote to memory of 1560 3864 svchost.exe 114 PID 3864 wrote to memory of 1560 3864 svchost.exe 114 PID 3864 wrote to memory of 1560 3864 svchost.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5be2eaed2a940fa4b3545322ebac4a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c5be2eaed2a940fa4b3545322ebac4a0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3864 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
C:\Windows\SysWOW64\at.exeat 20:29 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3976
-
-
C:\Windows\SysWOW64\at.exeat 20:30 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2596
-
-
C:\Windows\SysWOW64\at.exeat 20:31 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1560
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5f7a17cc89d5d4b6e6aaf22525857eaf2
SHA1600996e880b03baef208347bf4968f5d1c180728
SHA256bcd184b5cb330ac746f4ecd2b3654840eb724aba3c8adefef1f64e79df71a3d9
SHA512dc4e1f848b37ab7e82bc1067d6114394600e59f9ec414dd8d7ac96e154fe5126d0c7359c739b7edc4fdcae3bf63d7c93450e604c530b8fedac23e68f80e8591e
-
Filesize
66KB
MD51f5d1a4b428bf445b59a7fddf51a33c9
SHA10e5dfabc2e3a4f75472843c56d2c3b8826218469
SHA2564a415aec7deeaa191620ad55f9d730115d1ecf638504f681506300ce8231f617
SHA5129d58d8c7b45d1dd4b4db744254729df5f10ca9436904439934c29dcb56f36ef5d603ff104c34312abbc018873f8e37c63d69b2b65e1871ce8b35b885339a1df4
-
Filesize
66KB
MD51653662b54956cc7de6cc9ad4ef3cb25
SHA1e68db818fa2692250b5388d54ea63861166abbc6
SHA256c267547e7bbc7bef5aa79f1b1ed9d28405a6153ce9abb148f68c0d31af704b9a
SHA5124e5272b6e36aae431d63a07fb67b2b0f9ada35aae731ec64bb42e857ee6c35a4ab7b52ce73ba2231c4a4a2c4ed5ddae3fa7b9cf27eff3175b4f21d55c6aba7e3
-
Filesize
66KB
MD5675ad07ed43cbb09f583dc8dde6a54c4
SHA1684b3aa6c0483283aa1f59978202cd7f8f089907
SHA25695863b54e0eaa412685eded7fd28f3d911059e5308dc127a0d075fb29571adbb
SHA5120a1c7843eb11176f4fbf2342344bfcbc71492664fff911043cd859e61097dc7f2fac0dc9b91292dc5d3898b745d53575b044785b8bedb030f49245efeeb61b1e