Analysis
-
max time kernel
150s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exe
-
Size
65KB
-
MD5
37fb2a09a4a643cace8f4676cc838a70
-
SHA1
1682e4be6bd40d1eca2c36bdf65bef8400fdd01d
-
SHA256
725170bf2391fec3b2c4e9140fe18e0ec462f5e3233d047412ec61f9217eba32
-
SHA512
aefa22382c2cf095b2f00429f4939cbc663608abcefe628de800f6ccdb4e452f165c3bd1990a26c01e54c40edd049d14c97f914638ba67e30fc55a57f4be64a9
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/OuH:7WNqkOJWmo1HpM0MkTUmuH
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
Processes:
resource yara_rule behavioral2/memory/1676-38-0x0000000074FC0000-0x000000007511D000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 5920 explorer.exe 1356 spoolsv.exe 1676 svchost.exe 5628 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
Processes:
37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe 37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exeexplorer.exesvchost.exepid process 1124 37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exe 1124 37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 1676 svchost.exe 5920 explorer.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 1676 svchost.exe 5920 explorer.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe 5920 explorer.exe 1676 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 5920 explorer.exe 1676 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1124 37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exe 1124 37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exe 5920 explorer.exe 5920 explorer.exe 1356 spoolsv.exe 1356 spoolsv.exe 1676 svchost.exe 1676 svchost.exe 5628 spoolsv.exe 5628 spoolsv.exe 5920 explorer.exe 5920 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 1124 wrote to memory of 5920 1124 37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exe explorer.exe PID 1124 wrote to memory of 5920 1124 37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exe explorer.exe PID 1124 wrote to memory of 5920 1124 37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exe explorer.exe PID 5920 wrote to memory of 1356 5920 explorer.exe spoolsv.exe PID 5920 wrote to memory of 1356 5920 explorer.exe spoolsv.exe PID 5920 wrote to memory of 1356 5920 explorer.exe spoolsv.exe PID 1356 wrote to memory of 1676 1356 spoolsv.exe svchost.exe PID 1356 wrote to memory of 1676 1356 spoolsv.exe svchost.exe PID 1356 wrote to memory of 1676 1356 spoolsv.exe svchost.exe PID 1676 wrote to memory of 5628 1676 svchost.exe spoolsv.exe PID 1676 wrote to memory of 5628 1676 svchost.exe spoolsv.exe PID 1676 wrote to memory of 5628 1676 svchost.exe spoolsv.exe PID 1676 wrote to memory of 1832 1676 svchost.exe at.exe PID 1676 wrote to memory of 1832 1676 svchost.exe at.exe PID 1676 wrote to memory of 1832 1676 svchost.exe at.exe PID 1676 wrote to memory of 3348 1676 svchost.exe at.exe PID 1676 wrote to memory of 3348 1676 svchost.exe at.exe PID 1676 wrote to memory of 3348 1676 svchost.exe at.exe PID 1676 wrote to memory of 2852 1676 svchost.exe at.exe PID 1676 wrote to memory of 2852 1676 svchost.exe at.exe PID 1676 wrote to memory of 2852 1676 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\37fb2a09a4a643cace8f4676cc838a70_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5920 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5628 -
C:\Windows\SysWOW64\at.exeat 20:49 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1832
-
C:\Windows\SysWOW64\at.exeat 20:50 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3348
-
C:\Windows\SysWOW64\at.exeat 20:51 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2852
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5892cb4ec44088d20eb8665c6147624a3
SHA118166d958a95be64264d1399913ceced362d9b52
SHA256484284945e81f47fcc143f7c25a73887c8468bf443f9bd4a37919c4e9eb888ae
SHA5127bdf90b234eba1466b790e8210509648eb4448cdd6ad6d2bc264dfcf3c1c191a63c7083876a3bfdbf0382541b6782ae8b02fe42b42f99f5c8be38019d17495eb
-
Filesize
65KB
MD59f07049d7189916fc9ef9831d03c6a75
SHA10110d527feab9552ba7b057b0284bfd670cd9262
SHA256ede8d8a41932413c3232f741ef415f2fe0bf45c4420c0ae1d25c80be47a3e485
SHA5121e25c16d90e2c118889acda11d231b008666ba05515e1293d892141824725351bd12c4403b7f1e362ff7458aff3c69903caecfc613982dd51f2e31d28bed3304
-
Filesize
65KB
MD53b3598615290358a07a24c45033b5722
SHA190368519f6bcb5988f74d51930ab2543420a6d96
SHA256c55d971a7e6791ee45f625366e4e9627e271572be584b3bce7aa560eea345624
SHA5124c7569be9dcd85ea03da78d5f2f23d8a48497c5cef5bb22866b019abac7ac13c467e2770ff285e7664930c3d8294d282a3611e840436e4d2f14d70bf045161cd
-
Filesize
65KB
MD52d1f2f100dbfb98b6c49874a7ee34452
SHA124b9b152c75086569a874cf04debf3790c892879
SHA2564ff0d09db3334465bd45465d8a7d565c75444b1de566d5f7ab83c1d54fe5e57c
SHA5128973e7f3c51f1799835d02959a3902d8632fb043f54de1fe1c663bb5a1ee8cec4d6850be312b9a242ca8b1cef1a6f37b8bb7f2a06b7a8d35261cdb83d9ac5a1c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e