Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe
-
Size
65KB
-
MD5
7047935da79e72c80dcb04217a2d2160
-
SHA1
a1a4185e8170687463b31d0b2db8b30f55787f31
-
SHA256
8f14b3c7d0314cc0c831a7efcf9c33f55312eb426baed4129cbfec03124d73ec
-
SHA512
4bbb10fa969c6a3c1b32008179e3369daf8220caa9c01b05bd7c6ae0da2a56d9b8526e9e5cda3bbbe7dc822520eec6fde9f35f0fea3c11f64a2dea0c3315a5ee
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Ou6VVVVVVVVVVVVVVVVVVX:7WNqkOJWmo1HpM0MkTUmu6VVVVVVVVVp
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
Processes:
resource yara_rule behavioral1/memory/2664-56-0x0000000072940000-0x0000000072A93000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 3048 explorer.exe 2840 spoolsv.exe 2664 svchost.exe 2616 spoolsv.exe -
Loads dropped DLL 8 IoCs
Processes:
7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exepid process 1704 7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe 1704 7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe 3048 explorer.exe 3048 explorer.exe 2840 spoolsv.exe 2840 spoolsv.exe 2664 svchost.exe 2664 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
Processes:
explorer.exesvchost.exe7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exeexplorer.exesvchost.exepid process 1704 7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 3048 explorer.exe 2664 svchost.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe 2664 svchost.exe 3048 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 3048 explorer.exe 2664 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1704 7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe 1704 7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe 3048 explorer.exe 3048 explorer.exe 2840 spoolsv.exe 2840 spoolsv.exe 2664 svchost.exe 2664 svchost.exe 2616 spoolsv.exe 2616 spoolsv.exe 3048 explorer.exe 3048 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 1704 wrote to memory of 3048 1704 7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe explorer.exe PID 1704 wrote to memory of 3048 1704 7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe explorer.exe PID 1704 wrote to memory of 3048 1704 7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe explorer.exe PID 1704 wrote to memory of 3048 1704 7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe explorer.exe PID 3048 wrote to memory of 2840 3048 explorer.exe spoolsv.exe PID 3048 wrote to memory of 2840 3048 explorer.exe spoolsv.exe PID 3048 wrote to memory of 2840 3048 explorer.exe spoolsv.exe PID 3048 wrote to memory of 2840 3048 explorer.exe spoolsv.exe PID 2840 wrote to memory of 2664 2840 spoolsv.exe svchost.exe PID 2840 wrote to memory of 2664 2840 spoolsv.exe svchost.exe PID 2840 wrote to memory of 2664 2840 spoolsv.exe svchost.exe PID 2840 wrote to memory of 2664 2840 spoolsv.exe svchost.exe PID 2664 wrote to memory of 2616 2664 svchost.exe spoolsv.exe PID 2664 wrote to memory of 2616 2664 svchost.exe spoolsv.exe PID 2664 wrote to memory of 2616 2664 svchost.exe spoolsv.exe PID 2664 wrote to memory of 2616 2664 svchost.exe spoolsv.exe PID 2664 wrote to memory of 496 2664 svchost.exe at.exe PID 2664 wrote to memory of 496 2664 svchost.exe at.exe PID 2664 wrote to memory of 496 2664 svchost.exe at.exe PID 2664 wrote to memory of 496 2664 svchost.exe at.exe PID 2664 wrote to memory of 1320 2664 svchost.exe at.exe PID 2664 wrote to memory of 1320 2664 svchost.exe at.exe PID 2664 wrote to memory of 1320 2664 svchost.exe at.exe PID 2664 wrote to memory of 1320 2664 svchost.exe at.exe PID 2664 wrote to memory of 444 2664 svchost.exe at.exe PID 2664 wrote to memory of 444 2664 svchost.exe at.exe PID 2664 wrote to memory of 444 2664 svchost.exe at.exe PID 2664 wrote to memory of 444 2664 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7047935da79e72c80dcb04217a2d2160_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Windows\SysWOW64\at.exeat 01:46 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:496
-
C:\Windows\SysWOW64\at.exeat 01:47 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1320
-
C:\Windows\SysWOW64\at.exeat 01:48 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:444
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5060dca1298e3fb341414c3ca7908f763
SHA10aaf4d57941a8c9787f7d1e55662ba92d6deecbf
SHA2567eef2ecb28de9e2cdf1abf244ba455e1c98cc5e054588fdb2707203d88fa2939
SHA512dc0385565a98523d0779e7360e089309690afc5074e7d287e6e8098a9b31560b92b732866e0abb76cefb6f52e425fdd368de4ebc73687694942161a8823cfd29
-
Filesize
65KB
MD5772fd1bf71f2d4ab8f797f381cc539a5
SHA1fea66ab4f1c14ecaef1d1ac9ceea74ea02c54aeb
SHA25693ebf6741de31c6d75551c0d6bedc8d3d025b7b5244f67daffe3ce373b4d578c
SHA512887d055137d993a2128e4764f05f18eec9373fffe2122cd3fcc00643f4fc990d73dd153c35b276578ae54c5bce9ba3a77cafe7759e428e657fdf8957f4fc2194
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
65KB
MD51a6ad4a315b5c96a7d32691f2e420b13
SHA1ec3379f3f4cc38b82753ceb104dbbbea0dcb7e82
SHA256e7265f9856059ee76c90963e9e47fd027739e750e2802ae1b9799093282773f1
SHA5128330f1b2a4d4b0066b7a861456e6dfee57e4cd5ea2fb58fea061f5b711a90d5c1e848fefeca7844e2fa3cbb0028c2a32d7d2bf2238f7a16f3df0c6e213ecb80b
-
Filesize
65KB
MD5f2e8e91ed21c96505131dc85119c339d
SHA1d0aaf35ba8d0f6b8c709e0a681a5c07acc54e1a6
SHA256256d99d57a9cfac0fe7531b804402cd9c2ab2c3f7ba7c6fa23c6003ccedad678
SHA51288f0294305221bab0ff2d3343d7ba7471816b9171af70d6674a3dff109e4323fbee713cea22479a401e2811ff28cb8bfdb814e6eeec4b7cb3c062e3cfebab4ea