Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 09:16

General

  • Target

    fe1a7571c9807b27e8776e1349733430_NeikiAnalytics.exe

  • Size

    65KB

  • MD5

    fe1a7571c9807b27e8776e1349733430

  • SHA1

    d3aa49a8533a2cfdf31ae694ab56139ee06c544a

  • SHA256

    331a08fff9e8d20fc5db7ce52ac5a0f1051bde9b84ab91e2d41d3042670c1337

  • SHA512

    e6641b0ce17bfd8c3d115b830f95611d76acd995f05a503e7e1cbff48201ee9980b8911632bda0121aef92ed98eb968c60ac4e9d8f815e8208a0ad2ee2f7d65b

  • SSDEEP

    1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/OuP:7WNqkOJWmo1HpM0MkTUmuP

Malware Config

Signatures

  • Detects BazaLoader malware 1 IoCs

    BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe1a7571c9807b27e8776e1349733430_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\fe1a7571c9807b27e8776e1349733430_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2204
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2116
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2420
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2552
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2300
          • C:\Windows\SysWOW64\at.exe
            at 09:18 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:2320
            • C:\Windows\SysWOW64\at.exe
              at 09:19 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:2644
              • C:\Windows\SysWOW64\at.exe
                at 09:20 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:856

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          65KB

          MD5

          db41377a731650b0d90666cf0e2195e7

          SHA1

          1420dc90692a840bde6cabffa7222238a1c554a3

          SHA256

          dea3f82c2a3300ed08334b2baf0f7facdf36841912d21f5d83ce3b7f065657bf

          SHA512

          1a5f75c91640dda4129a04a7f6eaa20d76f0a7a447b77f65ddf95c7adda7ec1658250bb6691d04e796a7f14db523bd4be14526c918cee2bd7bf38ddaa09c15df

        • C:\Windows\system\spoolsv.exe

          Filesize

          65KB

          MD5

          73873040c5eccd3d1b3a82e59c5a243a

          SHA1

          860643e22cdca2d0e3e210c53c40ba90124a502a

          SHA256

          fbdf5586cfc5046a772f979e8c2474d5659188dbb4414464d517e7e1e20830b7

          SHA512

          2d2b9710834129abd9795c759b9b605244c54dbff7a974914004c8a34c772df27011a8937e5ff36d5ef16ef78e34f38b4c2a414666f1a61739de78849bebc8af

        • \Windows\system\explorer.exe

          Filesize

          65KB

          MD5

          1deb19963cad83fa61b32c8275589f9b

          SHA1

          56f770d80068601c31cde55243ce192b271859d8

          SHA256

          2f09cdc04cc42a5323137a6c84bd96696094350813ca9ec34d411ab66ccbfca2

          SHA512

          2bb111d988b43b130b98a8744eb56b81f2bb3fb9bf0e13bdd11f73a6a0d59d723121e5300f62e8b74ee1de498305441c9a170051bd6269e83ece847799588ee2

        • \Windows\system\svchost.exe

          Filesize

          65KB

          MD5

          210574c08ab3e354470c3255ba24264b

          SHA1

          a9badb96211a6da151ba57cbbff9e43ca7b3e2cb

          SHA256

          01fccce6c8e4bb701c845c9428541c35c469ffcb4614c375e99f9ae9c87b8965

          SHA512

          1c6028ea07f952008aa3c714ae003c21de4417157355d16a2921ddb6d3eb50511b8fcc087155dcdc9815f369cefff212c25aede4a9fa9e935ee60e3f39b5afeb

        • memory/2116-19-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2116-36-0x0000000002C10000-0x0000000002C41000-memory.dmp

          Filesize

          196KB

        • memory/2116-83-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2116-94-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2116-20-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2116-28-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2204-2-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2204-3-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2204-16-0x0000000002C70000-0x0000000002CA1000-memory.dmp

          Filesize

          196KB

        • memory/2204-17-0x0000000002C70000-0x0000000002CA1000-memory.dmp

          Filesize

          196KB

        • memory/2204-1-0x0000000000020000-0x0000000000024000-memory.dmp

          Filesize

          16KB

        • memory/2204-4-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/2204-81-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/2204-80-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2204-0-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2204-66-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/2204-57-0x0000000000020000-0x0000000000024000-memory.dmp

          Filesize

          16KB

        • memory/2300-69-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2300-75-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2420-79-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2420-60-0x00000000027A0000-0x00000000027D1000-memory.dmp

          Filesize

          196KB

        • memory/2420-43-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2420-38-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2420-37-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2552-54-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2552-67-0x0000000001EE0000-0x0000000001F11000-memory.dmp

          Filesize

          196KB

        • memory/2552-61-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2552-63-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2552-85-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB