Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 09:40
Static task
static1
Behavioral task
behavioral1
Sample
0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe
-
Size
66KB
-
MD5
0fa1eca4e2d944d64eed15f0185e6270
-
SHA1
db36b7720d954d51199ba3c6ea5874d14a65bf29
-
SHA256
14b0b3a0b564441b3a46c18399ddbf56580e34198606a5b24229a11b0b6aad8d
-
SHA512
a44b574383028330bf840cfe77f58e81ed0ee6dcfb0e9bc953b7b8363a9dbec25deb3aa3d1035234fb18d9bae64628db018f7e5baeb3238338a431b64131563f
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXie:IeklMMYJhqezw/pXzH9ie
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
Processes:
resource yara_rule behavioral1/memory/2776-57-0x0000000072940000-0x0000000072A93000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 2840 explorer.exe 2772 spoolsv.exe 2776 svchost.exe 2552 spoolsv.exe -
Loads dropped DLL 8 IoCs
Processes:
0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exepid process 1312 0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe 1312 0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe 2840 explorer.exe 2840 explorer.exe 2772 spoolsv.exe 2772 spoolsv.exe 2776 svchost.exe 2776 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
Processes:
0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe 0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exeexplorer.exesvchost.exepid process 1312 0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2840 explorer.exe 2776 svchost.exe 2840 explorer.exe 2776 svchost.exe 2840 explorer.exe 2776 svchost.exe 2840 explorer.exe 2840 explorer.exe 2776 svchost.exe 2840 explorer.exe 2776 svchost.exe 2776 svchost.exe 2840 explorer.exe 2840 explorer.exe 2776 svchost.exe 2776 svchost.exe 2840 explorer.exe 2776 svchost.exe 2840 explorer.exe 2776 svchost.exe 2840 explorer.exe 2840 explorer.exe 2776 svchost.exe 2840 explorer.exe 2776 svchost.exe 2776 svchost.exe 2840 explorer.exe 2776 svchost.exe 2840 explorer.exe 2840 explorer.exe 2776 svchost.exe 2776 svchost.exe 2840 explorer.exe 2776 svchost.exe 2840 explorer.exe 2776 svchost.exe 2840 explorer.exe 2840 explorer.exe 2776 svchost.exe 2776 svchost.exe 2840 explorer.exe 2840 explorer.exe 2776 svchost.exe 2840 explorer.exe 2776 svchost.exe 2776 svchost.exe 2840 explorer.exe 2840 explorer.exe 2776 svchost.exe 2776 svchost.exe 2840 explorer.exe 2840 explorer.exe 2776 svchost.exe 2840 explorer.exe 2776 svchost.exe 2776 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 2840 explorer.exe 2776 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1312 0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe 1312 0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe 2840 explorer.exe 2840 explorer.exe 2772 spoolsv.exe 2772 spoolsv.exe 2776 svchost.exe 2776 svchost.exe 2552 spoolsv.exe 2552 spoolsv.exe 2840 explorer.exe 2840 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 1312 wrote to memory of 2840 1312 0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe explorer.exe PID 1312 wrote to memory of 2840 1312 0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe explorer.exe PID 1312 wrote to memory of 2840 1312 0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe explorer.exe PID 1312 wrote to memory of 2840 1312 0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe explorer.exe PID 2840 wrote to memory of 2772 2840 explorer.exe spoolsv.exe PID 2840 wrote to memory of 2772 2840 explorer.exe spoolsv.exe PID 2840 wrote to memory of 2772 2840 explorer.exe spoolsv.exe PID 2840 wrote to memory of 2772 2840 explorer.exe spoolsv.exe PID 2772 wrote to memory of 2776 2772 spoolsv.exe svchost.exe PID 2772 wrote to memory of 2776 2772 spoolsv.exe svchost.exe PID 2772 wrote to memory of 2776 2772 spoolsv.exe svchost.exe PID 2772 wrote to memory of 2776 2772 spoolsv.exe svchost.exe PID 2776 wrote to memory of 2552 2776 svchost.exe spoolsv.exe PID 2776 wrote to memory of 2552 2776 svchost.exe spoolsv.exe PID 2776 wrote to memory of 2552 2776 svchost.exe spoolsv.exe PID 2776 wrote to memory of 2552 2776 svchost.exe spoolsv.exe PID 2776 wrote to memory of 1448 2776 svchost.exe at.exe PID 2776 wrote to memory of 1448 2776 svchost.exe at.exe PID 2776 wrote to memory of 1448 2776 svchost.exe at.exe PID 2776 wrote to memory of 1448 2776 svchost.exe at.exe PID 2776 wrote to memory of 1636 2776 svchost.exe at.exe PID 2776 wrote to memory of 1636 2776 svchost.exe at.exe PID 2776 wrote to memory of 1636 2776 svchost.exe at.exe PID 2776 wrote to memory of 1636 2776 svchost.exe at.exe PID 2776 wrote to memory of 1076 2776 svchost.exe at.exe PID 2776 wrote to memory of 1076 2776 svchost.exe at.exe PID 2776 wrote to memory of 1076 2776 svchost.exe at.exe PID 2776 wrote to memory of 1076 2776 svchost.exe at.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0fa1eca4e2d944d64eed15f0185e6270_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2552 -
C:\Windows\SysWOW64\at.exeat 09:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1448
-
C:\Windows\SysWOW64\at.exeat 09:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1636
-
C:\Windows\SysWOW64\at.exeat 09:44 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1076
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5b0839df570785cfc4b52fcb57a074750
SHA124920e7b413f0e4455154862972a9bfe602cb241
SHA256e21be183e7b21faf4531d80e43ba55f1f1892febd758f5a92349e16083d8f917
SHA5123947796885a81766840aac5923d2deb3b254c5fdf8080d6e6cb3a954d93aa6b5efe0b24e8d1d6b612ef396d3d5fc6d2b2f8a9cc42b3ded5de2372411803ca4d8
-
Filesize
66KB
MD5cbfd515336bfec8f29067d68ca7fe2f6
SHA155edd007e1700575be37725ca1b0a9c4506ba0b2
SHA25628240ca2b730928ad3aeae4c80c7748a603f556fcd7b068bebf5505a7281ab0a
SHA51229dae0e5588f1d10d0b0fc0b77fd39b2443815f3348e17775a9ee8cb26e92813698deb43e3ac34f87551d07d7812a66b92ec7c5c4fa29bfd5f4c3f7b4786b187
-
Filesize
66KB
MD5cea3aaeb329ae7e6af153d83908723ec
SHA156c3aa853cc8275f50814d866ff071b30d5b2e9c
SHA256c34de5aa3b1a3bd4c728cd83c87b7aa18b1f7cde3a506e1af55e3369e0f4cf35
SHA51208a180541485edd1f638513a0f8f979f8fb42cdb059a876c86a05bd92803917b17b42bcd12c0fbd64d13979990c30512888d2cef6196f65499a0f1845db6e420
-
Filesize
66KB
MD5ba5813d65b27dbc8ceb4dcd7128e9d91
SHA17ae8268fa0eb5271eafea106b0ca869dbe8c321c
SHA2567d9c994627baf7f379a02b503609ffc1ee9a3fab9611ffffa498e2d38af6ca6a
SHA5122d31dba7b5dd78518a7ae8569298ef092768fd96a8d74c20bf012d26d84a60da443fd224c7af00143a03c4774e5c8104a147bb355d6f9d669d081367f8aa2cde