Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe
-
Size
66KB
-
MD5
eb64873d877969358cb324f6fc35bea0
-
SHA1
e53ab8e99b0a097f7c473a9c542eb5dcbae315bb
-
SHA256
9ee06eb562f51b3ca0b44d019a25339363f5f07df8ac99eee70145cba8eda904
-
SHA512
fa9968d50e2d50d6cd096c3fc631b975acad5153142f26ad89b77dd72472c41aef717ff627075d334263d1492000085201f5836b9052333a06a9acc45799d94c
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiaNNNNNNNNNNNNNNNNNNNNX:IeklMMYJhqezw/pXzH9iaNNNNNNNNNNX
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral1/memory/3008-55-0x0000000072940000-0x0000000072A93000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2988 explorer.exe 2708 spoolsv.exe 3008 svchost.exe 2496 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2368 eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe 2368 eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe 2988 explorer.exe 2988 explorer.exe 2708 spoolsv.exe 2708 spoolsv.exe 3008 svchost.exe 3008 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2368 eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 2988 explorer.exe 3008 svchost.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe 3008 svchost.exe 2988 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2988 explorer.exe 3008 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2368 eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe 2368 eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe 2988 explorer.exe 2988 explorer.exe 2708 spoolsv.exe 2708 spoolsv.exe 3008 svchost.exe 3008 svchost.exe 2496 spoolsv.exe 2496 spoolsv.exe 2988 explorer.exe 2988 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2988 2368 eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe 28 PID 2368 wrote to memory of 2988 2368 eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe 28 PID 2368 wrote to memory of 2988 2368 eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe 28 PID 2368 wrote to memory of 2988 2368 eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe 28 PID 2988 wrote to memory of 2708 2988 explorer.exe 29 PID 2988 wrote to memory of 2708 2988 explorer.exe 29 PID 2988 wrote to memory of 2708 2988 explorer.exe 29 PID 2988 wrote to memory of 2708 2988 explorer.exe 29 PID 2708 wrote to memory of 3008 2708 spoolsv.exe 30 PID 2708 wrote to memory of 3008 2708 spoolsv.exe 30 PID 2708 wrote to memory of 3008 2708 spoolsv.exe 30 PID 2708 wrote to memory of 3008 2708 spoolsv.exe 30 PID 3008 wrote to memory of 2496 3008 svchost.exe 31 PID 3008 wrote to memory of 2496 3008 svchost.exe 31 PID 3008 wrote to memory of 2496 3008 svchost.exe 31 PID 3008 wrote to memory of 2496 3008 svchost.exe 31 PID 3008 wrote to memory of 2944 3008 svchost.exe 32 PID 3008 wrote to memory of 2944 3008 svchost.exe 32 PID 3008 wrote to memory of 2944 3008 svchost.exe 32 PID 3008 wrote to memory of 2944 3008 svchost.exe 32 PID 3008 wrote to memory of 2980 3008 svchost.exe 36 PID 3008 wrote to memory of 2980 3008 svchost.exe 36 PID 3008 wrote to memory of 2980 3008 svchost.exe 36 PID 3008 wrote to memory of 2980 3008 svchost.exe 36 PID 3008 wrote to memory of 1788 3008 svchost.exe 38 PID 3008 wrote to memory of 1788 3008 svchost.exe 38 PID 3008 wrote to memory of 1788 3008 svchost.exe 38 PID 3008 wrote to memory of 1788 3008 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\eb64873d877969358cb324f6fc35bea0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2496
-
-
C:\Windows\SysWOW64\at.exeat 01:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2944
-
-
C:\Windows\SysWOW64\at.exeat 01:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2980
-
-
C:\Windows\SysWOW64\at.exeat 01:15 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1788
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD50732124fa835d051c1a29a0de03c42f1
SHA17fef1c17bb8a787e92bc5d291d3410d82944b095
SHA25677904f03dafa77c13cf492dbb6f4de8d37de2a287797d5ee27009d089a7b0069
SHA512e4bc99df87ecf75c5f96b416a483ea37896b007abfcf793cb6725c8eff30f3185237c76a7315898ab0409191b1bf6ec595b982e4fa13813d3976586f1400019b
-
Filesize
66KB
MD56bec62c9599ef4296f1c6ebccd6ae593
SHA151db14e7dc53e52f02b202f732ef7987aa8173d0
SHA2563e00a675fafd776623b5b930ace370331ddc1980c91c5a7e7b9042cd7c453abc
SHA5126f4df8718f8750bcbcd2b5792d8172c2dfdfb5ce011df3ad9a0254c42fa98d0c5231ed5d2a731210f970f1e84ccb2807fa89b6c8af435f8b075e8b4402413703
-
Filesize
66KB
MD5f7c7073e260b53e1532f2787458c7657
SHA14ad11ed06c65cbd3198a0784d3b38257a94552bd
SHA2564aef4a0e37386a5c5f03252321301858623c61e4599efc81be6315d0dbdbac67
SHA512c10734067f4fe00675ebf8558123d63516a30b7b0b89bab0a5e5f1705a67e7b338de2635bd2b476a64bc7ae90b6e3c8be7f561a2bce59f02057e5e93b64166fb
-
Filesize
66KB
MD536e5e4091e8a1cc9df1a5f98f6a39a2f
SHA100420bfbf017150acd8b695de0743f1f4169d8e8
SHA256a5036e41b61d6580cc16f5d7fbfe2f98d83b761a77b25f3a485f33898d475531
SHA512476d47b5e536859f67d5de5cb19dd69e8a211195e87cbe8032bb91f16c9d169028b17e4d6c6e5a61d50af610187929db2933ce88a8b9628be1f1caeb7acb59fd