Analysis
-
max time kernel
150s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
84724ce7f6587326f35e8cca361b8dc0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
84724ce7f6587326f35e8cca361b8dc0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
84724ce7f6587326f35e8cca361b8dc0_NeikiAnalytics.exe
-
Size
66KB
-
MD5
84724ce7f6587326f35e8cca361b8dc0
-
SHA1
be241b027c2537b6cd701ef983123525b6606b41
-
SHA256
e39a2a092af3e3bbc81910a22bee932437896f9a3b99bbf16ab3bf3778081910
-
SHA512
dced82edde223517781bb98358de19cb982d55dd20ea1379d92663958a69cc243397be3f495c201e5601f7705d49026b48d05c7a419dec846c7ca69247a43e5a
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiXSSSSSSSSSSSSSSSSSSSSv:IeklMMYJhqezw/pXzH9iXSSSSSSSSSSH
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral2/memory/5044-36-0x00000000756B0000-0x000000007580D000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2284 explorer.exe 3840 spoolsv.exe 5044 svchost.exe 1492 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 84724ce7f6587326f35e8cca361b8dc0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4408 84724ce7f6587326f35e8cca361b8dc0_NeikiAnalytics.exe 4408 84724ce7f6587326f35e8cca361b8dc0_NeikiAnalytics.exe 2284 explorer.exe 2284 explorer.exe 2284 explorer.exe 2284 explorer.exe 2284 explorer.exe 2284 explorer.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 5044 svchost.exe 5044 svchost.exe 5044 svchost.exe 2284 explorer.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 5044 svchost.exe 2284 explorer.exe 2284 explorer.exe 5044 svchost.exe 5044 svchost.exe 2284 explorer.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 2284 explorer.exe 5044 svchost.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 2284 explorer.exe 5044 svchost.exe 5044 svchost.exe 2284 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2284 explorer.exe 5044 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4408 84724ce7f6587326f35e8cca361b8dc0_NeikiAnalytics.exe 4408 84724ce7f6587326f35e8cca361b8dc0_NeikiAnalytics.exe 2284 explorer.exe 2284 explorer.exe 3840 spoolsv.exe 3840 spoolsv.exe 5044 svchost.exe 5044 svchost.exe 1492 spoolsv.exe 1492 spoolsv.exe 2284 explorer.exe 2284 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4408 wrote to memory of 2284 4408 84724ce7f6587326f35e8cca361b8dc0_NeikiAnalytics.exe 84 PID 4408 wrote to memory of 2284 4408 84724ce7f6587326f35e8cca361b8dc0_NeikiAnalytics.exe 84 PID 4408 wrote to memory of 2284 4408 84724ce7f6587326f35e8cca361b8dc0_NeikiAnalytics.exe 84 PID 2284 wrote to memory of 3840 2284 explorer.exe 86 PID 2284 wrote to memory of 3840 2284 explorer.exe 86 PID 2284 wrote to memory of 3840 2284 explorer.exe 86 PID 3840 wrote to memory of 5044 3840 spoolsv.exe 87 PID 3840 wrote to memory of 5044 3840 spoolsv.exe 87 PID 3840 wrote to memory of 5044 3840 spoolsv.exe 87 PID 5044 wrote to memory of 1492 5044 svchost.exe 89 PID 5044 wrote to memory of 1492 5044 svchost.exe 89 PID 5044 wrote to memory of 1492 5044 svchost.exe 89 PID 5044 wrote to memory of 4952 5044 svchost.exe 90 PID 5044 wrote to memory of 4952 5044 svchost.exe 90 PID 5044 wrote to memory of 4952 5044 svchost.exe 90 PID 5044 wrote to memory of 2848 5044 svchost.exe 101 PID 5044 wrote to memory of 2848 5044 svchost.exe 101 PID 5044 wrote to memory of 2848 5044 svchost.exe 101 PID 5044 wrote to memory of 3576 5044 svchost.exe 103 PID 5044 wrote to memory of 3576 5044 svchost.exe 103 PID 5044 wrote to memory of 3576 5044 svchost.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\84724ce7f6587326f35e8cca361b8dc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\84724ce7f6587326f35e8cca361b8dc0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4408 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3840 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5044 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
C:\Windows\SysWOW64\at.exeat 09:51 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4952
-
-
C:\Windows\SysWOW64\at.exeat 09:52 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2848
-
-
C:\Windows\SysWOW64\at.exeat 09:53 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3576
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD53c70f6a0412f59402ba1f61531a6100e
SHA10c229a5c5921d8f074d2b03730df10e924e91e2c
SHA256931d57aff4f4b5e3dbf0b1c77567a47243f77fdb5c9287cb55c18c0760c58edd
SHA5125db398f2fc7065e053a3adb0615c0f96b3b2931102eadc3423cfee0e186cdaea5a4e67696e55cfa56a0b366c1b2635a34167ffce350d4df1d22e303b1634f850
-
Filesize
66KB
MD5fb9c79b1e8c3a3973a7c55e3d740fd95
SHA1c312c3d376aa331b91e165b8ad13dbd487d96591
SHA2566573b9a401d0bbf27aeb9b5880e8f6f0925f51d17c9fc8ae6c26def4d0cde7b9
SHA51283f9e8c860191277548fbcf25f9b4c2ef942f475aefd13ec32307d92d00a841a0c4f15fc71e017cf68aa25841e582443c7dee6ab6ce76d47f8247fe97852a0e0
-
Filesize
66KB
MD5aa7043c794b4621dfed068047da4f32d
SHA1ffbcdd4d81b65854ec24f90aac19040f674948e1
SHA25629356958d7d7ad105f631dc62ebcaaecb6f3d88fc4dedfa345743cc8963e3327
SHA512591c8bc428c28e5153ce3f56de25a9d88c68cec8ac375f0ecf3c77d386dd2f84fa3236a117cfb501a271c7043a84ae833c11b3888f096fcd17fe0da425c66044
-
Filesize
66KB
MD56f96b3da58ca279450e48b1b2f56f268
SHA1aa34041cd2c226708ccb945b101cff85640c4c81
SHA25617a86576600c88267782c4c7cf5aa5add87850a7ad537b10332d47d353340ae0
SHA512cec1b1f50240674a21c1512c91c54f2d4acd274c8a2e822039e8801db5184e2ef2e3988b29cc4e28e2924bdc0d21da00a8b1adbff9ccc1f0d43361bfd2d16e7a