Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 08:19
Static task
static1
Behavioral task
behavioral1
Sample
3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe
-
Size
66KB
-
MD5
3abd05cfdb8cd529b9b31dde1719f8f0
-
SHA1
f66e887f0a6c0cbc2ce56cce1d017300f7e9d44f
-
SHA256
b88342ddb0238f9bd7f39971baaf9a086cf5cbf8abf72d1eec78170046c33b7a
-
SHA512
78351a8d7e30b9259577c36f975de1ac43c02894170c8fa22be6ec468bbd65b7af5d0579a27e61a64c28ffdbe02f11f8180da7f220bf41fe919a6d1a7482c25d
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiH:IeklMMYJhqezw/pXzH9iH
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral1/memory/2528-54-0x0000000072940000-0x0000000072A93000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2324 explorer.exe 2640 spoolsv.exe 2528 svchost.exe 2548 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2344 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 2344 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 2324 explorer.exe 2324 explorer.exe 2640 spoolsv.exe 2640 spoolsv.exe 2528 svchost.exe 2528 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2344 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2324 explorer.exe 2528 svchost.exe 2528 svchost.exe 2528 svchost.exe 2324 explorer.exe 2528 svchost.exe 2324 explorer.exe 2324 explorer.exe 2528 svchost.exe 2528 svchost.exe 2324 explorer.exe 2324 explorer.exe 2528 svchost.exe 2324 explorer.exe 2528 svchost.exe 2324 explorer.exe 2528 svchost.exe 2528 svchost.exe 2324 explorer.exe 2324 explorer.exe 2528 svchost.exe 2528 svchost.exe 2324 explorer.exe 2324 explorer.exe 2528 svchost.exe 2528 svchost.exe 2324 explorer.exe 2324 explorer.exe 2528 svchost.exe 2528 svchost.exe 2324 explorer.exe 2324 explorer.exe 2528 svchost.exe 2528 svchost.exe 2324 explorer.exe 2324 explorer.exe 2528 svchost.exe 2528 svchost.exe 2324 explorer.exe 2528 svchost.exe 2324 explorer.exe 2324 explorer.exe 2528 svchost.exe 2324 explorer.exe 2528 svchost.exe 2324 explorer.exe 2528 svchost.exe 2324 explorer.exe 2528 svchost.exe 2528 svchost.exe 2324 explorer.exe 2528 svchost.exe 2324 explorer.exe 2324 explorer.exe 2528 svchost.exe 2324 explorer.exe 2528 svchost.exe 2324 explorer.exe 2528 svchost.exe 2528 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2324 explorer.exe 2528 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2344 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 2344 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 2324 explorer.exe 2324 explorer.exe 2640 spoolsv.exe 2640 spoolsv.exe 2528 svchost.exe 2528 svchost.exe 2548 spoolsv.exe 2548 spoolsv.exe 2324 explorer.exe 2324 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2324 2344 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 28 PID 2344 wrote to memory of 2324 2344 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 28 PID 2344 wrote to memory of 2324 2344 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 28 PID 2344 wrote to memory of 2324 2344 3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe 28 PID 2324 wrote to memory of 2640 2324 explorer.exe 29 PID 2324 wrote to memory of 2640 2324 explorer.exe 29 PID 2324 wrote to memory of 2640 2324 explorer.exe 29 PID 2324 wrote to memory of 2640 2324 explorer.exe 29 PID 2640 wrote to memory of 2528 2640 spoolsv.exe 30 PID 2640 wrote to memory of 2528 2640 spoolsv.exe 30 PID 2640 wrote to memory of 2528 2640 spoolsv.exe 30 PID 2640 wrote to memory of 2528 2640 spoolsv.exe 30 PID 2528 wrote to memory of 2548 2528 svchost.exe 31 PID 2528 wrote to memory of 2548 2528 svchost.exe 31 PID 2528 wrote to memory of 2548 2528 svchost.exe 31 PID 2528 wrote to memory of 2548 2528 svchost.exe 31 PID 2528 wrote to memory of 1976 2528 svchost.exe 32 PID 2528 wrote to memory of 1976 2528 svchost.exe 32 PID 2528 wrote to memory of 1976 2528 svchost.exe 32 PID 2528 wrote to memory of 1976 2528 svchost.exe 32 PID 2528 wrote to memory of 832 2528 svchost.exe 36 PID 2528 wrote to memory of 832 2528 svchost.exe 36 PID 2528 wrote to memory of 832 2528 svchost.exe 36 PID 2528 wrote to memory of 832 2528 svchost.exe 36 PID 2528 wrote to memory of 3008 2528 svchost.exe 38 PID 2528 wrote to memory of 3008 2528 svchost.exe 38 PID 2528 wrote to memory of 3008 2528 svchost.exe 38 PID 2528 wrote to memory of 3008 2528 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3abd05cfdb8cd529b9b31dde1719f8f0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
C:\Windows\SysWOW64\at.exeat 08:22 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1976
-
-
C:\Windows\SysWOW64\at.exeat 08:23 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:832
-
-
C:\Windows\SysWOW64\at.exeat 08:24 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3008
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD587d65d039b587004cf69dca81515d632
SHA184831daaa0e78c6301a5efb6e1c2a0de79139778
SHA2562abccf945c4f3e6a6326445eb2466d801459fc055ca5f8d601d7bc64c5adf87f
SHA512f6adbaaca0f988bd7691d0cbe927fc768f05bcaacb4e5e7cc014ef22f2aabaf69c2fe156c0df647bf4ae23c905b462d1b62186ec522f973d4c6fb2d4ab6d2105
-
Filesize
66KB
MD5d30a089053d76b1f970e42c1f3bc5c48
SHA14e176baad049f7196757ca94a1cf8d7807b51cc1
SHA25620c9672e1fb3615d7972d43d765b43c09ac76d8086a6a975180c5891315bf0b7
SHA5129c6fbc84975cc91a3d46d0f4fb7cac43e8bc83de0f5ab82c05b5de0245e9c3a8087db6cd149583ac0a04ef41251bbb84756c6b9c4ef8a71d1ba1d997264c14fa
-
Filesize
66KB
MD516bdca627772601050072201225bdd3f
SHA1f115badde4e7c5514c7a3033f8602a58c33f02c0
SHA256fa56bb9674054fc7758bc40d4804dd2e2e842951d2d5d4266935afd64ed60cc0
SHA51295e9bb8e3f6d6b960f053028ff64c15a7370596a2d2f9ea810d81861ca069ae8486f95042c5c09abddd6c5d67ccf81c7e9346916a9f03befcdf28ebae3ecf4ec
-
Filesize
66KB
MD5cec19329d74e500bbd18075acb3dda7f
SHA1f12ad20c7aef280d0ec865e8bf0dfd9a986a05a1
SHA25698846877db59e6f401210cedf6107c0415bcd4ff319410c36f5212886cf20cd5
SHA5123ed1c01c9c422b36527ac32f1b9b55dfee9295cd7757ff262fdb91489ff1a309dd6a26ebbe07c8dcf78535d6ea525166cc280e6f91559f9d34bdbb0f32bf721b