Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
422d63953428c5873365c145f11cf440_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
422d63953428c5873365c145f11cf440_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
422d63953428c5873365c145f11cf440_NeikiAnalytics.exe
-
Size
65KB
-
MD5
422d63953428c5873365c145f11cf440
-
SHA1
748fc2e62f2775f77325d2fb464ce4d2fb83fa30
-
SHA256
b0235aa6db349166f0b94fdfcfac7397207e6f6653c0c4803cb792f40ada4a2f
-
SHA512
3ce428bfcc8b1b45f5de4fdb697964915981fc71a43d17a9c270dc5aac765f5cc22bfa8ed4708fd3425801f4ba9270f86c4f9370439a53e08d223da832059e44
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Ou6:7WNqkOJWmo1HpM0MkTUmu6
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral2/memory/2572-36-0x0000000074FA0000-0x00000000750FD000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3712 explorer.exe 3332 spoolsv.exe 2572 svchost.exe 4852 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 422d63953428c5873365c145f11cf440_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3480 422d63953428c5873365c145f11cf440_NeikiAnalytics.exe 3480 422d63953428c5873365c145f11cf440_NeikiAnalytics.exe 3712 explorer.exe 3712 explorer.exe 3712 explorer.exe 3712 explorer.exe 3712 explorer.exe 3712 explorer.exe 3712 explorer.exe 3712 explorer.exe 2572 svchost.exe 2572 svchost.exe 2572 svchost.exe 2572 svchost.exe 3712 explorer.exe 3712 explorer.exe 2572 svchost.exe 2572 svchost.exe 3712 explorer.exe 3712 explorer.exe 2572 svchost.exe 2572 svchost.exe 3712 explorer.exe 3712 explorer.exe 2572 svchost.exe 2572 svchost.exe 3712 explorer.exe 3712 explorer.exe 2572 svchost.exe 2572 svchost.exe 2572 svchost.exe 3712 explorer.exe 2572 svchost.exe 3712 explorer.exe 3712 explorer.exe 2572 svchost.exe 3712 explorer.exe 2572 svchost.exe 2572 svchost.exe 3712 explorer.exe 2572 svchost.exe 3712 explorer.exe 3712 explorer.exe 2572 svchost.exe 3712 explorer.exe 2572 svchost.exe 2572 svchost.exe 3712 explorer.exe 2572 svchost.exe 3712 explorer.exe 3712 explorer.exe 2572 svchost.exe 3712 explorer.exe 2572 svchost.exe 2572 svchost.exe 3712 explorer.exe 3712 explorer.exe 2572 svchost.exe 2572 svchost.exe 3712 explorer.exe 2572 svchost.exe 3712 explorer.exe 3712 explorer.exe 2572 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3712 explorer.exe 2572 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3480 422d63953428c5873365c145f11cf440_NeikiAnalytics.exe 3480 422d63953428c5873365c145f11cf440_NeikiAnalytics.exe 3712 explorer.exe 3712 explorer.exe 3332 spoolsv.exe 3332 spoolsv.exe 2572 svchost.exe 2572 svchost.exe 4852 spoolsv.exe 4852 spoolsv.exe 3712 explorer.exe 3712 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3712 3480 422d63953428c5873365c145f11cf440_NeikiAnalytics.exe 83 PID 3480 wrote to memory of 3712 3480 422d63953428c5873365c145f11cf440_NeikiAnalytics.exe 83 PID 3480 wrote to memory of 3712 3480 422d63953428c5873365c145f11cf440_NeikiAnalytics.exe 83 PID 3712 wrote to memory of 3332 3712 explorer.exe 84 PID 3712 wrote to memory of 3332 3712 explorer.exe 84 PID 3712 wrote to memory of 3332 3712 explorer.exe 84 PID 3332 wrote to memory of 2572 3332 spoolsv.exe 85 PID 3332 wrote to memory of 2572 3332 spoolsv.exe 85 PID 3332 wrote to memory of 2572 3332 spoolsv.exe 85 PID 2572 wrote to memory of 4852 2572 svchost.exe 86 PID 2572 wrote to memory of 4852 2572 svchost.exe 86 PID 2572 wrote to memory of 4852 2572 svchost.exe 86 PID 2572 wrote to memory of 2588 2572 svchost.exe 88 PID 2572 wrote to memory of 2588 2572 svchost.exe 88 PID 2572 wrote to memory of 2588 2572 svchost.exe 88 PID 2572 wrote to memory of 2536 2572 svchost.exe 107 PID 2572 wrote to memory of 2536 2572 svchost.exe 107 PID 2572 wrote to memory of 2536 2572 svchost.exe 107 PID 2572 wrote to memory of 3512 2572 svchost.exe 117 PID 2572 wrote to memory of 3512 2572 svchost.exe 117 PID 2572 wrote to memory of 3512 2572 svchost.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\422d63953428c5873365c145f11cf440_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\422d63953428c5873365c145f11cf440_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3480 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3712 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3332 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4852
-
-
C:\Windows\SysWOW64\at.exeat 11:54 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2588
-
-
C:\Windows\SysWOW64\at.exeat 11:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2536
-
-
C:\Windows\SysWOW64\at.exeat 11:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3512
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD58c6c922e661828e76216d0e4ba114e46
SHA17807ac06d62d33d0689d68a3119173d7a4adb1fd
SHA2566108917e35e5975c1a4e1c3f5c09e9be7950533e46e5f3b983f7b397ee82e323
SHA512f5d33a1a77ba798f2601fe3f04f799533267211595c5752081b9274cbbf1f3112b94053b0ac5678ba99e6714ae75bbaf4c8d584e97375ff5d52fdd6f32ead086
-
Filesize
65KB
MD549cf01b8c3efe72362b43c688a7fdf87
SHA189a43be2ed1a9bcf03918e28fe6baa1b5b726cca
SHA2560a6576369ea3f7ed750a0161a41be6470aad3aa1f61c37633a36ae7f88544215
SHA512ceac488602d75f8a8187370c07ac695c0dfc10defc8721f049064a7b4e67c09ca19a71a61a868536bac6575244759e227de01ffc301cec33858b4b27b048e306
-
Filesize
65KB
MD575fe30a2d5f94c6110afd0c70c92ebb4
SHA1db526637e5b8ac3116d02ec53408e28fc0dc1b32
SHA25678ae27c8249c835951602dc7a33207a2d0ccfe746927ca903e392109c8faf66a
SHA51279690c50663823a0d7c72a0e746c7808402cfd549cbd27eb735d3ae12451335670089b1d9acd1d5a6f35bf85150982f14505d44e711969d5465c290c07a91fbe
-
Filesize
65KB
MD5bb9a9b67534e8a12cbe50f55a18ebdde
SHA1f51c7cc0f23eaa85f34e1b564cf25eaee8ddfa3a
SHA2562375bc2566c2e4be9d27d8d22a65bbbee777e59c8246bf510baa2f7e19f5ba0d
SHA512760f0c3bfd738f587f42e3c739060b80cf4f356718142b364d2e788819e90d2b64c24a7a5fff6e8a260af78171b3899e5db2091d8f7ceb5dcef7dd11da0e502f