Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
fd7e9fdf5213b638c66eb8d1f4f53d10_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
fd7e9fdf5213b638c66eb8d1f4f53d10_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
fd7e9fdf5213b638c66eb8d1f4f53d10_NeikiAnalytics.exe
-
Size
66KB
-
MD5
fd7e9fdf5213b638c66eb8d1f4f53d10
-
SHA1
4629d06c2d4821da6334eb3eb57b2ec5bc4beb05
-
SHA256
d9f629374fdd0bff8cf57f59e065646792f203655953f181b54b8bfac4fbf286
-
SHA512
047afa9059467d0777066988451cb32e7bc95f0f89e611dfcb0ef513253caebfef2140ca541c5908e57445285b953ec2b5b6b3872b82dd184f005f822f57a9b5
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXi5:IeklMMYJhqezw/pXzH9i5
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral2/memory/920-38-0x0000000075720000-0x000000007587D000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4380 explorer.exe 3468 spoolsv.exe 920 svchost.exe 3664 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe fd7e9fdf5213b638c66eb8d1f4f53d10_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3996 fd7e9fdf5213b638c66eb8d1f4f53d10_NeikiAnalytics.exe 3996 fd7e9fdf5213b638c66eb8d1f4f53d10_NeikiAnalytics.exe 4380 explorer.exe 4380 explorer.exe 4380 explorer.exe 4380 explorer.exe 4380 explorer.exe 4380 explorer.exe 4380 explorer.exe 4380 explorer.exe 920 svchost.exe 920 svchost.exe 920 svchost.exe 920 svchost.exe 4380 explorer.exe 4380 explorer.exe 920 svchost.exe 920 svchost.exe 4380 explorer.exe 4380 explorer.exe 920 svchost.exe 920 svchost.exe 4380 explorer.exe 4380 explorer.exe 920 svchost.exe 920 svchost.exe 4380 explorer.exe 4380 explorer.exe 920 svchost.exe 920 svchost.exe 4380 explorer.exe 4380 explorer.exe 920 svchost.exe 920 svchost.exe 4380 explorer.exe 4380 explorer.exe 920 svchost.exe 920 svchost.exe 4380 explorer.exe 4380 explorer.exe 920 svchost.exe 920 svchost.exe 4380 explorer.exe 4380 explorer.exe 920 svchost.exe 920 svchost.exe 4380 explorer.exe 4380 explorer.exe 920 svchost.exe 920 svchost.exe 4380 explorer.exe 4380 explorer.exe 920 svchost.exe 920 svchost.exe 4380 explorer.exe 4380 explorer.exe 920 svchost.exe 920 svchost.exe 4380 explorer.exe 4380 explorer.exe 920 svchost.exe 920 svchost.exe 4380 explorer.exe 4380 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4380 explorer.exe 920 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3996 fd7e9fdf5213b638c66eb8d1f4f53d10_NeikiAnalytics.exe 3996 fd7e9fdf5213b638c66eb8d1f4f53d10_NeikiAnalytics.exe 4380 explorer.exe 4380 explorer.exe 3468 spoolsv.exe 3468 spoolsv.exe 920 svchost.exe 920 svchost.exe 3664 spoolsv.exe 3664 spoolsv.exe 4380 explorer.exe 4380 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3996 wrote to memory of 4380 3996 fd7e9fdf5213b638c66eb8d1f4f53d10_NeikiAnalytics.exe 81 PID 3996 wrote to memory of 4380 3996 fd7e9fdf5213b638c66eb8d1f4f53d10_NeikiAnalytics.exe 81 PID 3996 wrote to memory of 4380 3996 fd7e9fdf5213b638c66eb8d1f4f53d10_NeikiAnalytics.exe 81 PID 4380 wrote to memory of 3468 4380 explorer.exe 82 PID 4380 wrote to memory of 3468 4380 explorer.exe 82 PID 4380 wrote to memory of 3468 4380 explorer.exe 82 PID 3468 wrote to memory of 920 3468 spoolsv.exe 83 PID 3468 wrote to memory of 920 3468 spoolsv.exe 83 PID 3468 wrote to memory of 920 3468 spoolsv.exe 83 PID 920 wrote to memory of 3664 920 svchost.exe 84 PID 920 wrote to memory of 3664 920 svchost.exe 84 PID 920 wrote to memory of 3664 920 svchost.exe 84 PID 920 wrote to memory of 4660 920 svchost.exe 86 PID 920 wrote to memory of 4660 920 svchost.exe 86 PID 920 wrote to memory of 4660 920 svchost.exe 86 PID 920 wrote to memory of 3204 920 svchost.exe 98 PID 920 wrote to memory of 3204 920 svchost.exe 98 PID 920 wrote to memory of 3204 920 svchost.exe 98 PID 920 wrote to memory of 3552 920 svchost.exe 100 PID 920 wrote to memory of 3552 920 svchost.exe 100 PID 920 wrote to memory of 3552 920 svchost.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd7e9fdf5213b638c66eb8d1f4f53d10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\fd7e9fdf5213b638c66eb8d1f4f53d10_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3996 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3468 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:920 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3664
-
-
C:\Windows\SysWOW64\at.exeat 11:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4660
-
-
C:\Windows\SysWOW64\at.exeat 11:15 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3204
-
-
C:\Windows\SysWOW64\at.exeat 11:16 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:3552
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD53c98155d889fa5ad1b8b71230e002bae
SHA1a68639c93c86320f0224bfa3dff8cd5af01115d5
SHA2560b2b6c9484451412a8a1d14b039f1180d0adcb9860f018dfc8b3cd6ae4c85f96
SHA512536cb109f1a55ca78db35ba7ff1b65043ee35f7ac265cbf7ff84b5f30c6fe40a00802d4de33322a559b82459ad3fb3d2210e8e9dc9ee18b4c1cad4d7075a6fd1
-
Filesize
66KB
MD519792fd40484242a696efd2ff8a77bfc
SHA128fd019d2b24b3f94ca2e710428b9631b6c3acfc
SHA25666228a03484ede345756f09179a650ec5eb188b767aa02c28d1008ec0e2af1d9
SHA512f0f300840776f3b04da39ad218c9b2db86ff542265ce8e391992c371eb5bedf3bf14bc51c11cd0b45bcbf3d1bc56ea7a971a42e38929858d076838b565547d36
-
Filesize
66KB
MD5c585d0747bd835534a2e1f703c388842
SHA191adba006d6fb2c4772c1119ec3abfbae3a4c181
SHA256e6be39bb18bc9303fc650f7213201cf0ad4ffad54b270c11e0f06c56e69a3dbc
SHA5123f7f715b75821ef720126acb529453e79fc03831fdabb8576e53625a3e417c71d2995d177d9f4b1c6a797afd7a6653a455ce6ba2a7cda899f9ad25370cd18992
-
Filesize
66KB
MD595118781158b5c41ac19ab4e5eecb96f
SHA181934b59149194c7678590fb1f5e197ec4266936
SHA256d09861a6d80acb658591e775f2f8fd54056d5346cff371ed17695c33faa91df3
SHA512b3067f6adf0927f40ee864e455831ac2da7ee834590143ca4a8cd3acf29b2712c22536ddcff8000ea5a9cb071af20e2a1ba256c00a6043ada743877073da7076