Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2024 21:43

General

  • Target

    6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe

  • Size

    65KB

  • MD5

    6e593bc0d51e1de875d92ab2183cb9d0

  • SHA1

    44422c1b3f12e22b1e7eea4ef2c04476ac92fc77

  • SHA256

    59ecba4a762b8c02735f5a16e954b95d13cbe3b2cabf73c053e642c3386e1330

  • SHA512

    e326f59683a8cef0156e216e2d3559825dbe298dfba61f62217db3d9e66452f299be23dea8ac1ac38a2b18984fffdbc0e19678713bd52de2e9d957aa9c5af1fe

  • SSDEEP

    1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Ouq//////////////////G:7WNqkOJWmo1HpM0MkTUmut

Malware Config

Signatures

  • Detects BazaLoader malware 1 IoCs

    BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1820
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2544
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3712
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2252
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3644
          • C:\Windows\SysWOW64\at.exe
            at 21:45 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:1432
            • C:\Windows\SysWOW64\at.exe
              at 21:46 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:1804
              • C:\Windows\SysWOW64\at.exe
                at 21:47 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:5092

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          65KB

          MD5

          90a1b652eb467f0c9be3b7b11d5a1262

          SHA1

          c6e5ddabc81aae0a6b4e7a6668898fdda7ede0bf

          SHA256

          804176b87829f318ac4cb81bb3818f9bd57f7f2297f4887c677604935ff04fff

          SHA512

          1b38130277720c26ba2f388a819406bbb87ba60915b93b38419a9e1cf9cfc381915eccfd87b9664252a41230290bb523aa6401b723c2a1c350f4985b07360ef3

        • C:\Windows\System\explorer.exe

          Filesize

          65KB

          MD5

          65273fa5d71e7333609c2437770a80f9

          SHA1

          d74e54bef18d3893b78f61474d0b6ab2e015736b

          SHA256

          4e8b462aaaa9a51712be79dc389495958f654f7b5a8944e02bd6d8627b182ddd

          SHA512

          b88fbf6abf9bc0da9bf82a4fd1d09ea451943583eacf1619d8d64fe172c590e903aae74798a63072282509c2f4f4c8b9254048aa3d17cd0eaa90d3efec422d8c

        • C:\Windows\System\spoolsv.exe

          Filesize

          65KB

          MD5

          28d9cf646517f57002b0a71230be57e1

          SHA1

          e31e6fad2e684d9137587de7e2afc5cb1c47b4db

          SHA256

          cc8c1cb9697d5e166a923f431e624a003d0e9d740f06f4976560b0eb43f02111

          SHA512

          2596ddc64d8add82ef8d06dfd372aa463d80f1f371e6a5635379a05774183d046a81eb94add7b87c32f08fbf9af46bdb6e72fa619abc7d8edcdc1b4d6e72b625

        • C:\Windows\System\svchost.exe

          Filesize

          65KB

          MD5

          9af261e7bd0dc5072456d95a50ac0189

          SHA1

          a62404e4c3eb5c5c58722ae5e51d979844ace422

          SHA256

          9facc1b2ffd956d4afed273afb7a5ba8f95f9405d2c5618de4e3711dd58e8234

          SHA512

          48202571f402c4f7fb8778bd3e221bd81cdb49f57180b9730a0a394f75e98439eebf29648b572388b9ced7c425807a14bfb830de3057a003146a89f6f9116bec

        • memory/1820-2-0x0000000074CF0000-0x0000000074E4D000-memory.dmp

          Filesize

          1.4MB

        • memory/1820-4-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/1820-0-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1820-3-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1820-56-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1820-57-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/1820-1-0x00000000001C0000-0x00000000001C4000-memory.dmp

          Filesize

          16KB

        • memory/2252-61-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2252-37-0x0000000074CF0000-0x0000000074E4D000-memory.dmp

          Filesize

          1.4MB

        • memory/2252-36-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2544-13-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2544-17-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2544-59-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2544-14-0x0000000074CF0000-0x0000000074E4D000-memory.dmp

          Filesize

          1.4MB

        • memory/2544-70-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3644-43-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3644-44-0x0000000074CF0000-0x0000000074E4D000-memory.dmp

          Filesize

          1.4MB

        • memory/3644-52-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3712-54-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3712-30-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3712-25-0x0000000074CF0000-0x0000000074E4D000-memory.dmp

          Filesize

          1.4MB