Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 21:43
Static task
static1
Behavioral task
behavioral1
Sample
6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe
-
Size
65KB
-
MD5
6e593bc0d51e1de875d92ab2183cb9d0
-
SHA1
44422c1b3f12e22b1e7eea4ef2c04476ac92fc77
-
SHA256
59ecba4a762b8c02735f5a16e954b95d13cbe3b2cabf73c053e642c3386e1330
-
SHA512
e326f59683a8cef0156e216e2d3559825dbe298dfba61f62217db3d9e66452f299be23dea8ac1ac38a2b18984fffdbc0e19678713bd52de2e9d957aa9c5af1fe
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/Ouq//////////////////G:7WNqkOJWmo1HpM0MkTUmut
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral2/memory/2252-37-0x0000000074CF0000-0x0000000074E4D000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2544 explorer.exe 3712 spoolsv.exe 2252 svchost.exe 3644 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1820 6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe 1820 6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2252 svchost.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2252 svchost.exe 2544 explorer.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe 2544 explorer.exe 2252 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2544 explorer.exe 2252 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1820 6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe 1820 6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe 2544 explorer.exe 2544 explorer.exe 3712 spoolsv.exe 3712 spoolsv.exe 2252 svchost.exe 2252 svchost.exe 3644 spoolsv.exe 3644 spoolsv.exe 2544 explorer.exe 2544 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2544 1820 6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe 82 PID 1820 wrote to memory of 2544 1820 6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe 82 PID 1820 wrote to memory of 2544 1820 6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe 82 PID 2544 wrote to memory of 3712 2544 explorer.exe 83 PID 2544 wrote to memory of 3712 2544 explorer.exe 83 PID 2544 wrote to memory of 3712 2544 explorer.exe 83 PID 3712 wrote to memory of 2252 3712 spoolsv.exe 85 PID 3712 wrote to memory of 2252 3712 spoolsv.exe 85 PID 3712 wrote to memory of 2252 3712 spoolsv.exe 85 PID 2252 wrote to memory of 3644 2252 svchost.exe 87 PID 2252 wrote to memory of 3644 2252 svchost.exe 87 PID 2252 wrote to memory of 3644 2252 svchost.exe 87 PID 2252 wrote to memory of 1432 2252 svchost.exe 88 PID 2252 wrote to memory of 1432 2252 svchost.exe 88 PID 2252 wrote to memory of 1432 2252 svchost.exe 88 PID 2252 wrote to memory of 1804 2252 svchost.exe 99 PID 2252 wrote to memory of 1804 2252 svchost.exe 99 PID 2252 wrote to memory of 1804 2252 svchost.exe 99 PID 2252 wrote to memory of 5092 2252 svchost.exe 101 PID 2252 wrote to memory of 5092 2252 svchost.exe 101 PID 2252 wrote to memory of 5092 2252 svchost.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6e593bc0d51e1de875d92ab2183cb9d0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3712 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3644
-
-
C:\Windows\SysWOW64\at.exeat 21:45 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1432
-
-
C:\Windows\SysWOW64\at.exeat 21:46 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1804
-
-
C:\Windows\SysWOW64\at.exeat 21:47 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:5092
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD590a1b652eb467f0c9be3b7b11d5a1262
SHA1c6e5ddabc81aae0a6b4e7a6668898fdda7ede0bf
SHA256804176b87829f318ac4cb81bb3818f9bd57f7f2297f4887c677604935ff04fff
SHA5121b38130277720c26ba2f388a819406bbb87ba60915b93b38419a9e1cf9cfc381915eccfd87b9664252a41230290bb523aa6401b723c2a1c350f4985b07360ef3
-
Filesize
65KB
MD565273fa5d71e7333609c2437770a80f9
SHA1d74e54bef18d3893b78f61474d0b6ab2e015736b
SHA2564e8b462aaaa9a51712be79dc389495958f654f7b5a8944e02bd6d8627b182ddd
SHA512b88fbf6abf9bc0da9bf82a4fd1d09ea451943583eacf1619d8d64fe172c590e903aae74798a63072282509c2f4f4c8b9254048aa3d17cd0eaa90d3efec422d8c
-
Filesize
65KB
MD528d9cf646517f57002b0a71230be57e1
SHA1e31e6fad2e684d9137587de7e2afc5cb1c47b4db
SHA256cc8c1cb9697d5e166a923f431e624a003d0e9d740f06f4976560b0eb43f02111
SHA5122596ddc64d8add82ef8d06dfd372aa463d80f1f371e6a5635379a05774183d046a81eb94add7b87c32f08fbf9af46bdb6e72fa619abc7d8edcdc1b4d6e72b625
-
Filesize
65KB
MD59af261e7bd0dc5072456d95a50ac0189
SHA1a62404e4c3eb5c5c58722ae5e51d979844ace422
SHA2569facc1b2ffd956d4afed273afb7a5ba8f95f9405d2c5618de4e3711dd58e8234
SHA51248202571f402c4f7fb8778bd3e221bd81cdb49f57180b9730a0a394f75e98439eebf29648b572388b9ced7c425807a14bfb830de3057a003146a89f6f9116bec