Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
35a6b34cd556426a4027523f49a2bae0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
35a6b34cd556426a4027523f49a2bae0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
35a6b34cd556426a4027523f49a2bae0_NeikiAnalytics.exe
-
Size
65KB
-
MD5
35a6b34cd556426a4027523f49a2bae0
-
SHA1
89d19052169778f9a7efb1784ef7a3678e996c81
-
SHA256
ba9eec35d4cc7a953538e0d38c9439b5838692e4217f24ee6d74ee0c2ba6bf3f
-
SHA512
9907b51340f308b9fda4332ea1babd405d935425eec7a41a1d427df62f54f944b8741041fc32a5ae81efc22d548046901003f62d17e667e3302724faaae2d376
-
SSDEEP
1536:ECq3yRuqrI01eArdW/O7JnI2e13XiLij40MkTUVqa/OuL:7WNqkOJWmo1HpM0MkTUmuL
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral2/memory/2892-35-0x0000000074F00000-0x000000007505D000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2588 explorer.exe 3812 spoolsv.exe 2892 svchost.exe 3500 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 35a6b34cd556426a4027523f49a2bae0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2004 35a6b34cd556426a4027523f49a2bae0_NeikiAnalytics.exe 2004 35a6b34cd556426a4027523f49a2bae0_NeikiAnalytics.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2588 explorer.exe 2892 svchost.exe 2892 svchost.exe 2892 svchost.exe 2892 svchost.exe 2588 explorer.exe 2588 explorer.exe 2892 svchost.exe 2892 svchost.exe 2588 explorer.exe 2588 explorer.exe 2892 svchost.exe 2892 svchost.exe 2588 explorer.exe 2588 explorer.exe 2892 svchost.exe 2892 svchost.exe 2588 explorer.exe 2588 explorer.exe 2892 svchost.exe 2892 svchost.exe 2588 explorer.exe 2588 explorer.exe 2892 svchost.exe 2892 svchost.exe 2588 explorer.exe 2588 explorer.exe 2892 svchost.exe 2892 svchost.exe 2588 explorer.exe 2588 explorer.exe 2892 svchost.exe 2892 svchost.exe 2588 explorer.exe 2588 explorer.exe 2892 svchost.exe 2892 svchost.exe 2588 explorer.exe 2588 explorer.exe 2892 svchost.exe 2892 svchost.exe 2588 explorer.exe 2588 explorer.exe 2892 svchost.exe 2892 svchost.exe 2588 explorer.exe 2588 explorer.exe 2892 svchost.exe 2892 svchost.exe 2588 explorer.exe 2588 explorer.exe 2892 svchost.exe 2892 svchost.exe 2588 explorer.exe 2588 explorer.exe 2892 svchost.exe 2892 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2588 explorer.exe 2892 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2004 35a6b34cd556426a4027523f49a2bae0_NeikiAnalytics.exe 2004 35a6b34cd556426a4027523f49a2bae0_NeikiAnalytics.exe 2588 explorer.exe 2588 explorer.exe 3812 spoolsv.exe 3812 spoolsv.exe 2892 svchost.exe 2892 svchost.exe 3500 spoolsv.exe 3500 spoolsv.exe 2588 explorer.exe 2588 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2588 2004 35a6b34cd556426a4027523f49a2bae0_NeikiAnalytics.exe 83 PID 2004 wrote to memory of 2588 2004 35a6b34cd556426a4027523f49a2bae0_NeikiAnalytics.exe 83 PID 2004 wrote to memory of 2588 2004 35a6b34cd556426a4027523f49a2bae0_NeikiAnalytics.exe 83 PID 2588 wrote to memory of 3812 2588 explorer.exe 84 PID 2588 wrote to memory of 3812 2588 explorer.exe 84 PID 2588 wrote to memory of 3812 2588 explorer.exe 84 PID 3812 wrote to memory of 2892 3812 spoolsv.exe 85 PID 3812 wrote to memory of 2892 3812 spoolsv.exe 85 PID 3812 wrote to memory of 2892 3812 spoolsv.exe 85 PID 2892 wrote to memory of 3500 2892 svchost.exe 86 PID 2892 wrote to memory of 3500 2892 svchost.exe 86 PID 2892 wrote to memory of 3500 2892 svchost.exe 86 PID 2892 wrote to memory of 4648 2892 svchost.exe 88 PID 2892 wrote to memory of 4648 2892 svchost.exe 88 PID 2892 wrote to memory of 4648 2892 svchost.exe 88 PID 2892 wrote to memory of 4488 2892 svchost.exe 103 PID 2892 wrote to memory of 4488 2892 svchost.exe 103 PID 2892 wrote to memory of 4488 2892 svchost.exe 103 PID 2892 wrote to memory of 1400 2892 svchost.exe 108 PID 2892 wrote to memory of 1400 2892 svchost.exe 108 PID 2892 wrote to memory of 1400 2892 svchost.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\35a6b34cd556426a4027523f49a2bae0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\35a6b34cd556426a4027523f49a2bae0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3812 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3500
-
-
C:\Windows\SysWOW64\at.exeat 17:48 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4648
-
-
C:\Windows\SysWOW64\at.exeat 17:49 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:4488
-
-
C:\Windows\SysWOW64\at.exeat 17:50 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1400
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5c835e2d85a84f95374bcce017e0a16b2
SHA1cae784ebf3b319c6491e628bcae019d69fbf8b83
SHA25606e59d1b1a82ebdd8580f8bc0f34f389b03ae91ceba830756f51cfadff10d882
SHA5128686f978ec851bef8437b277220b855a7768c6371712f2f162c9b33a1fa7ff6b38028bc00a93737b073089ccdbb70cbe894f00e12657a3500bd50b086651821d
-
Filesize
65KB
MD5154787cea6c5d8e676cbbe14ccda8567
SHA13407db5f363364211e03511fc7713bb71da6092b
SHA2568673e0c57fe153be44d67d1aa347e75e69586de0ec26a41dccd0a19cdd1d565d
SHA5129036ee7c66974f5c66f156bff9a056ec1e484a9ab2bc73cb9949b3fec6329081e65a1b1521c64b3550c34c945946014a5856121af5f00badc31080fd880267af
-
Filesize
65KB
MD5dbbb964ec11bd89046b85933047f0439
SHA16a837cf3cf6a0b54f26e63d7c84faeb914d3e9ad
SHA256b99fb59a585f722704c7fea1f93ad21fbc0fc00d68da116c5d72187a0184e9db
SHA51205c1ad016e96a0364933ab0dfbb638fcd97966bfc1f13c1121e313cb04df905b119be5a7b2aa9d60b9ea1244c5b82b40fa1f184fc422f01b9882b1c5ed36adf0
-
Filesize
65KB
MD5841bb14c1f0e5f272c7a2e12e8b3c0a9
SHA1547762abdd50dd49eca10e8602a1a2a06be40219
SHA25625bf230b92c220f68ab141ddf243d2d4040c60fd7f8ec4c1d5f2e0154b525c16
SHA512b20dd8898f0d109cabe30b613c21fef90355d9f889c1f7103cd06cf2dfce379ec5e9e695476b1c0e895a9282471b93f1a50427b10f601adcab3471766d6b3441