Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe
-
Size
66KB
-
MD5
0853d5253c1fae1e1037a86988f8f5a0
-
SHA1
67b82aa36f74c09463b977263f7ed216234867b8
-
SHA256
af7201dfeff1c0c07c063668724e528d511f316916546b2b03958479e0236f6d
-
SHA512
d305969cb675ac6669d3af15e244bf55ddc4f6c8cfe01a3a94ddb32a0f0187043301b285a4228fe0ef566028ed1f53734b8afec5ec54d9153643770601219cc5
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiU:IeklMMYJhqezw/pXzH9iU
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral1/memory/2476-52-0x0000000072940000-0x0000000072A93000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3028 explorer.exe 2648 spoolsv.exe 2476 svchost.exe 2404 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 1264 0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe 1264 0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe 3028 explorer.exe 3028 explorer.exe 2648 spoolsv.exe 2648 spoolsv.exe 2476 svchost.exe 2476 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1264 0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe 3028 explorer.exe 3028 explorer.exe 3028 explorer.exe 3028 explorer.exe 2476 svchost.exe 2476 svchost.exe 2476 svchost.exe 3028 explorer.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 2476 svchost.exe 3028 explorer.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 3028 explorer.exe 2476 svchost.exe 2476 svchost.exe 3028 explorer.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe 2476 svchost.exe 3028 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3028 explorer.exe 2476 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1264 0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe 1264 0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe 3028 explorer.exe 3028 explorer.exe 2648 spoolsv.exe 2648 spoolsv.exe 2476 svchost.exe 2476 svchost.exe 2404 spoolsv.exe 2404 spoolsv.exe 3028 explorer.exe 3028 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1264 wrote to memory of 3028 1264 0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe 28 PID 1264 wrote to memory of 3028 1264 0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe 28 PID 1264 wrote to memory of 3028 1264 0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe 28 PID 1264 wrote to memory of 3028 1264 0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe 28 PID 3028 wrote to memory of 2648 3028 explorer.exe 29 PID 3028 wrote to memory of 2648 3028 explorer.exe 29 PID 3028 wrote to memory of 2648 3028 explorer.exe 29 PID 3028 wrote to memory of 2648 3028 explorer.exe 29 PID 2648 wrote to memory of 2476 2648 spoolsv.exe 30 PID 2648 wrote to memory of 2476 2648 spoolsv.exe 30 PID 2648 wrote to memory of 2476 2648 spoolsv.exe 30 PID 2648 wrote to memory of 2476 2648 spoolsv.exe 30 PID 2476 wrote to memory of 2404 2476 svchost.exe 31 PID 2476 wrote to memory of 2404 2476 svchost.exe 31 PID 2476 wrote to memory of 2404 2476 svchost.exe 31 PID 2476 wrote to memory of 2404 2476 svchost.exe 31 PID 2476 wrote to memory of 2172 2476 svchost.exe 32 PID 2476 wrote to memory of 2172 2476 svchost.exe 32 PID 2476 wrote to memory of 2172 2476 svchost.exe 32 PID 2476 wrote to memory of 2172 2476 svchost.exe 32 PID 2476 wrote to memory of 1248 2476 svchost.exe 36 PID 2476 wrote to memory of 1248 2476 svchost.exe 36 PID 2476 wrote to memory of 1248 2476 svchost.exe 36 PID 2476 wrote to memory of 1248 2476 svchost.exe 36 PID 2476 wrote to memory of 1092 2476 svchost.exe 38 PID 2476 wrote to memory of 1092 2476 svchost.exe 38 PID 2476 wrote to memory of 1092 2476 svchost.exe 38 PID 2476 wrote to memory of 1092 2476 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0853d5253c1fae1e1037a86988f8f5a0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1264 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2404
-
-
C:\Windows\SysWOW64\at.exeat 21:47 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2172
-
-
C:\Windows\SysWOW64\at.exeat 21:48 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1248
-
-
C:\Windows\SysWOW64\at.exeat 21:49 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1092
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD556b28c8e226fdebeff069ee2db563784
SHA1697598c9fde4ee104065fd5337551c0192bb5dab
SHA256771229d8066fbfefc4f036d23d56dc2194cd9b630dc73919c7c9fa49b3f041de
SHA5129fe5f5bd293aa7a65481d83ba3115fc7f4131411db9fe447cf43782f923d1f3ea04711902497f1001553684b243d9e6443f9df3b6943a54886ec681bcb339f2b
-
Filesize
66KB
MD583e6e29634554b354ca0b89c6590cfa9
SHA16b7d5d4b2299ca2102652f0aad5a28b26079fe6e
SHA256ac92f8acd8cd2fb2d756436c3f193580065e807a7e3a8b643a2b11441885c6c4
SHA5127d2289d363f344f113c997e113f1d5f323992db833de9565a8f8923fda480a5487efa3b31edd183803c87edb5a735e787b18e8bf1a3f689a769175743cabef7e
-
Filesize
66KB
MD5cfe99e4ee1c47b9e48fe803dd9a49bd8
SHA1d29beff2ea437215dd17b7ac910641c7579b564a
SHA256bb4061e6daad7e8d4bed9b69ad2a8ec8466ddfe3edc94ded836a23a6f0099df8
SHA5127512b1a591310383d3a5affa5fcab52a9b92a615dab15376c9359c86f655fc5d21965eb579588cd9ed4c558a37ce110d0d47e6205531a6e50bd55abe67444dbe
-
Filesize
66KB
MD5735c4b94b5d1f14e192ebb6236c0855e
SHA1ef9a11a0d06ea3c7297e0411b12b6835fed2f444
SHA25694f93c9ff626ce22afc35fcce1f13f518770a20259b5882c54fc5bbbcbff6fb2
SHA51291335a17d15ce91ca1cada1ec6f71b17aebb3e77476b257bb5eff639f8135f59cb49a35a3ef3d53531cb505f2881895a90d839c175a75fb9b7ccd5618411104d