Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe
-
Size
66KB
-
MD5
94a7c93648d0812e1503ed97e20bd550
-
SHA1
b1160b6befb4075444bf753c54a56d3a03c1f346
-
SHA256
f45ad6df01ab4a1d2265d2c8fcb18cfee78973b45ded697c0fadaecf5e0e6296
-
SHA512
bc01eb604324f900d71fb39c3e2536e0574ffa846193880967057e22d4b45ee9e246bd03252defa493abbc230ca0001b9353c54a1d5893a6fae47346c7680fd3
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXim:IeklMMYJhqezw/pXzH9im
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral1/memory/2668-55-0x0000000072940000-0x0000000072A93000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2904 explorer.exe 2532 spoolsv.exe 2668 svchost.exe 2464 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2508 94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe 2508 94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe 2904 explorer.exe 2904 explorer.exe 2532 spoolsv.exe 2532 spoolsv.exe 2668 svchost.exe 2668 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2508 94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2668 svchost.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2904 explorer.exe 2668 svchost.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe 2904 explorer.exe 2668 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2904 explorer.exe 2668 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2508 94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe 2508 94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe 2904 explorer.exe 2904 explorer.exe 2532 spoolsv.exe 2532 spoolsv.exe 2668 svchost.exe 2668 svchost.exe 2464 spoolsv.exe 2464 spoolsv.exe 2904 explorer.exe 2904 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2904 2508 94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe 28 PID 2508 wrote to memory of 2904 2508 94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe 28 PID 2508 wrote to memory of 2904 2508 94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe 28 PID 2508 wrote to memory of 2904 2508 94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe 28 PID 2904 wrote to memory of 2532 2904 explorer.exe 29 PID 2904 wrote to memory of 2532 2904 explorer.exe 29 PID 2904 wrote to memory of 2532 2904 explorer.exe 29 PID 2904 wrote to memory of 2532 2904 explorer.exe 29 PID 2532 wrote to memory of 2668 2532 spoolsv.exe 30 PID 2532 wrote to memory of 2668 2532 spoolsv.exe 30 PID 2532 wrote to memory of 2668 2532 spoolsv.exe 30 PID 2532 wrote to memory of 2668 2532 spoolsv.exe 30 PID 2668 wrote to memory of 2464 2668 svchost.exe 31 PID 2668 wrote to memory of 2464 2668 svchost.exe 31 PID 2668 wrote to memory of 2464 2668 svchost.exe 31 PID 2668 wrote to memory of 2464 2668 svchost.exe 31 PID 2668 wrote to memory of 2880 2668 svchost.exe 32 PID 2668 wrote to memory of 2880 2668 svchost.exe 32 PID 2668 wrote to memory of 2880 2668 svchost.exe 32 PID 2668 wrote to memory of 2880 2668 svchost.exe 32 PID 2668 wrote to memory of 2020 2668 svchost.exe 36 PID 2668 wrote to memory of 2020 2668 svchost.exe 36 PID 2668 wrote to memory of 2020 2668 svchost.exe 36 PID 2668 wrote to memory of 2020 2668 svchost.exe 36 PID 2668 wrote to memory of 2948 2668 svchost.exe 38 PID 2668 wrote to memory of 2948 2668 svchost.exe 38 PID 2668 wrote to memory of 2948 2668 svchost.exe 38 PID 2668 wrote to memory of 2948 2668 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\94a7c93648d0812e1503ed97e20bd550_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2464
-
-
C:\Windows\SysWOW64\at.exeat 11:35 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2880
-
-
C:\Windows\SysWOW64\at.exeat 11:36 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2020
-
-
C:\Windows\SysWOW64\at.exeat 11:37 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2948
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5daeb8d0b37f04c10aec52fdcd1694386
SHA11bb85cf2cdf10b5c3e41dac50974598e8484918a
SHA25610cf0f670451dd387c4223eeb0079db8621c885988d9593a6d1f4678c52b6998
SHA5127a9399a519bd50257a9778e42f6701890789f7d165148b92ffde60911f08c3ddb19abc158d3296041d803311a2232a0e0e65cab75c1fdcdfe94bae4d5ef50daf
-
Filesize
66KB
MD51acaafc3102a3fe952bdbdc43eb29659
SHA19ac0c8695d9ffe7600c5ed78edfaa7218cfdef46
SHA2560586f0cf2ba6afbec71a1c08643cdf2cfa360ca077357dd0d3ed5481838d649b
SHA512f1e6dee413e287e3a5f5f6e5d9761048a1a15833ab127b537bcda218270a8cadd694bea661f3b9a64e37457ae6dc4e4060afdd87b6e351d446e7e63c916e8414
-
Filesize
66KB
MD59e0da5d3a834a72302255c398345a08b
SHA1ddcaec79084877e52376448a06c5a7fa4e2b6389
SHA256e1832c958e851c462f93c3f69294c912e8b73dcde2e582b6324314e1e8eed90d
SHA512ab32d7e8f733fd923bceea42153002eab65d107a5321e207bddc78210bc56d04a29c3c74b4c1d2a2cf9d13f47cabe839dc26a327fd42518496c82cc3da7a4ca6
-
Filesize
66KB
MD5e893b41f7b7a845188d77223eb94a6ca
SHA194ba65f999b4abd695ab3cb19b9bd30e2a788d65
SHA256b924ba57b3755c9af95989fd22e736133cc71299c382d60f698a03e9c357e351
SHA512a4f568a3ac5e71913436c301449d4d4714346ae955b04ea2d13a910cea4e98446bb2bd1c08aa0f73dd9e8a844ee943e9442f8ac801771919d3121d2b77cc952f