Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe
-
Size
66KB
-
MD5
3490ce781b5a7e105c10665ca67e13a0
-
SHA1
432c8eba37cdf07473196a3d3d99f8fa5f30b922
-
SHA256
9813d92c724909fb90125f5a71bf3b220d34c3485e7712fa419907d436cd78c6
-
SHA512
a3e02dd25504831a23e6cc9c6bbc620d5dfde46f8fafed719b467408cde88ef88bc36cf607b9b3f4d6951a1ecd1e1de39d11cc579bfc7cd95852ddc6898d8c6f
-
SSDEEP
1536:EHfetdklPp+07gDSrB8Xru2zGeJxgawTzpXzrDJrXiN:IeklMMYJhqezw/pXzH9iN
Malware Config
Signatures
-
Detects BazaLoader malware 1 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
resource yara_rule behavioral1/memory/2484-57-0x0000000072940000-0x0000000072A93000-memory.dmp BazaLoader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1540 explorer.exe 2692 spoolsv.exe 2484 svchost.exe 2448 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2740 3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe 2740 3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe 1540 explorer.exe 1540 explorer.exe 2692 spoolsv.exe 2692 spoolsv.exe 2484 svchost.exe 2484 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2740 3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 2484 svchost.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe 2484 svchost.exe 1540 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1540 explorer.exe 2484 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2740 3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe 2740 3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe 1540 explorer.exe 1540 explorer.exe 2692 spoolsv.exe 2692 spoolsv.exe 2484 svchost.exe 2484 svchost.exe 2448 spoolsv.exe 2448 spoolsv.exe 1540 explorer.exe 1540 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2740 wrote to memory of 1540 2740 3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe 28 PID 2740 wrote to memory of 1540 2740 3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe 28 PID 2740 wrote to memory of 1540 2740 3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe 28 PID 2740 wrote to memory of 1540 2740 3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe 28 PID 1540 wrote to memory of 2692 1540 explorer.exe 29 PID 1540 wrote to memory of 2692 1540 explorer.exe 29 PID 1540 wrote to memory of 2692 1540 explorer.exe 29 PID 1540 wrote to memory of 2692 1540 explorer.exe 29 PID 2692 wrote to memory of 2484 2692 spoolsv.exe 30 PID 2692 wrote to memory of 2484 2692 spoolsv.exe 30 PID 2692 wrote to memory of 2484 2692 spoolsv.exe 30 PID 2692 wrote to memory of 2484 2692 spoolsv.exe 30 PID 2484 wrote to memory of 2448 2484 svchost.exe 31 PID 2484 wrote to memory of 2448 2484 svchost.exe 31 PID 2484 wrote to memory of 2448 2484 svchost.exe 31 PID 2484 wrote to memory of 2448 2484 svchost.exe 31 PID 2484 wrote to memory of 2224 2484 svchost.exe 32 PID 2484 wrote to memory of 2224 2484 svchost.exe 32 PID 2484 wrote to memory of 2224 2484 svchost.exe 32 PID 2484 wrote to memory of 2224 2484 svchost.exe 32 PID 2484 wrote to memory of 1448 2484 svchost.exe 36 PID 2484 wrote to memory of 1448 2484 svchost.exe 36 PID 2484 wrote to memory of 1448 2484 svchost.exe 36 PID 2484 wrote to memory of 1448 2484 svchost.exe 36 PID 2484 wrote to memory of 1644 2484 svchost.exe 38 PID 2484 wrote to memory of 1644 2484 svchost.exe 38 PID 2484 wrote to memory of 1644 2484 svchost.exe 38 PID 2484 wrote to memory of 1644 2484 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3490ce781b5a7e105c10665ca67e13a0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2448
-
-
C:\Windows\SysWOW64\at.exeat 03:41 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:2224
-
-
C:\Windows\SysWOW64\at.exeat 03:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1448
-
-
C:\Windows\SysWOW64\at.exeat 03:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe5⤵PID:1644
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5089e5dbfa4be0ae6a38eae6b6c29f5a7
SHA121b8bf4886eb9f880d4529673bb6d39cfeabbfeb
SHA25645fe1aa65d866d7b581c6ed3f94e1b5e8cea9dbea7c57e4306aaa819a390639e
SHA512990e7f795426dd745cbe2fea1a2b2102c2e69437ad34a2e9c5568a113402cfa01d9deaab3197ddd9f8f9b4a6f08e111a847f9a518df34a2826b5aa7090be0981
-
Filesize
66KB
MD592e132d370e08bf5d8706a851406822e
SHA1cdd74077f55e6d56119f64b9967f4e1071fae1b3
SHA256e096bd0600e7003827de78df5597b65a0afb27e6a40d8f16e7151dc0e3d19b33
SHA512f3b48b79586dcd08a5998a8078473d897e525ba52f31e2d9ffbe139a186f91ac101429d3364b17cb6cecc5fc9df72bba68b7583da685fa439a2987da21465d1b
-
Filesize
66KB
MD5f14273f734918c24b654d4792c132c37
SHA1740c93dbb996814c7f02b9408c94d535c8617d89
SHA256ab1dcc27ef7c17c33b9d031132c15563603e5918ee4821c012831a3a8c7c47c7
SHA51271d5a020db57b6b0162b2ef91616390e0b888fc512d6239668f0dc1d6f29b66f319383c628369fdff820d03e55d013c297c26f4a6d96f937ffac10af9ee75a35
-
Filesize
66KB
MD55f8da99d0af3fd0e023bcaa3c5a61510
SHA1e029ed5f74f2c096f412647ad6fd3254c7326ddc
SHA2562d6f8df01f8e6ccdd751de09aff1fcc5d0745bf520f7f112a71720324645e51e
SHA512f892d6bbf8d237ce0a4205437c992459dbb36ee409f06ee94b4795e32bb394e5b4c2d494783739b073bb71c5ab21805a7326b8640ec21b744bf72c26ce995937