Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 08:15
Static task
static1
Behavioral task
behavioral1
Sample
24113d3ed2dc8ba8789b2874addb0750_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
24113d3ed2dc8ba8789b2874addb0750_NEIKI.exe
-
Size
307KB
-
MD5
24113d3ed2dc8ba8789b2874addb0750
-
SHA1
2901dff1dd1b5b619d48c8d04d22c185922e651b
-
SHA256
94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae
-
SHA512
409754870b1cf18269d84a798f69e11cb54540d12217fc0674524ef0e3d42ce38d199d45b7e1b7cb96a70fff87704561b6208bb58bc2628881b9a3d7422aecc7
-
SSDEEP
6144:Kxy+bnr++p0yN90QEA5F5OYc1u31g4TBylzQbR/JOF:HMriy90mxc1u31TTEtQb1JOF
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4892-8-0x00000000007E0000-0x00000000007FA000-memory.dmp healer behavioral1/memory/4892-11-0x0000000002520000-0x0000000002538000-memory.dmp healer behavioral1/memory/4892-39-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4892-31-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4892-29-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4892-25-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4892-23-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4892-19-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4892-15-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4892-13-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4892-12-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4892-37-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4892-35-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4892-33-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4892-27-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4892-21-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4892-17-0x0000000002520000-0x0000000002532000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k8916177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8916177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8916177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8916177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8916177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8916177.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b96-44.dat family_redline behavioral1/memory/4312-46-0x0000000000EA0000-0x0000000000EC8000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 4892 k8916177.exe 4312 l7529087.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k8916177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8916177.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 24113d3ed2dc8ba8789b2874addb0750_NEIKI.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4892 k8916177.exe 4892 k8916177.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4892 k8916177.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1004 wrote to memory of 4892 1004 24113d3ed2dc8ba8789b2874addb0750_NEIKI.exe 85 PID 1004 wrote to memory of 4892 1004 24113d3ed2dc8ba8789b2874addb0750_NEIKI.exe 85 PID 1004 wrote to memory of 4892 1004 24113d3ed2dc8ba8789b2874addb0750_NEIKI.exe 85 PID 1004 wrote to memory of 4312 1004 24113d3ed2dc8ba8789b2874addb0750_NEIKI.exe 90 PID 1004 wrote to memory of 4312 1004 24113d3ed2dc8ba8789b2874addb0750_NEIKI.exe 90 PID 1004 wrote to memory of 4312 1004 24113d3ed2dc8ba8789b2874addb0750_NEIKI.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\24113d3ed2dc8ba8789b2874addb0750_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\24113d3ed2dc8ba8789b2874addb0750_NEIKI.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k8916177.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k8916177.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l7529087.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l7529087.exe2⤵
- Executes dropped EXE
PID:4312
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a488df49a762065f75f41ee76c2215b4
SHA16ffd0bf006ca60251cf8b298891d317693885fe9
SHA256cf8fd74e3f74fb3dafb881e7070287a7ad77296cbaab59a0b8968de37365c0d3
SHA5125480aa133771076a21c984512f42a9020b012f7735960b05de7908f7bc13a8944bfcdaa4a28415ac6395e4f86e96c29251dbae9284917ce7e23eb623a79477f3
-
Filesize
136KB
MD5ea7424a74eacf1d89358ccbde8484098
SHA1d66cac767a565053916ba6604ca5272d2d0e17aa
SHA256ed28be548a5ca5d75c2bf5ec47ba896d4f4e6916abee3cf04dca41d9fd87249a
SHA512c50b3c66646a429830eb4c90fff4bacf764c9cc4ced25f1b854b3d77a1a27e9aebc6d1c28330062e4bc2adc0a603bc75a5fe4be6d7a64449a7664f8d2ffb70fc