Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
11c55b1632caaf8bb0a82eae4dc4c380_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
11c55b1632caaf8bb0a82eae4dc4c380_NEIKI.exe
-
Size
706KB
-
MD5
11c55b1632caaf8bb0a82eae4dc4c380
-
SHA1
d0bf9dd3af21747c804585065121f2b3744a8000
-
SHA256
068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5
-
SHA512
4f249aa4d4465626620838fd57a14ab3d591a543939cb50bc201f8090d1070e84d1beda80d40a7d3e0e2b7697b6616a4df63276d74de319e690c7e49fa0391a2
-
SSDEEP
12288:Ty90uyoUzvFTocxDeXjWZr2xu+ZmNsOZZslGqgtigrKiURO96wOaLQHmJG3:Tym35VxDeyZrrsRgtTURSpLQl3
Malware Config
Signatures
-
Detect ZGRat V1 20 IoCs
resource yara_rule behavioral1/memory/4820-57-0x0000000004BD0000-0x0000000004C0C000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-58-0x0000000004D60000-0x0000000004D9A000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-70-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-68-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-66-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-84-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-64-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-62-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-60-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-59-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-92-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-90-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-88-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-86-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-82-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-80-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-78-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-76-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-74-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 behavioral1/memory/4820-72-0x0000000004D60000-0x0000000004D95000-memory.dmp family_zgrat_v1 -
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1908-18-0x0000000004C80000-0x0000000004C9A000-memory.dmp healer behavioral1/memory/1908-20-0x0000000007710000-0x0000000007728000-memory.dmp healer behavioral1/memory/1908-48-0x0000000007710000-0x0000000007722000-memory.dmp healer behavioral1/memory/1908-47-0x0000000007710000-0x0000000007722000-memory.dmp healer behavioral1/memory/1908-44-0x0000000007710000-0x0000000007722000-memory.dmp healer behavioral1/memory/1908-43-0x0000000007710000-0x0000000007722000-memory.dmp healer behavioral1/memory/1908-40-0x0000000007710000-0x0000000007722000-memory.dmp healer behavioral1/memory/1908-39-0x0000000007710000-0x0000000007722000-memory.dmp healer behavioral1/memory/1908-36-0x0000000007710000-0x0000000007722000-memory.dmp healer behavioral1/memory/1908-34-0x0000000007710000-0x0000000007722000-memory.dmp healer behavioral1/memory/1908-32-0x0000000007710000-0x0000000007722000-memory.dmp healer behavioral1/memory/1908-30-0x0000000007710000-0x0000000007722000-memory.dmp healer behavioral1/memory/1908-28-0x0000000007710000-0x0000000007722000-memory.dmp healer behavioral1/memory/1908-26-0x0000000007710000-0x0000000007722000-memory.dmp healer behavioral1/memory/1908-24-0x0000000007710000-0x0000000007722000-memory.dmp healer behavioral1/memory/1908-22-0x0000000007710000-0x0000000007722000-memory.dmp healer behavioral1/memory/1908-21-0x0000000007710000-0x0000000007722000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr678035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr678035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr678035.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr678035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr678035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr678035.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4820-57-0x0000000004BD0000-0x0000000004C0C000-memory.dmp family_redline behavioral1/memory/4820-58-0x0000000004D60000-0x0000000004D9A000-memory.dmp family_redline behavioral1/memory/4820-70-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-68-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-66-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-84-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-64-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-62-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-60-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-59-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-92-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-90-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-88-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-86-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-82-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-80-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-78-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-76-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-74-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline behavioral1/memory/4820-72-0x0000000004D60000-0x0000000004D95000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 1988 un788801.exe 1908 pr678035.exe 4820 qu384654.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr678035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr678035.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 11c55b1632caaf8bb0a82eae4dc4c380_NEIKI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un788801.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4196 1908 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1908 pr678035.exe 1908 pr678035.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1908 pr678035.exe Token: SeDebugPrivilege 4820 qu384654.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1988 2272 11c55b1632caaf8bb0a82eae4dc4c380_NEIKI.exe 83 PID 2272 wrote to memory of 1988 2272 11c55b1632caaf8bb0a82eae4dc4c380_NEIKI.exe 83 PID 2272 wrote to memory of 1988 2272 11c55b1632caaf8bb0a82eae4dc4c380_NEIKI.exe 83 PID 1988 wrote to memory of 1908 1988 un788801.exe 84 PID 1988 wrote to memory of 1908 1988 un788801.exe 84 PID 1988 wrote to memory of 1908 1988 un788801.exe 84 PID 1988 wrote to memory of 4820 1988 un788801.exe 95 PID 1988 wrote to memory of 4820 1988 un788801.exe 95 PID 1988 wrote to memory of 4820 1988 un788801.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\11c55b1632caaf8bb0a82eae4dc4c380_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\11c55b1632caaf8bb0a82eae4dc4c380_NEIKI.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un788801.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un788801.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr678035.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr678035.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 10804⤵
- Program crash
PID:4196
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu384654.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu384654.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1908 -ip 19081⤵PID:1592
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD5fdadb6139b9a0b2799e5293d77451078
SHA1b91c278b984891a1a9738f241c3bd6c65c5c7b46
SHA2564f508ee7263f85b337632c8c65120ee070f6d6ab8a7816389a9d026104bc4065
SHA5126f79d6bd92160c53e10fadd38a0d9a588e431f7700f62df482c3428816563538ea2ffbd7747eead2463bddcc837910da2213654e660ad0966d2535b83b8d2993
-
Filesize
299KB
MD52f8a8205839f16234cb8cade2bbb9fbd
SHA147e723084212e40ef93c586a8f00acfa6326c823
SHA256aa23fe1c23c14e5c15e989cff511acdfa3ecbe9dd5e0225448f61b27edc2429a
SHA51279d5ec596a3eebe96b15db44d09e3205a776713ff8376c0ef28443c095a57a592141cb9b95b7d35e1106b5e885401851fc0939ef163aaf78e9f615d50d1d9d2e
-
Filesize
381KB
MD56d15285100637907a29d7493529dfab1
SHA10e2b458a92ede49930b092d86f9bca5a76b13a8c
SHA2569ab04cdb54fe732cd58c803788d5f13822a1548c50901135869c9fbf7717ca3f
SHA512e7d7a22d25ace90db1c71bcb696051aba4dc4f3d58f992fada645def185b0f99bb663ff3d7e495d095f214f27581288d1f2bd472389e2389cf80099e455c5f5e