Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-05-2024 16:00

General

  • Target

    fcc1584f1926d09667e8eff1649a1270_NEIKI.exe

  • Size

    951KB

  • MD5

    fcc1584f1926d09667e8eff1649a1270

  • SHA1

    8fe04fe0d25147d13988f82fe75473f360f6f9c3

  • SHA256

    02b90bc7cf5a91d558cd6cca8f15811367dcccbe0bb3b6bb91957492770540bd

  • SHA512

    b8be0e54b98b89dddcaca6796367dbb44f2fb751f89ab8fd9557b20b464335147904518bb6a7f23dd44459f068c970e701042278a66dceadad22e6f5afedf3d4

  • SSDEEP

    24576:9y1gi1jMHG/Vc5LsKBnCDUX8g+c+SiyhAzVMSIezuj:YOIjMzhnCDU8E+2hOJIeC

Malware Config

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcc1584f1926d09667e8eff1649a1270_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\fcc1584f1926d09667e8eff1649a1270_NEIKI.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un300244.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un300244.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\78656478.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\78656478.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5152
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 1384
          4⤵
          • Program crash
          PID:5464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk018675.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk018675.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:5612
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5612 -s 1220
          4⤵
          • Program crash
          PID:3836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si672927.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si672927.exe
      2⤵
      • Executes dropped EXE
      PID:5240
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1624 -ip 1624
    1⤵
      PID:5396
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5612 -ip 5612
      1⤵
        PID:5764

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si672927.exe

        Filesize

        168KB

        MD5

        16cf18c8ef1d4be89b36e27c8fb88e9d

        SHA1

        7811ba84f75a1adc6d995c2c1121ec996d1cc003

        SHA256

        116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8

        SHA512

        4cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un300244.exe

        Filesize

        798KB

        MD5

        96706b8b632ee3431c548020eb16d8ad

        SHA1

        1c4d60afd010924901313f05fbaa32ab0f19aed9

        SHA256

        36d8836cae2cd11b6e2567501db76d02ce2342da657cc97928ede554b8a66066

        SHA512

        43de98b07f08d220b5ca77fa2d6323f4aa17fbaee7f938328f8fb897d5ab1d34a4e06fcb990542716985326daf8706788030bba9bce00ca53d93b8a5b6848b69

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\78656478.exe

        Filesize

        479KB

        MD5

        be0d413153569192f050beb48b0a2572

        SHA1

        909732a2eb3617bcc1af584a0a7ead26702d65c8

        SHA256

        0e3f5f78f9534e5ee8085d78fb6f4e7a41adebb2fdd88b492534c25bf4d78d0b

        SHA512

        96f8708783317f5d1098b9ec4be3c23c4c0715acd30c653447109819dc500a10a327d12c481cb19d5af69b34a9fc2f403cdd48d8a0dd7357086873ecbe18a88a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk018675.exe

        Filesize

        539KB

        MD5

        93e278c689042dee812fcebfcbe6308b

        SHA1

        f956bbd31ab7203af9174b25bea75ec6ebc92501

        SHA256

        a3a28037241c25dbfb35c011279c7ab29dc89783f4da3a4d968b52d66a54e73a

        SHA512

        a1de1cf64aafabc84746d12947936841276635132827e21500183adcfcdc25787658255612e14b9c430f3208a508c1b4374799b025f416724d9a1f9d45c46a85

      • C:\Windows\Temp\1.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • memory/1624-43-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-2150-0x0000000005720000-0x000000000572A000-memory.dmp

        Filesize

        40KB

      • memory/1624-20-0x0000000004F00000-0x00000000054A4000-memory.dmp

        Filesize

        5.6MB

      • memory/1624-21-0x0000000004E20000-0x0000000004E76000-memory.dmp

        Filesize

        344KB

      • memory/1624-22-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-29-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-85-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-83-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-79-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-77-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-75-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-73-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-71-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-69-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-67-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-65-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-61-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-59-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-57-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-55-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-53-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-51-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-41-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-47-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-45-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-18-0x0000000000400000-0x000000000081C000-memory.dmp

        Filesize

        4.1MB

      • memory/1624-49-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-37-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-19-0x00000000028F0000-0x0000000002948000-memory.dmp

        Filesize

        352KB

      • memory/1624-34-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-31-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-27-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-25-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-23-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-81-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-63-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-39-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-35-0x0000000004E20000-0x0000000004E71000-memory.dmp

        Filesize

        324KB

      • memory/1624-17-0x0000000000400000-0x000000000044F000-memory.dmp

        Filesize

        316KB

      • memory/1624-15-0x0000000000AA0000-0x0000000000BA0000-memory.dmp

        Filesize

        1024KB

      • memory/1624-2165-0x0000000000400000-0x000000000044F000-memory.dmp

        Filesize

        316KB

      • memory/1624-2166-0x0000000000400000-0x000000000081C000-memory.dmp

        Filesize

        4.1MB

      • memory/1624-16-0x0000000000930000-0x000000000097C000-memory.dmp

        Filesize

        304KB

      • memory/5152-2163-0x0000000000250000-0x000000000025A000-memory.dmp

        Filesize

        40KB

      • memory/5240-4326-0x0000000000D90000-0x0000000000DC0000-memory.dmp

        Filesize

        192KB

      • memory/5240-4327-0x0000000005670000-0x0000000005676000-memory.dmp

        Filesize

        24KB

      • memory/5240-4328-0x0000000005D50000-0x0000000006368000-memory.dmp

        Filesize

        6.1MB

      • memory/5240-4329-0x0000000005840000-0x000000000594A000-memory.dmp

        Filesize

        1.0MB

      • memory/5240-4330-0x0000000005700000-0x0000000005712000-memory.dmp

        Filesize

        72KB

      • memory/5240-4331-0x0000000005770000-0x00000000057AC000-memory.dmp

        Filesize

        240KB

      • memory/5240-4332-0x00000000057C0000-0x000000000580C000-memory.dmp

        Filesize

        304KB

      • memory/5612-2171-0x0000000002870000-0x00000000028D8000-memory.dmp

        Filesize

        416KB

      • memory/5612-2172-0x0000000005540000-0x00000000055A6000-memory.dmp

        Filesize

        408KB

      • memory/5612-4319-0x0000000005750000-0x0000000005782000-memory.dmp

        Filesize

        200KB

      • memory/5612-4320-0x0000000005790000-0x0000000005822000-memory.dmp

        Filesize

        584KB