Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 14:53
Static task
static1
Behavioral task
behavioral1
Sample
06cc922bbf2a4da7d68c682c7111ea00_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
06cc922bbf2a4da7d68c682c7111ea00_NeikiAnalytics.exe
-
Size
479KB
-
MD5
06cc922bbf2a4da7d68c682c7111ea00
-
SHA1
01c61c8bd76b8a2e939b4f24d40674d5692a0634
-
SHA256
33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906
-
SHA512
c0cd35bc30ee1171d60a74444a0cb12db66a2e1c5034f4c6565eaaf0619931053a1afa74a37cdadbd39c995f36b258849c486a6983896eb678daab046dcb9622
-
SSDEEP
6144:K5y+bnr+Vp0yN90QEBVXjr+vQkofbHDUShI811MPZPP9jKONDhFHwjqekrkGL:HMrRy90lzSLEHDFIQ1iP95DXgqbrky
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/692-15-0x0000000002140000-0x000000000215A000-memory.dmp healer behavioral1/memory/692-18-0x0000000002430000-0x0000000002448000-memory.dmp healer behavioral1/memory/692-42-0x0000000002430000-0x0000000002442000-memory.dmp healer behavioral1/memory/692-46-0x0000000002430000-0x0000000002442000-memory.dmp healer behavioral1/memory/692-44-0x0000000002430000-0x0000000002442000-memory.dmp healer behavioral1/memory/692-40-0x0000000002430000-0x0000000002442000-memory.dmp healer behavioral1/memory/692-38-0x0000000002430000-0x0000000002442000-memory.dmp healer behavioral1/memory/692-36-0x0000000002430000-0x0000000002442000-memory.dmp healer behavioral1/memory/692-34-0x0000000002430000-0x0000000002442000-memory.dmp healer behavioral1/memory/692-32-0x0000000002430000-0x0000000002442000-memory.dmp healer behavioral1/memory/692-30-0x0000000002430000-0x0000000002442000-memory.dmp healer behavioral1/memory/692-28-0x0000000002430000-0x0000000002442000-memory.dmp healer behavioral1/memory/692-26-0x0000000002430000-0x0000000002442000-memory.dmp healer behavioral1/memory/692-24-0x0000000002430000-0x0000000002442000-memory.dmp healer behavioral1/memory/692-22-0x0000000002430000-0x0000000002442000-memory.dmp healer behavioral1/memory/692-20-0x0000000002430000-0x0000000002442000-memory.dmp healer behavioral1/memory/692-19-0x0000000002430000-0x0000000002442000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k5433425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5433425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5433425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5433425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5433425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5433425.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000700000002341b-52.dat family_redline behavioral1/memory/1556-54-0x00000000009B0000-0x00000000009E0000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 4904 y9477257.exe 692 k5433425.exe 1556 l6495021.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5433425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5433425.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 06cc922bbf2a4da7d68c682c7111ea00_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9477257.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 692 k5433425.exe 692 k5433425.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 692 k5433425.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4904 4948 06cc922bbf2a4da7d68c682c7111ea00_NeikiAnalytics.exe 82 PID 4948 wrote to memory of 4904 4948 06cc922bbf2a4da7d68c682c7111ea00_NeikiAnalytics.exe 82 PID 4948 wrote to memory of 4904 4948 06cc922bbf2a4da7d68c682c7111ea00_NeikiAnalytics.exe 82 PID 4904 wrote to memory of 692 4904 y9477257.exe 83 PID 4904 wrote to memory of 692 4904 y9477257.exe 83 PID 4904 wrote to memory of 692 4904 y9477257.exe 83 PID 4904 wrote to memory of 1556 4904 y9477257.exe 87 PID 4904 wrote to memory of 1556 4904 y9477257.exe 87 PID 4904 wrote to memory of 1556 4904 y9477257.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\06cc922bbf2a4da7d68c682c7111ea00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\06cc922bbf2a4da7d68c682c7111ea00_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9477257.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9477257.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5433425.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5433425.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6495021.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6495021.exe3⤵
- Executes dropped EXE
PID:1556
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD54dae8b133c57c27e1bf01757cb9d33ed
SHA10542ca27850cf2c12e83e0401d63e2e28cd42810
SHA256d509d8a8b98727fb2c80240e14ceb2e2f1a84cca70810a8d52903a267ab0781c
SHA51251cd17d53bdd97c2eb7e10819969f44a7943f373484ab59357f46ccc68e2bf128574056c7e00452db6b7720885e6cf8593eb109aebb7246ced0be569a8cfe19f
-
Filesize
180KB
MD515811fa130faf6ade865ed3ff4cd99d6
SHA1e75b07327f739516c95acfc38f10fa1f9eaa0bb1
SHA2561c34d40d440b840b3520515b7f4fcbdcfbfe16beca8487210fa959379a3411e0
SHA5122b8893132471ad4dfef677ada7dbea9f6bc6be46c65181c803f3a54660a5bd4b6781f05f1938104493f8dfcf38c08403e7cd96d7aa4b42ee4cf5522ef3bbf538
-
Filesize
168KB
MD5bb7093762effc7c49c358b7047f7764d
SHA181a880b3e2e100008a1452a127d659571c4fa72a
SHA2563d56ab8fefb64130e148bac7e3add9bdd81efcbde224305b7f6abc6a3a047b08
SHA5127cd3db72985f1a34a01fc6e916607adca5d67186a99a0c7299f5cc16e33927c7ee37568999e2d7c4751b3f76d1bad60836827e225223c29838727165f2c78d1b