Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 01:00
Static task
static1
Behavioral task
behavioral1
Sample
446bbcd1b1286fb3181f446312df1500_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
446bbcd1b1286fb3181f446312df1500_NeikiAnalytics.exe
-
Size
591KB
-
MD5
446bbcd1b1286fb3181f446312df1500
-
SHA1
bbbd0fb3daf71deadf748120ed4c2760194d72dc
-
SHA256
cdb2cf292a9680a20c3a600bc9c5eb2d76252c6ba3a4edd9154158d855694b30
-
SHA512
c95a34e7f10e1cfa126d8bf8af3ae099a2bc3a6b46acb8e42900ea1c00387c1d9c29d5ee900999d092e392bde5c21c5ec922855a0cf1bb39a2e21ac6eb8c5094
-
SSDEEP
12288:by905/BrsrSS900VazoYYK+faypu4niRg6Jli4gNPUR0FlkA:byy/JrX3+ZpusiWM8NPC0FlR
Malware Config
Signatures
-
Detect ZGRat V1 20 IoCs
resource yara_rule behavioral1/memory/4228-53-0x0000000004E00000-0x0000000004E3A000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-51-0x0000000002720000-0x000000000275C000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-55-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-54-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-67-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-87-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-85-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-83-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-81-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-79-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-77-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-75-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-73-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-71-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-69-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-65-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-63-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-61-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-59-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 behavioral1/memory/4228-57-0x0000000004E00000-0x0000000004E35000-memory.dmp family_zgrat_v1 -
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1140-12-0x0000000004CF0000-0x0000000004D0A000-memory.dmp healer behavioral1/memory/1140-14-0x0000000005360000-0x0000000005378000-memory.dmp healer behavioral1/memory/1140-15-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1140-22-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1140-42-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1140-38-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1140-36-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1140-34-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1140-32-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1140-30-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1140-28-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1140-26-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1140-24-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1140-20-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1140-18-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1140-16-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1140-41-0x0000000005360000-0x0000000005372000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 77994781.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 77994781.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 77994781.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 77994781.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 77994781.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 77994781.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4228-53-0x0000000004E00000-0x0000000004E3A000-memory.dmp family_redline behavioral1/memory/4228-51-0x0000000002720000-0x000000000275C000-memory.dmp family_redline behavioral1/memory/4228-55-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-54-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-67-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-87-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-85-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-83-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-81-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-79-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-77-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-75-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-73-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-71-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-69-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-65-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-63-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-61-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-59-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline behavioral1/memory/4228-57-0x0000000004E00000-0x0000000004E35000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 1140 77994781.exe 4228 rk995219.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 77994781.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 77994781.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 446bbcd1b1286fb3181f446312df1500_NeikiAnalytics.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3296 1140 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1140 77994781.exe 1140 77994781.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1140 77994781.exe Token: SeDebugPrivilege 4228 rk995219.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3756 wrote to memory of 1140 3756 446bbcd1b1286fb3181f446312df1500_NeikiAnalytics.exe 81 PID 3756 wrote to memory of 1140 3756 446bbcd1b1286fb3181f446312df1500_NeikiAnalytics.exe 81 PID 3756 wrote to memory of 1140 3756 446bbcd1b1286fb3181f446312df1500_NeikiAnalytics.exe 81 PID 3756 wrote to memory of 4228 3756 446bbcd1b1286fb3181f446312df1500_NeikiAnalytics.exe 89 PID 3756 wrote to memory of 4228 3756 446bbcd1b1286fb3181f446312df1500_NeikiAnalytics.exe 89 PID 3756 wrote to memory of 4228 3756 446bbcd1b1286fb3181f446312df1500_NeikiAnalytics.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\446bbcd1b1286fb3181f446312df1500_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\446bbcd1b1286fb3181f446312df1500_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\77994781.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\77994781.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 10803⤵
- Program crash
PID:3296
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rk995219.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rk995219.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1140 -ip 11401⤵PID:2760
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD57aa18f1401c4a8c8a246aeecb0e9e81b
SHA18bb765b56077cb70cfeb1a5dcc979d8c5e465682
SHA2569753ffa20b8d468ae3080e9ab4bd0d45acc2d739c0e7ec7104054b80931f08e6
SHA51254c72f69a24ac03b2d2057c68cb38ba519258c8f7c1533c766150aa22c95463d926f335fcbbac8b909caf6576643f5731c35b1d08c10433de176a62584c7ab45
-
Filesize
459KB
MD55cbea374e56f795e0cc544a45a3b1f6a
SHA1417b27345f5944347ba77fc8d10b5732b5c303bf
SHA25683e890c0ffb12c48d616ca4f298ba6b01427518187e7e26c95e41711c204c747
SHA5124ac8d63f183a2f805587a844f6113f027ca70d4fbbc343652661448acbb16231ebcaaedbb3214b8f26024e0857825402dff05872ce409d97215e82b663302223