Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
2cf3440b2d80262ff7e81b5e204dbd20_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2cf3440b2d80262ff7e81b5e204dbd20_NeikiAnalytics.exe
-
Size
549KB
-
MD5
2cf3440b2d80262ff7e81b5e204dbd20
-
SHA1
d6356872e9a662519642cc082e006f8740acdf6b
-
SHA256
0585e6076efbd458084570eedaa67d5aa4ab5d9e84dab51575700d81fc62b339
-
SHA512
b4119ab90a205788b835899937ce4bd4582f635839ce2864d4adcfe684a1b372b94071c1f49469c9fdb0575719f4ab23a3bb4a959d23e9cc36b9353c780cd4b0
-
SSDEEP
12288:6MrMy90IsGEEvxrgzFE9q68EslUpPdxzEKz41d0E50Uo:6yDsErf9N+lUbx0p50Uo
Malware Config
Extracted
redline
norm
77.91.68.70:19073
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/3216-14-0x0000000000500000-0x000000000050A000-memory.dmp healer behavioral1/files/0x0007000000023476-23.dat healer behavioral1/memory/2260-25-0x00000000008C0000-0x00000000008CA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8956746.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b9445885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b9445885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b9445885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b9445885.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8956746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8956746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8956746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8956746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8956746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b9445885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b9445885.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2020-30-0x0000000000550000-0x0000000000580000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4412 v5404905.exe 3216 a8956746.exe 2260 b9445885.exe 2020 c0447071.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8956746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8956746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b9445885.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2cf3440b2d80262ff7e81b5e204dbd20_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5404905.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3216 a8956746.exe 3216 a8956746.exe 2260 b9445885.exe 2260 b9445885.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3216 a8956746.exe Token: SeDebugPrivilege 2260 b9445885.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2864 wrote to memory of 4412 2864 2cf3440b2d80262ff7e81b5e204dbd20_NeikiAnalytics.exe 83 PID 2864 wrote to memory of 4412 2864 2cf3440b2d80262ff7e81b5e204dbd20_NeikiAnalytics.exe 83 PID 2864 wrote to memory of 4412 2864 2cf3440b2d80262ff7e81b5e204dbd20_NeikiAnalytics.exe 83 PID 4412 wrote to memory of 3216 4412 v5404905.exe 84 PID 4412 wrote to memory of 3216 4412 v5404905.exe 84 PID 4412 wrote to memory of 3216 4412 v5404905.exe 84 PID 4412 wrote to memory of 2260 4412 v5404905.exe 95 PID 4412 wrote to memory of 2260 4412 v5404905.exe 95 PID 2864 wrote to memory of 2020 2864 2cf3440b2d80262ff7e81b5e204dbd20_NeikiAnalytics.exe 96 PID 2864 wrote to memory of 2020 2864 2cf3440b2d80262ff7e81b5e204dbd20_NeikiAnalytics.exe 96 PID 2864 wrote to memory of 2020 2864 2cf3440b2d80262ff7e81b5e204dbd20_NeikiAnalytics.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cf3440b2d80262ff7e81b5e204dbd20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2cf3440b2d80262ff7e81b5e204dbd20_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5404905.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5404905.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8956746.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8956746.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9445885.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9445885.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c0447071.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c0447071.exe2⤵
- Executes dropped EXE
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1.3MB
MD5f562171d84a24d8e9dd4b9b963a3c9a5
SHA18e6a66a1ff0977a40e3a092c11f9c7b944e39f54
SHA256c0d0e395859918cbcc6915501a3acb89f4a07925cba31f8db92d9c6ad3f44e56
SHA512239cdbcf2bd7693c34e0320eda1b2abf446a69807398e7e00e3799348eeb7ce05554da19da0f70174a399c2531bc2b70a828a7b90a108b372e6ece15c02f31b2
-
Filesize
216KB
MD5095a749df5b15e24eab3b2f6bad2ef63
SHA173c4f165fb2a86bb56a18c5556523dc768978bff
SHA2560cfb7bdfd0142bd4c25025a21a3127f49a2c95413e22ac887048fb79fd0ded75
SHA5128725015ee28e53136f45569e31cc99b8dfbd36a85e71c2969ad5f9c8c8de663f48b82d5c10e2a8168b77326a1cc9d43f62c5cf845322219ac190cc714dfb0988
-
Filesize
185KB
MD5263befbc9f53ae6a8836ea233ead58dc
SHA1a32170410e34bd3525d0df8c57a6693b0e9549d5
SHA2563cea536de2994de5250096d9fb20b5e64906f488f22d5a242050fb7e40915705
SHA512850edfb97d52ea6fef814f3931a166dd6778918407f068927d6af7fae27c1d4af10292e0389b3402079f17ce9bbf7f92f35eadc2f9a080a3af2a0a857ffd163b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91