Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-05-2024 11:54

General

  • Target

    eb59affce87f2a0a6582d7be1c28bef0_NeikiAnalytics.exe

  • Size

    1.7MB

  • MD5

    eb59affce87f2a0a6582d7be1c28bef0

  • SHA1

    1e7535ac31776f8893b03af5257b1ec376edfbab

  • SHA256

    8cead3d1c259ca63a1a3eceb0a1c1973cf98e7becf0c68c4d1fe5bb00a36391d

  • SHA512

    48caa1cdb874e0232da89e81c618b58d24956ce1de8fc2325d95acff635be3e8e99874642249559b48c09a7aadab3101ebd1a324d548b53978f298c09d0fc9f2

  • SSDEEP

    24576:4y8+KDG3wo4YOBhoA1xKtJ2EbAaeuLJBnb3vi5PyfMnUtoyer2uZ1xRdMJzZsNQ6:/mqzON1oto5aeuF5/+Pypmr2ufxXMza

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb59affce87f2a0a6582d7be1c28bef0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\eb59affce87f2a0a6582d7be1c28bef0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nz673202.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nz673202.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dP438577.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dP438577.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1236
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WC141715.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WC141715.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:668
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ah850302.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ah850302.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3092
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a20633748.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a20633748.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4056
              • C:\Windows\Temp\1.exe
                "C:\Windows\Temp\1.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:428
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b83756073.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b83756073.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:5072
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 1296
                7⤵
                • Program crash
                PID:5720
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c85176889.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c85176889.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:6032
            • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
              "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3528
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:2072
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4080
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:5632
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "oneetx.exe" /P "Admin:N"
                    8⤵
                      PID:5268
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "oneetx.exe" /P "Admin:R" /E
                      8⤵
                        PID:448
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:5516
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\cb7ae701b3" /P "Admin:N"
                          8⤵
                            PID:5128
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\cb7ae701b3" /P "Admin:R" /E
                            8⤵
                              PID:2688
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d17210359.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d17210359.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:6140
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 6140 -s 1256
                        5⤵
                        • Program crash
                        PID:5352
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f88652659.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f88652659.exe
                    3⤵
                    • Executes dropped EXE
                    PID:1556
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5072 -ip 5072
                1⤵
                  PID:2216
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 6140 -ip 6140
                  1⤵
                    PID:6020
                  • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                    C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                    1⤵
                    • Executes dropped EXE
                    PID:5656
                  • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                    C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                    1⤵
                    • Executes dropped EXE
                    PID:6492

                  Network

                  MITRE ATT&CK Matrix ATT&CK v13

                  Execution

                  Scheduled Task/Job

                  1
                  T1053

                  Persistence

                  Create or Modify System Process

                  1
                  T1543

                  Windows Service

                  1
                  T1543.003

                  Boot or Logon Autostart Execution

                  1
                  T1547

                  Registry Run Keys / Startup Folder

                  1
                  T1547.001

                  Scheduled Task/Job

                  1
                  T1053

                  Privilege Escalation

                  Create or Modify System Process

                  1
                  T1543

                  Windows Service

                  1
                  T1543.003

                  Boot or Logon Autostart Execution

                  1
                  T1547

                  Registry Run Keys / Startup Folder

                  1
                  T1547.001

                  Scheduled Task/Job

                  1
                  T1053

                  Defense Evasion

                  Modify Registry

                  3
                  T1112

                  Impair Defenses

                  2
                  T1562

                  Disable or Modify Tools

                  2
                  T1562.001

                  Discovery

                  Query Registry

                  1
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nz673202.exe
                    Filesize

                    1.4MB

                    MD5

                    dbc1a9a11f057a7a221a5d4060f464d7

                    SHA1

                    0c5c5e57863bb9a09bd35e458232a5e586140aff

                    SHA256

                    44e98fc0317961cc30d92c35c3e5fe667181ad658692cbaa2e477e1aecc66522

                    SHA512

                    2ac55d8f73ab57235e5b2224377a6cc6ca7d940deb64811a21ecb37c75ac64438857558b519e3605d63f709d1267042a949b5cab154555edacff1f47b537bd1d

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dP438577.exe
                    Filesize

                    1.3MB

                    MD5

                    3dece2d81288cccac0f15074abf8c138

                    SHA1

                    0c503c983150114cbd6a4b66b1bcddda4f82c3fa

                    SHA256

                    4e735dad805d51d3f673a3e021dbf960b12b3a7489fe35cbad063cee75f60402

                    SHA512

                    3759a0143bd2f25ed515f2d1be61fd14ec7965d83d5b5c2289c68b7a2b37f3c8dc0b9f7ed6080a592e2b935f5959bb75e12f741bb80d939f2770edd9d2bf0ff0

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f88652659.exe
                    Filesize

                    168KB

                    MD5

                    32125dd6b29ac2fe1d2d2c1a0bcd4abd

                    SHA1

                    10f0df7ac4f688abd45d2a2b89e20e9f605dfa55

                    SHA256

                    800ee592322d629deb6f200a231b40b5f324f487cdff1a522d3ff05a7b5f6838

                    SHA512

                    47936b3fc3b8d37e2ef3a09139da3aeda57090b64a0d0266da226142e6e2d3142bc7ee4dbaeaf263ba73e66250f773a4bd3a364064675963add8233280c10501

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WC141715.exe
                    Filesize

                    851KB

                    MD5

                    569e6ceddf3bdceae37d28f2ebf315c1

                    SHA1

                    17072f3b54cd9bfacd3bab53d8f0cb34d44cdb99

                    SHA256

                    7766459a395e55c7294784c46dd91a4f0ff6c0c0ac51d280b727599549706741

                    SHA512

                    ba5f41f637bac959374651fa2f2f4e8e180648a36e3996bffaefa46674381ee53bd9b79603127e489b1827506a16846a7e0a084fee9dc61df057025b2b45d7f2

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d17210359.exe
                    Filesize

                    582KB

                    MD5

                    9b6c20eaaf1bd6f37b886c8a9ce52a63

                    SHA1

                    840b3b7e03cee403fea3e9dacb860980c5581ae8

                    SHA256

                    7e3921b4723460a725899917147d7ba4520df3fb477900a27cdb7ae0c513f00c

                    SHA512

                    e4a54e2a7a1ffe01b2aaa6eaf0e5f4355b35ae218b6dbedab3b55c8c2de0c5f5d662fcf6502445a5461445ba345fc4aedc76c5860310cbb6d6ddec963656a7ca

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ah850302.exe
                    Filesize

                    679KB

                    MD5

                    2952425e21e306e95f56d63c449ad58f

                    SHA1

                    5fb3eec078c8ff72a992330019d45bf649ae251b

                    SHA256

                    a6ddadc2121cf028f396330a56abece76f79b0449bef53f23636132a85541502

                    SHA512

                    8c782e036496ba3523ad3a5cad79748159f4e8a74b9479a137529e1ab59c221c3d6c0c07a3b3d86b15086a429a6d7281d499cb4e822da0301e90f644802f00a2

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c85176889.exe
                    Filesize

                    204KB

                    MD5

                    ab78ea3b11cc53a2c15f0da3709dd994

                    SHA1

                    28c28f14cbacdebed1bfd1a995b85b182511aff5

                    SHA256

                    768a942b98fb239d1244f5c27470a92328d7578ed4d3b800bf506f2d180aed0c

                    SHA512

                    29b03be758a2ebe2d656335a0d60d38e7bf50b5a6ab33ecd491517031e381ff15dcdd9b7a07f09a7fa03e6646b6e3ec0d51cf2eb07486055797d1793dae71c42

                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a20633748.exe
                    Filesize

                    301KB

                    MD5

                    91508b6742000a44531ccc6045fbfb1e

                    SHA1

                    2848d62295a855e32280500d7f24208ad4890795

                    SHA256

                    c6528046a8a55024c8eaf67e27a3ba0bb8881091668cd283ea41022a45a3a1f8

                    SHA512

                    a2deb49dc34382420ca65acf79c016be1563a2061c484594fbc891fc7f23665391d172b91ed9d0f3aecfc36f73867b5d70e24428112fb6824005f43f36540f4c

                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b83756073.exe
                    Filesize

                    521KB

                    MD5

                    ecf1d88c44e0b880c4eecf46fa29b32f

                    SHA1

                    1d0fdd80e60663c70d767dcfeafb8b2e45b6735d

                    SHA256

                    a1418d07e7ce847910a5a0dfa4503627b8f9898efaee7ef608edb6221e87854a

                    SHA512

                    a542d2384f001990ad018de5d9d63e4dfdc5af021fee73c8f47d5d7f59483b6769d550afe5a720618ec7b1cf286592eb147ba290b5b0aa553fcdb33ed941bef1

                  • C:\Windows\Temp\1.exe
                    Filesize

                    11KB

                    MD5

                    7e93bacbbc33e6652e147e7fe07572a0

                    SHA1

                    421a7167da01c8da4dc4d5234ca3dd84e319e762

                    SHA256

                    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                    SHA512

                    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                  • memory/428-2182-0x00000000004F0000-0x00000000004FA000-memory.dmp
                    Filesize

                    40KB

                  • memory/1556-6490-0x000000000A3F0000-0x000000000A4FA000-memory.dmp
                    Filesize

                    1.0MB

                  • memory/1556-6489-0x000000000A8C0000-0x000000000AED8000-memory.dmp
                    Filesize

                    6.1MB

                  • memory/1556-6488-0x0000000000CB0000-0x0000000000CB6000-memory.dmp
                    Filesize

                    24KB

                  • memory/1556-6487-0x0000000000440000-0x0000000000470000-memory.dmp
                    Filesize

                    192KB

                  • memory/1556-6491-0x000000000A320000-0x000000000A332000-memory.dmp
                    Filesize

                    72KB

                  • memory/1556-6492-0x000000000A380000-0x000000000A3BC000-memory.dmp
                    Filesize

                    240KB

                  • memory/1556-6493-0x0000000002760000-0x00000000027AC000-memory.dmp
                    Filesize

                    304KB

                  • memory/4056-91-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-39-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-77-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-75-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-73-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-71-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-65-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-63-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-61-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-59-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-55-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-53-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-47-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-45-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-43-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-97-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-79-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-69-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-67-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-57-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-41-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-81-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-38-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-2166-0x0000000005430000-0x000000000543A000-memory.dmp
                    Filesize

                    40KB

                  • memory/4056-83-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-85-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-87-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-35-0x0000000004A50000-0x0000000004AA8000-memory.dmp
                    Filesize

                    352KB

                  • memory/4056-90-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-93-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-36-0x0000000004AF0000-0x0000000005094000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/4056-37-0x00000000050E0000-0x0000000005136000-memory.dmp
                    Filesize

                    344KB

                  • memory/4056-49-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-95-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-99-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-101-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/4056-51-0x00000000050E0000-0x0000000005131000-memory.dmp
                    Filesize

                    324KB

                  • memory/5072-4312-0x0000000005750000-0x00000000057E2000-memory.dmp
                    Filesize

                    584KB

                  • memory/6140-6480-0x0000000005780000-0x00000000057B2000-memory.dmp
                    Filesize

                    200KB

                  • memory/6140-4333-0x0000000002910000-0x0000000002976000-memory.dmp
                    Filesize

                    408KB

                  • memory/6140-4332-0x0000000002830000-0x0000000002898000-memory.dmp
                    Filesize

                    416KB