Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 11:54
Static task
static1
Behavioral task
behavioral1
Sample
eb59affce87f2a0a6582d7be1c28bef0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
eb59affce87f2a0a6582d7be1c28bef0_NeikiAnalytics.exe
-
Size
1.7MB
-
MD5
eb59affce87f2a0a6582d7be1c28bef0
-
SHA1
1e7535ac31776f8893b03af5257b1ec376edfbab
-
SHA256
8cead3d1c259ca63a1a3eceb0a1c1973cf98e7becf0c68c4d1fe5bb00a36391d
-
SHA512
48caa1cdb874e0232da89e81c618b58d24956ce1de8fc2325d95acff635be3e8e99874642249559b48c09a7aadab3101ebd1a324d548b53978f298c09d0fc9f2
-
SSDEEP
24576:4y8+KDG3wo4YOBhoA1xKtJ2EbAaeuLJBnb3vi5PyfMnUtoyer2uZ1xRdMJzZsNQ6:/mqzON1oto5aeuF5/+Pypmr2ufxXMza
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Extracted
redline
most
185.161.248.73:4164
-
auth_value
7da4dfa153f2919e617aa016f7c36008
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/4056-2166-0x0000000005430000-0x000000000543A000-memory.dmp healer behavioral1/files/0x000800000002341b-2171.dat healer behavioral1/memory/428-2182-0x00000000004F0000-0x00000000004FA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/6140-6480-0x0000000005780000-0x00000000057B2000-memory.dmp family_redline behavioral1/files/0x0007000000023421-6485.dat family_redline behavioral1/memory/1556-6487-0x0000000000440000-0x0000000000470000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation c85176889.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation a20633748.exe -
Executes dropped EXE 13 IoCs
pid Process 548 nz673202.exe 1236 dP438577.exe 668 WC141715.exe 3092 Ah850302.exe 4056 a20633748.exe 428 1.exe 5072 b83756073.exe 6032 c85176889.exe 3528 oneetx.exe 6140 d17210359.exe 1556 f88652659.exe 5656 oneetx.exe 6492 oneetx.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eb59affce87f2a0a6582d7be1c28bef0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nz673202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dP438577.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" WC141715.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Ah850302.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5720 5072 WerFault.exe 92 5352 6140 WerFault.exe 102 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2072 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 428 1.exe 428 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4056 a20633748.exe Token: SeDebugPrivilege 5072 b83756073.exe Token: SeDebugPrivilege 428 1.exe Token: SeDebugPrivilege 6140 d17210359.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1204 wrote to memory of 548 1204 eb59affce87f2a0a6582d7be1c28bef0_NeikiAnalytics.exe 82 PID 1204 wrote to memory of 548 1204 eb59affce87f2a0a6582d7be1c28bef0_NeikiAnalytics.exe 82 PID 1204 wrote to memory of 548 1204 eb59affce87f2a0a6582d7be1c28bef0_NeikiAnalytics.exe 82 PID 548 wrote to memory of 1236 548 nz673202.exe 83 PID 548 wrote to memory of 1236 548 nz673202.exe 83 PID 548 wrote to memory of 1236 548 nz673202.exe 83 PID 1236 wrote to memory of 668 1236 dP438577.exe 86 PID 1236 wrote to memory of 668 1236 dP438577.exe 86 PID 1236 wrote to memory of 668 1236 dP438577.exe 86 PID 668 wrote to memory of 3092 668 WC141715.exe 87 PID 668 wrote to memory of 3092 668 WC141715.exe 87 PID 668 wrote to memory of 3092 668 WC141715.exe 87 PID 3092 wrote to memory of 4056 3092 Ah850302.exe 88 PID 3092 wrote to memory of 4056 3092 Ah850302.exe 88 PID 3092 wrote to memory of 4056 3092 Ah850302.exe 88 PID 4056 wrote to memory of 428 4056 a20633748.exe 91 PID 4056 wrote to memory of 428 4056 a20633748.exe 91 PID 3092 wrote to memory of 5072 3092 Ah850302.exe 92 PID 3092 wrote to memory of 5072 3092 Ah850302.exe 92 PID 3092 wrote to memory of 5072 3092 Ah850302.exe 92 PID 668 wrote to memory of 6032 668 WC141715.exe 100 PID 668 wrote to memory of 6032 668 WC141715.exe 100 PID 668 wrote to memory of 6032 668 WC141715.exe 100 PID 6032 wrote to memory of 3528 6032 c85176889.exe 101 PID 6032 wrote to memory of 3528 6032 c85176889.exe 101 PID 6032 wrote to memory of 3528 6032 c85176889.exe 101 PID 1236 wrote to memory of 6140 1236 dP438577.exe 102 PID 1236 wrote to memory of 6140 1236 dP438577.exe 102 PID 1236 wrote to memory of 6140 1236 dP438577.exe 102 PID 3528 wrote to memory of 2072 3528 oneetx.exe 103 PID 3528 wrote to memory of 2072 3528 oneetx.exe 103 PID 3528 wrote to memory of 2072 3528 oneetx.exe 103 PID 3528 wrote to memory of 4080 3528 oneetx.exe 105 PID 3528 wrote to memory of 4080 3528 oneetx.exe 105 PID 3528 wrote to memory of 4080 3528 oneetx.exe 105 PID 4080 wrote to memory of 5632 4080 cmd.exe 107 PID 4080 wrote to memory of 5632 4080 cmd.exe 107 PID 4080 wrote to memory of 5632 4080 cmd.exe 107 PID 4080 wrote to memory of 5268 4080 cmd.exe 108 PID 4080 wrote to memory of 5268 4080 cmd.exe 108 PID 4080 wrote to memory of 5268 4080 cmd.exe 108 PID 4080 wrote to memory of 448 4080 cmd.exe 109 PID 4080 wrote to memory of 448 4080 cmd.exe 109 PID 4080 wrote to memory of 448 4080 cmd.exe 109 PID 4080 wrote to memory of 5516 4080 cmd.exe 110 PID 4080 wrote to memory of 5516 4080 cmd.exe 110 PID 4080 wrote to memory of 5516 4080 cmd.exe 110 PID 4080 wrote to memory of 5128 4080 cmd.exe 111 PID 4080 wrote to memory of 5128 4080 cmd.exe 111 PID 4080 wrote to memory of 5128 4080 cmd.exe 111 PID 4080 wrote to memory of 2688 4080 cmd.exe 112 PID 4080 wrote to memory of 2688 4080 cmd.exe 112 PID 4080 wrote to memory of 2688 4080 cmd.exe 112 PID 548 wrote to memory of 1556 548 nz673202.exe 119 PID 548 wrote to memory of 1556 548 nz673202.exe 119 PID 548 wrote to memory of 1556 548 nz673202.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb59affce87f2a0a6582d7be1c28bef0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\eb59affce87f2a0a6582d7be1c28bef0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nz673202.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nz673202.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dP438577.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dP438577.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WC141715.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WC141715.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ah850302.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Ah850302.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a20633748.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a20633748.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b83756073.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b83756073.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 12967⤵
- Program crash
PID:5720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c85176889.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c85176889.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6032 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:2072
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:5632
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:5268
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:5516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"8⤵PID:5128
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E8⤵PID:2688
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d17210359.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d17210359.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6140 -s 12565⤵
- Program crash
PID:5352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f88652659.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f88652659.exe3⤵
- Executes dropped EXE
PID:1556
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5072 -ip 50721⤵PID:2216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 6140 -ip 61401⤵PID:6020
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:5656
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:6492
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5dbc1a9a11f057a7a221a5d4060f464d7
SHA10c5c5e57863bb9a09bd35e458232a5e586140aff
SHA25644e98fc0317961cc30d92c35c3e5fe667181ad658692cbaa2e477e1aecc66522
SHA5122ac55d8f73ab57235e5b2224377a6cc6ca7d940deb64811a21ecb37c75ac64438857558b519e3605d63f709d1267042a949b5cab154555edacff1f47b537bd1d
-
Filesize
1.3MB
MD53dece2d81288cccac0f15074abf8c138
SHA10c503c983150114cbd6a4b66b1bcddda4f82c3fa
SHA2564e735dad805d51d3f673a3e021dbf960b12b3a7489fe35cbad063cee75f60402
SHA5123759a0143bd2f25ed515f2d1be61fd14ec7965d83d5b5c2289c68b7a2b37f3c8dc0b9f7ed6080a592e2b935f5959bb75e12f741bb80d939f2770edd9d2bf0ff0
-
Filesize
168KB
MD532125dd6b29ac2fe1d2d2c1a0bcd4abd
SHA110f0df7ac4f688abd45d2a2b89e20e9f605dfa55
SHA256800ee592322d629deb6f200a231b40b5f324f487cdff1a522d3ff05a7b5f6838
SHA51247936b3fc3b8d37e2ef3a09139da3aeda57090b64a0d0266da226142e6e2d3142bc7ee4dbaeaf263ba73e66250f773a4bd3a364064675963add8233280c10501
-
Filesize
851KB
MD5569e6ceddf3bdceae37d28f2ebf315c1
SHA117072f3b54cd9bfacd3bab53d8f0cb34d44cdb99
SHA2567766459a395e55c7294784c46dd91a4f0ff6c0c0ac51d280b727599549706741
SHA512ba5f41f637bac959374651fa2f2f4e8e180648a36e3996bffaefa46674381ee53bd9b79603127e489b1827506a16846a7e0a084fee9dc61df057025b2b45d7f2
-
Filesize
582KB
MD59b6c20eaaf1bd6f37b886c8a9ce52a63
SHA1840b3b7e03cee403fea3e9dacb860980c5581ae8
SHA2567e3921b4723460a725899917147d7ba4520df3fb477900a27cdb7ae0c513f00c
SHA512e4a54e2a7a1ffe01b2aaa6eaf0e5f4355b35ae218b6dbedab3b55c8c2de0c5f5d662fcf6502445a5461445ba345fc4aedc76c5860310cbb6d6ddec963656a7ca
-
Filesize
679KB
MD52952425e21e306e95f56d63c449ad58f
SHA15fb3eec078c8ff72a992330019d45bf649ae251b
SHA256a6ddadc2121cf028f396330a56abece76f79b0449bef53f23636132a85541502
SHA5128c782e036496ba3523ad3a5cad79748159f4e8a74b9479a137529e1ab59c221c3d6c0c07a3b3d86b15086a429a6d7281d499cb4e822da0301e90f644802f00a2
-
Filesize
204KB
MD5ab78ea3b11cc53a2c15f0da3709dd994
SHA128c28f14cbacdebed1bfd1a995b85b182511aff5
SHA256768a942b98fb239d1244f5c27470a92328d7578ed4d3b800bf506f2d180aed0c
SHA51229b03be758a2ebe2d656335a0d60d38e7bf50b5a6ab33ecd491517031e381ff15dcdd9b7a07f09a7fa03e6646b6e3ec0d51cf2eb07486055797d1793dae71c42
-
Filesize
301KB
MD591508b6742000a44531ccc6045fbfb1e
SHA12848d62295a855e32280500d7f24208ad4890795
SHA256c6528046a8a55024c8eaf67e27a3ba0bb8881091668cd283ea41022a45a3a1f8
SHA512a2deb49dc34382420ca65acf79c016be1563a2061c484594fbc891fc7f23665391d172b91ed9d0f3aecfc36f73867b5d70e24428112fb6824005f43f36540f4c
-
Filesize
521KB
MD5ecf1d88c44e0b880c4eecf46fa29b32f
SHA11d0fdd80e60663c70d767dcfeafb8b2e45b6735d
SHA256a1418d07e7ce847910a5a0dfa4503627b8f9898efaee7ef608edb6221e87854a
SHA512a542d2384f001990ad018de5d9d63e4dfdc5af021fee73c8f47d5d7f59483b6769d550afe5a720618ec7b1cf286592eb147ba290b5b0aa553fcdb33ed941bef1
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91