Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    19-05-2024 18:23

General

  • Target

    13d3d449571b1e91461c47906718b6e0_NeikiAnalytics.exe

  • Size

    679KB

  • MD5

    13d3d449571b1e91461c47906718b6e0

  • SHA1

    53745fe45c1fbd80fec88d00cc11286ad06fd108

  • SHA256

    b66a5fd24a0e77f6772324d98bc7778c5e44751382f2b4c98db10690232c606b

  • SHA512

    7c148187762f3e634d179690f18d71895ac743037a6b4327be48e3def7a26e001c0ea51c10c07ba35b14b56b3b7923630bcc2b1925928e21ebcb08a6409016b6

  • SSDEEP

    12288:SSiG+EdrLbDZaNRpsMTBO1IwNgrCNchl0nJ8k6C2AaTC1H+1x/:nhLDZMRpRTGr8kJ96C

Malware Config

Extracted

Family

redline

Botnet

4

C2

94.156.8.28:65012

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13d3d449571b1e91461c47906718b6e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\13d3d449571b1e91461c47906718b6e0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\13d3d449571b1e91461c47906718b6e0_NeikiAnalytics.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2720
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\htRnenwXES.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2624
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\htRnenwXES" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5080.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2752
    • C:\Users\Admin\AppData\Local\Temp\13d3d449571b1e91461c47906718b6e0_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\13d3d449571b1e91461c47906718b6e0_NeikiAnalytics.exe"
      2⤵
        PID:2784
      • C:\Users\Admin\AppData\Local\Temp\13d3d449571b1e91461c47906718b6e0_NeikiAnalytics.exe
        "C:\Users\Admin\AppData\Local\Temp\13d3d449571b1e91461c47906718b6e0_NeikiAnalytics.exe"
        2⤵
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        PID:2496

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    PowerShell

    1
    T1059.001

    Scheduled Task/Job

    1
    T1053

    Persistence

    Scheduled Task/Job

    1
    T1053

    Privilege Escalation

    Scheduled Task/Job

    1
    T1053

    Defense Evasion

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4624ea503ded06db6089ad595f874a83

      SHA1

      3e094e94cb12a12b1aa96bd348a585de0e2801c8

      SHA256

      3689277e6fd01a50e1ce2ce8df211976f3284a42e191eb7f3ff718c8fbd4ae27

      SHA512

      e1a7fab407be42a5295cf709f8616e7a803b84e3b2a538d48297f672a71172faaa0a8e444aeee7d7beb31f1f6c81db9022bda1ac824df85d5252b5a890247920

    • C:\Users\Admin\AppData\Local\Temp\Cab69DC.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar6A2D.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\tmp5080.tmp
      Filesize

      1KB

      MD5

      d02578a025401f94f9f61e599b420b6b

      SHA1

      ee126ef0c55dbc8873cb3756549328240dff197f

      SHA256

      a5ca48caa3a8ab77ed68c625a6f6f597295b6dfa9ed6cbd016719eb8d366c5c2

      SHA512

      937cd624d034b880faa59bc425de5ee46cc14893399cfe3d05b65c4256c267a470bcf6cc573710a3d31669b5fa432a4794f16ebd632ba637e86371ddf94ee00d

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      Filesize

      7KB

      MD5

      470b31b9274db8dea0d54834f8ded06c

      SHA1

      28c5b09b606d40f2e8b76aebd54cfea95e8e140a

      SHA256

      80cbedae16ae5c96063a6264b8d8393d04e469a0d6090e07fe84156258eada47

      SHA512

      e346d7ac9a208cf59cd84efc6c30cc0ae8939766c927d34cfd3c3500b4b89b70653203e109e0fd66257c89b99ff7f3f55f56b2643ea13e6f2b3178d7ce1f5147

    • memory/1960-28-0x0000000074760000-0x0000000074E4E000-memory.dmp
      Filesize

      6.9MB

    • memory/1960-0-0x000000007476E000-0x000000007476F000-memory.dmp
      Filesize

      4KB

    • memory/1960-5-0x0000000000750000-0x0000000000760000-memory.dmp
      Filesize

      64KB

    • memory/1960-4-0x0000000000740000-0x000000000074C000-memory.dmp
      Filesize

      48KB

    • memory/1960-6-0x00000000047A0000-0x0000000004800000-memory.dmp
      Filesize

      384KB

    • memory/1960-1-0x00000000012F0000-0x00000000013A0000-memory.dmp
      Filesize

      704KB

    • memory/1960-2-0x0000000074760000-0x0000000074E4E000-memory.dmp
      Filesize

      6.9MB

    • memory/1960-3-0x0000000000720000-0x0000000000742000-memory.dmp
      Filesize

      136KB

    • memory/2496-27-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2496-18-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2496-20-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2496-29-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2496-31-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2496-22-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2496-24-0x0000000000400000-0x000000000041E000-memory.dmp
      Filesize

      120KB

    • memory/2496-26-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB