Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
0d0e7ca89c86838b73a273253ba51f10_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
0d0e7ca89c86838b73a273253ba51f10_NeikiAnalytics.exe
-
Size
552KB
-
MD5
0d0e7ca89c86838b73a273253ba51f10
-
SHA1
78df80c4687451e3ae52c620dc0623398c837be2
-
SHA256
3b681afcaf9365eb94da64a4454a9aee2e929e7fb6fd476116f720ca7442d092
-
SHA512
937a2530648dd7f6b524c4ba1e9c3f9dc3a82be7b678285826c0223236e81e1df9b5dc55a044abc4309ac6f24279ce0eb1e480121e56fce063b8b26dce06454d
-
SSDEEP
12288:YMruy90Eq5Ryh/MI50irANYlK1ddzJr2HZVPAaawSSu/:myX1Rco0dzqtLawC
Malware Config
Extracted
redline
norm
77.91.68.70:19073
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/3316-14-0x0000000000510000-0x000000000051A000-memory.dmp healer behavioral1/files/0x0007000000023410-23.dat healer behavioral1/memory/4724-25-0x0000000000F00000-0x0000000000F0A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b2958444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b2958444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7574220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7574220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7574220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7574220.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b2958444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b2958444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b2958444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b2958444.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7574220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7574220.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/208-30-0x0000000000550000-0x0000000000580000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2172 v6582559.exe 3316 a7574220.exe 4724 b2958444.exe 208 c9413236.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7574220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7574220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b2958444.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0d0e7ca89c86838b73a273253ba51f10_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6582559.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2596 sc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3316 a7574220.exe 3316 a7574220.exe 4724 b2958444.exe 4724 b2958444.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3316 a7574220.exe Token: SeDebugPrivilege 4724 b2958444.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2172 2572 0d0e7ca89c86838b73a273253ba51f10_NeikiAnalytics.exe 82 PID 2572 wrote to memory of 2172 2572 0d0e7ca89c86838b73a273253ba51f10_NeikiAnalytics.exe 82 PID 2572 wrote to memory of 2172 2572 0d0e7ca89c86838b73a273253ba51f10_NeikiAnalytics.exe 82 PID 2172 wrote to memory of 3316 2172 v6582559.exe 83 PID 2172 wrote to memory of 3316 2172 v6582559.exe 83 PID 2172 wrote to memory of 3316 2172 v6582559.exe 83 PID 2172 wrote to memory of 4724 2172 v6582559.exe 93 PID 2172 wrote to memory of 4724 2172 v6582559.exe 93 PID 2572 wrote to memory of 208 2572 0d0e7ca89c86838b73a273253ba51f10_NeikiAnalytics.exe 94 PID 2572 wrote to memory of 208 2572 0d0e7ca89c86838b73a273253ba51f10_NeikiAnalytics.exe 94 PID 2572 wrote to memory of 208 2572 0d0e7ca89c86838b73a273253ba51f10_NeikiAnalytics.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d0e7ca89c86838b73a273253ba51f10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0d0e7ca89c86838b73a273253ba51f10_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6582559.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6582559.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7574220.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7574220.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2958444.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2958444.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c9413236.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c9413236.exe2⤵
- Executes dropped EXE
PID:208
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2596
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
1.3MB
MD5c9c5233709b26bf36148a8efda651867
SHA14de92fb05eb151d490690f26af81c96ed2644b93
SHA25611bb8aa16860b4826493eec380852ddbe0b847b0b2edb72b18d71e72c8d1cc42
SHA512027fdef8e5835df847b8805f593abd52c2ddb1555628091e6ce588a5ca9a55fe04566fa2e9ecf2843f25d635865b38d4db59e047dee570aabbd485abfd49de5b
-
Filesize
217KB
MD5c2c2397f9d5063b76bfeac1b841bd13e
SHA187291dfc6da1489a1691d00c4d9014ac65d294d6
SHA2565d1b2eafd8c634510644fa6201b38bad1acdc3931d2f5fd0f622b549adea70ab
SHA512eab7eef46b867d2b127f1b629e2ad9cda582256e490034f5865dc1024b8c0ffeaa318f0c19d0690f449fffbcdd61d7ef80db44e653b6bda3296ea8073fd6096e
-
Filesize
185KB
MD55bcb6e086b9b8b2b507a6161f1f5fdb8
SHA13cf84bdcde74d92523718fe5220fa36c24288c76
SHA2567fd374500d9cb7df80dbebc4f4163f0c308134d9372922ddf0fa53941fcbe407
SHA512770483698f892bc8d92c06659bbb25f2b9e3ef778b1cde91d089598356f8a488274c03aab389a29663b8c1453892405f024f2d91fde1b09028da96151d00b59b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91