Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 04:46

General

  • Target

    0d0e7ca89c86838b73a273253ba51f10_NeikiAnalytics.exe

  • Size

    552KB

  • MD5

    0d0e7ca89c86838b73a273253ba51f10

  • SHA1

    78df80c4687451e3ae52c620dc0623398c837be2

  • SHA256

    3b681afcaf9365eb94da64a4454a9aee2e929e7fb6fd476116f720ca7442d092

  • SHA512

    937a2530648dd7f6b524c4ba1e9c3f9dc3a82be7b678285826c0223236e81e1df9b5dc55a044abc4309ac6f24279ce0eb1e480121e56fce063b8b26dce06454d

  • SSDEEP

    12288:YMruy90Eq5Ryh/MI50irANYlK1ddzJr2HZVPAaawSSu/:myX1Rco0dzqtLawC

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d0e7ca89c86838b73a273253ba51f10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0d0e7ca89c86838b73a273253ba51f10_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6582559.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6582559.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7574220.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7574220.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2958444.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2958444.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c9413236.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c9413236.exe
      2⤵
      • Executes dropped EXE
      PID:208
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\System.dll.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c9413236.exe

    Filesize

    1.3MB

    MD5

    c9c5233709b26bf36148a8efda651867

    SHA1

    4de92fb05eb151d490690f26af81c96ed2644b93

    SHA256

    11bb8aa16860b4826493eec380852ddbe0b847b0b2edb72b18d71e72c8d1cc42

    SHA512

    027fdef8e5835df847b8805f593abd52c2ddb1555628091e6ce588a5ca9a55fe04566fa2e9ecf2843f25d635865b38d4db59e047dee570aabbd485abfd49de5b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6582559.exe

    Filesize

    217KB

    MD5

    c2c2397f9d5063b76bfeac1b841bd13e

    SHA1

    87291dfc6da1489a1691d00c4d9014ac65d294d6

    SHA256

    5d1b2eafd8c634510644fa6201b38bad1acdc3931d2f5fd0f622b549adea70ab

    SHA512

    eab7eef46b867d2b127f1b629e2ad9cda582256e490034f5865dc1024b8c0ffeaa318f0c19d0690f449fffbcdd61d7ef80db44e653b6bda3296ea8073fd6096e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7574220.exe

    Filesize

    185KB

    MD5

    5bcb6e086b9b8b2b507a6161f1f5fdb8

    SHA1

    3cf84bdcde74d92523718fe5220fa36c24288c76

    SHA256

    7fd374500d9cb7df80dbebc4f4163f0c308134d9372922ddf0fa53941fcbe407

    SHA512

    770483698f892bc8d92c06659bbb25f2b9e3ef778b1cde91d089598356f8a488274c03aab389a29663b8c1453892405f024f2d91fde1b09028da96151d00b59b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2958444.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/208-37-0x0000000004C40000-0x0000000004D4A000-memory.dmp

    Filesize

    1.0MB

  • memory/208-30-0x0000000000550000-0x0000000000580000-memory.dmp

    Filesize

    192KB

  • memory/208-35-0x0000000002530000-0x0000000002536000-memory.dmp

    Filesize

    24KB

  • memory/208-36-0x0000000005260000-0x0000000005878000-memory.dmp

    Filesize

    6.1MB

  • memory/208-38-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

    Filesize

    72KB

  • memory/208-39-0x0000000004D50000-0x0000000004D8C000-memory.dmp

    Filesize

    240KB

  • memory/208-40-0x0000000004DC0000-0x0000000004E0C000-memory.dmp

    Filesize

    304KB

  • memory/3316-19-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3316-18-0x0000000000410000-0x0000000000425000-memory.dmp

    Filesize

    84KB

  • memory/3316-14-0x0000000000510000-0x000000000051A000-memory.dmp

    Filesize

    40KB

  • memory/4724-25-0x0000000000F00000-0x0000000000F0A000-memory.dmp

    Filesize

    40KB