Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 05:49

General

  • Target

    0a62172ecf9e400da1d1e36aec9ad750_NeikiAnalytics.exe

  • Size

    539KB

  • MD5

    0a62172ecf9e400da1d1e36aec9ad750

  • SHA1

    be2da4c89ce1379381587b261cb128b2dfbd05ea

  • SHA256

    9e6840bd3bfa0c2d9dfc16193a3b67abf16bf84ffe374e1276540d1b8f3dd9fc

  • SHA512

    e1006419e103d629277090c24d892efb8e60304bbc578266dd8ee87a1d13f437ebca5e4a872b28f20124efc9c16873e0caecedea685a8ce084213507be25b215

  • SSDEEP

    12288:FQCy90Yh85xXh8uOm0i8TmUSMYPOsjmMrTF3VHp7:3y3h4tOGPOsjxF/

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a62172ecf9e400da1d1e36aec9ad750_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0a62172ecf9e400da1d1e36aec9ad750_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioS8112.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioS8112.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2164
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr843883.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr843883.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku603074.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku603074.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioS8112.exe

    Filesize

    396KB

    MD5

    c7862c80a78bedc7318792a04865087f

    SHA1

    7f8b619d60ac89da3d212db71a0753d4bc0b3cf0

    SHA256

    8402d3c51804699a1dad4e6f5cfcea8aa91cdc812c0ec0ed944641a655a4dcdb

    SHA512

    da92687f4ba21a7a40daced52fea13c5219eedbb39859120c76b87c367df1256d6858af7312e8e32376415b432432aaa20169c5679b319a8f3a5d2d44798d59e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr843883.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku603074.exe

    Filesize

    355KB

    MD5

    3ec1f598da845cd62d13f4e94d836892

    SHA1

    a7e298c415a068e7b0f5ec114e7066ef883ed31d

    SHA256

    73b52cf52d7a8813ab1e45d686ceb741944df779ebcec5916c8bb97d03365798

    SHA512

    bbd3f0e6d9af08f0a6bc245653144fdea533ca8b1cff912413142e9e8cf4444e058796ddfa87fa9742f2ea50fc9e3ab4e1205ecb8e35f2e9a1e5f4dff349cb25

  • memory/4548-79-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-22-0x0000000007310000-0x00000000078B4000-memory.dmp

    Filesize

    5.6MB

  • memory/4548-21-0x00000000049B0000-0x00000000049F6000-memory.dmp

    Filesize

    280KB

  • memory/4548-75-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-23-0x00000000072B0000-0x00000000072F4000-memory.dmp

    Filesize

    272KB

  • memory/4548-27-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-33-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-31-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-29-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-61-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-51-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-41-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-25-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-24-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-37-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-73-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-85-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-83-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-81-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-934-0x0000000008250000-0x000000000829C000-memory.dmp

    Filesize

    304KB

  • memory/4548-933-0x0000000008100000-0x000000000813C000-memory.dmp

    Filesize

    240KB

  • memory/4548-77-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-87-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-71-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-69-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-67-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-65-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-63-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-59-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-57-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-55-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-53-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-49-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-47-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-45-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-43-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-39-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-35-0x00000000072B0000-0x00000000072EE000-memory.dmp

    Filesize

    248KB

  • memory/4548-930-0x0000000007900000-0x0000000007F18000-memory.dmp

    Filesize

    6.1MB

  • memory/4548-931-0x0000000007FA0000-0x00000000080AA000-memory.dmp

    Filesize

    1.0MB

  • memory/4548-932-0x00000000080E0000-0x00000000080F2000-memory.dmp

    Filesize

    72KB

  • memory/4688-15-0x00007FFF0B0E3000-0x00007FFF0B0E5000-memory.dmp

    Filesize

    8KB

  • memory/4688-14-0x0000000000100000-0x000000000010A000-memory.dmp

    Filesize

    40KB