Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
84fefeb4f40c20caf0a4028fd31dc710_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
84fefeb4f40c20caf0a4028fd31dc710_NeikiAnalytics.exe
-
Size
554KB
-
MD5
84fefeb4f40c20caf0a4028fd31dc710
-
SHA1
9a961313d5e16e6856d01880ff6d2d224e50971c
-
SHA256
8d3f3389a39ec64572da2c1c222f4b32b6771568e40153440a79e1ea151029a1
-
SHA512
bafffc692d7f882822826d66b80c7a882470986bfcd2b3ad61d7366a14df873f6c38ca0f9c97352b2553810e354bbb76485f58efa80460e0c902a4723c43847c
-
SSDEEP
12288:6RQy90odDHJchIER0tKOwrk/OI89QBM0z79JMyUz3iOC1vZLo:PyjxJmhROKhri893679JM72xpo
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x00080000000233c2-12.dat healer behavioral1/memory/3392-14-0x0000000000DB0000-0x0000000000DBA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr830593.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr830593.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr830593.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr830593.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr830593.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr830593.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4608-21-0x00000000070D0000-0x0000000007116000-memory.dmp family_redline behavioral1/memory/4608-23-0x0000000007190000-0x00000000071D4000-memory.dmp family_redline behavioral1/memory/4608-37-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-87-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-85-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-83-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-81-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-77-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-75-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-73-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-71-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-69-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-67-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-65-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-63-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-61-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-57-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-55-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-53-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-52-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-49-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-47-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-45-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-43-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-41-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-39-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-35-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-33-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-31-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-29-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-79-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-59-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-27-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-25-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4608-24-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline -
Executes dropped EXE 3 IoCs
pid Process 2932 ziVi8574.exe 3392 jr830593.exe 4608 ku602293.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr830593.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 84fefeb4f40c20caf0a4028fd31dc710_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVi8574.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3392 jr830593.exe 3392 jr830593.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3392 jr830593.exe Token: SeDebugPrivilege 4608 ku602293.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3880 wrote to memory of 2932 3880 84fefeb4f40c20caf0a4028fd31dc710_NeikiAnalytics.exe 82 PID 3880 wrote to memory of 2932 3880 84fefeb4f40c20caf0a4028fd31dc710_NeikiAnalytics.exe 82 PID 3880 wrote to memory of 2932 3880 84fefeb4f40c20caf0a4028fd31dc710_NeikiAnalytics.exe 82 PID 2932 wrote to memory of 3392 2932 ziVi8574.exe 83 PID 2932 wrote to memory of 3392 2932 ziVi8574.exe 83 PID 2932 wrote to memory of 4608 2932 ziVi8574.exe 93 PID 2932 wrote to memory of 4608 2932 ziVi8574.exe 93 PID 2932 wrote to memory of 4608 2932 ziVi8574.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\84fefeb4f40c20caf0a4028fd31dc710_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\84fefeb4f40c20caf0a4028fd31dc710_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVi8574.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVi8574.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr830593.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr830593.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3392
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku602293.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku602293.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD53dd0d54d5d94af4887dc5b90ff5e3816
SHA127accb2c0431fb60035198c5c30b70accebdddaf
SHA2568982fb60f5e03018746e24758f03bd15e785e754791b66bbf658afab67fc4134
SHA51230d5746d4860a52608b9ea26eed99e0e2bacf9383f16aec84bcdc9cac3f9903c98860d676071e5c13069ebf6f5e974b7c9b62fd31b8a474732c1eb0340a3892c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
383KB
MD52a7799dac75250c9810cb1c12e5cce97
SHA1f0809023d562e4ee2ed5812b36432650e49f1338
SHA2569e90e637f9d9aa955831c50519ba9200e00e69af13d9991e805326a304a91927
SHA51269891029aeec8f4fe87a41eb1a8ee5384e8d4e503093f6293138a7c49be941a8110f63b55a471c832deef1b2113b90de8f7eec4ecb913d478fcfce3fb3a3e198