Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 07:12

General

  • Target

    84fefeb4f40c20caf0a4028fd31dc710_NeikiAnalytics.exe

  • Size

    554KB

  • MD5

    84fefeb4f40c20caf0a4028fd31dc710

  • SHA1

    9a961313d5e16e6856d01880ff6d2d224e50971c

  • SHA256

    8d3f3389a39ec64572da2c1c222f4b32b6771568e40153440a79e1ea151029a1

  • SHA512

    bafffc692d7f882822826d66b80c7a882470986bfcd2b3ad61d7366a14df873f6c38ca0f9c97352b2553810e354bbb76485f58efa80460e0c902a4723c43847c

  • SSDEEP

    12288:6RQy90odDHJchIER0tKOwrk/OI89QBM0z79JMyUz3iOC1vZLo:PyjxJmhROKhri893679JM72xpo

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84fefeb4f40c20caf0a4028fd31dc710_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\84fefeb4f40c20caf0a4028fd31dc710_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVi8574.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVi8574.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr830593.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr830593.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku602293.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku602293.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVi8574.exe

    Filesize

    412KB

    MD5

    3dd0d54d5d94af4887dc5b90ff5e3816

    SHA1

    27accb2c0431fb60035198c5c30b70accebdddaf

    SHA256

    8982fb60f5e03018746e24758f03bd15e785e754791b66bbf658afab67fc4134

    SHA512

    30d5746d4860a52608b9ea26eed99e0e2bacf9383f16aec84bcdc9cac3f9903c98860d676071e5c13069ebf6f5e974b7c9b62fd31b8a474732c1eb0340a3892c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr830593.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku602293.exe

    Filesize

    383KB

    MD5

    2a7799dac75250c9810cb1c12e5cce97

    SHA1

    f0809023d562e4ee2ed5812b36432650e49f1338

    SHA256

    9e90e637f9d9aa955831c50519ba9200e00e69af13d9991e805326a304a91927

    SHA512

    69891029aeec8f4fe87a41eb1a8ee5384e8d4e503093f6293138a7c49be941a8110f63b55a471c832deef1b2113b90de8f7eec4ecb913d478fcfce3fb3a3e198

  • memory/3392-15-0x00007FFD088E3000-0x00007FFD088E5000-memory.dmp

    Filesize

    8KB

  • memory/3392-14-0x0000000000DB0000-0x0000000000DBA000-memory.dmp

    Filesize

    40KB

  • memory/4608-57-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-49-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-23-0x0000000007190000-0x00000000071D4000-memory.dmp

    Filesize

    272KB

  • memory/4608-37-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-87-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-85-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-83-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-81-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-77-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-75-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-73-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-71-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-69-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-67-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-65-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-63-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-61-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-21-0x00000000070D0000-0x0000000007116000-memory.dmp

    Filesize

    280KB

  • memory/4608-55-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-53-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-52-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-22-0x0000000007290000-0x0000000007834000-memory.dmp

    Filesize

    5.6MB

  • memory/4608-47-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-45-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-43-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-41-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-39-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-35-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-33-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-31-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-29-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-79-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-59-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-27-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-25-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-24-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4608-930-0x0000000007840000-0x0000000007E58000-memory.dmp

    Filesize

    6.1MB

  • memory/4608-931-0x0000000007E60000-0x0000000007F6A000-memory.dmp

    Filesize

    1.0MB

  • memory/4608-932-0x0000000007FA0000-0x0000000007FB2000-memory.dmp

    Filesize

    72KB

  • memory/4608-933-0x0000000007FC0000-0x0000000007FFC000-memory.dmp

    Filesize

    240KB

  • memory/4608-934-0x0000000008110000-0x000000000815C000-memory.dmp

    Filesize

    304KB