Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 03:52
Static task
static1
Behavioral task
behavioral1
Sample
1da52a515fcdb048ad76d7864464cfb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1da52a515fcdb048ad76d7864464cfb0_NeikiAnalytics.exe
-
Size
1.3MB
-
MD5
1da52a515fcdb048ad76d7864464cfb0
-
SHA1
e473f6794205d1deb62b752a3fc6ab1ee2b117ae
-
SHA256
aaf88983ad022d086513c9772cb520815581005e78de7f2ea63f2135933d34f6
-
SHA512
a2b3123a6f2693a9d5ebff9c23949cdd342ddf34e534c88a99e5e178cbb35d2e20e7dc79d61b2ededbde0a65bb04f06a4ef363842d60e06f05b8b2b92f581d40
-
SSDEEP
24576:HyDpyG2BdeCmEa6MW0uUCfd5J45NAxLzlN/8C5Z23cHYKWKMxHbE1X9lr4:SmYCfMWDUskNoXM534YqMuB
Malware Config
Extracted
redline
trush
77.91.124.82:19071
-
auth_value
c13814867cde8193679cd0cad2d774be
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral1/memory/4204-33-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family behavioral1/memory/4204-36-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family behavioral1/memory/4204-34-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000800000002342d-26.dat healer behavioral1/memory/2168-28-0x00000000008B0000-0x00000000008BA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6776859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6776859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6776859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6776859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6776859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6776859.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/808-44-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 8 IoCs
pid Process 3600 v5832951.exe 1596 v2254232.exe 556 v8380457.exe 2168 a6776859.exe 2164 b4942427.exe 1624 c5470569.exe 3200 d4457621.exe 1976 e8864796.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6776859.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1da52a515fcdb048ad76d7864464cfb0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5832951.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2254232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8380457.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2164 set thread context of 4204 2164 b4942427.exe 99 PID 1624 set thread context of 2216 1624 c5470569.exe 105 PID 3200 set thread context of 808 3200 d4457621.exe 110 -
Program crash 3 IoCs
pid pid_target Process procid_target 1644 2164 WerFault.exe 97 3496 1624 WerFault.exe 103 3412 3200 WerFault.exe 108 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2168 a6776859.exe 2168 a6776859.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2168 a6776859.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2152 wrote to memory of 3600 2152 1da52a515fcdb048ad76d7864464cfb0_NeikiAnalytics.exe 82 PID 2152 wrote to memory of 3600 2152 1da52a515fcdb048ad76d7864464cfb0_NeikiAnalytics.exe 82 PID 2152 wrote to memory of 3600 2152 1da52a515fcdb048ad76d7864464cfb0_NeikiAnalytics.exe 82 PID 3600 wrote to memory of 1596 3600 v5832951.exe 84 PID 3600 wrote to memory of 1596 3600 v5832951.exe 84 PID 3600 wrote to memory of 1596 3600 v5832951.exe 84 PID 1596 wrote to memory of 556 1596 v2254232.exe 85 PID 1596 wrote to memory of 556 1596 v2254232.exe 85 PID 1596 wrote to memory of 556 1596 v2254232.exe 85 PID 556 wrote to memory of 2168 556 v8380457.exe 87 PID 556 wrote to memory of 2168 556 v8380457.exe 87 PID 556 wrote to memory of 2164 556 v8380457.exe 97 PID 556 wrote to memory of 2164 556 v8380457.exe 97 PID 556 wrote to memory of 2164 556 v8380457.exe 97 PID 2164 wrote to memory of 4204 2164 b4942427.exe 99 PID 2164 wrote to memory of 4204 2164 b4942427.exe 99 PID 2164 wrote to memory of 4204 2164 b4942427.exe 99 PID 2164 wrote to memory of 4204 2164 b4942427.exe 99 PID 2164 wrote to memory of 4204 2164 b4942427.exe 99 PID 2164 wrote to memory of 4204 2164 b4942427.exe 99 PID 2164 wrote to memory of 4204 2164 b4942427.exe 99 PID 2164 wrote to memory of 4204 2164 b4942427.exe 99 PID 2164 wrote to memory of 4204 2164 b4942427.exe 99 PID 2164 wrote to memory of 4204 2164 b4942427.exe 99 PID 1596 wrote to memory of 1624 1596 v2254232.exe 103 PID 1596 wrote to memory of 1624 1596 v2254232.exe 103 PID 1596 wrote to memory of 1624 1596 v2254232.exe 103 PID 1624 wrote to memory of 2216 1624 c5470569.exe 105 PID 1624 wrote to memory of 2216 1624 c5470569.exe 105 PID 1624 wrote to memory of 2216 1624 c5470569.exe 105 PID 1624 wrote to memory of 2216 1624 c5470569.exe 105 PID 1624 wrote to memory of 2216 1624 c5470569.exe 105 PID 1624 wrote to memory of 2216 1624 c5470569.exe 105 PID 3600 wrote to memory of 3200 3600 v5832951.exe 108 PID 3600 wrote to memory of 3200 3600 v5832951.exe 108 PID 3600 wrote to memory of 3200 3600 v5832951.exe 108 PID 3200 wrote to memory of 808 3200 d4457621.exe 110 PID 3200 wrote to memory of 808 3200 d4457621.exe 110 PID 3200 wrote to memory of 808 3200 d4457621.exe 110 PID 3200 wrote to memory of 808 3200 d4457621.exe 110 PID 3200 wrote to memory of 808 3200 d4457621.exe 110 PID 3200 wrote to memory of 808 3200 d4457621.exe 110 PID 3200 wrote to memory of 808 3200 d4457621.exe 110 PID 3200 wrote to memory of 808 3200 d4457621.exe 110 PID 2152 wrote to memory of 1976 2152 1da52a515fcdb048ad76d7864464cfb0_NeikiAnalytics.exe 113 PID 2152 wrote to memory of 1976 2152 1da52a515fcdb048ad76d7864464cfb0_NeikiAnalytics.exe 113 PID 2152 wrote to memory of 1976 2152 1da52a515fcdb048ad76d7864464cfb0_NeikiAnalytics.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\1da52a515fcdb048ad76d7864464cfb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1da52a515fcdb048ad76d7864464cfb0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5832951.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5832951.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2254232.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2254232.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8380457.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8380457.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6776859.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6776859.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4942427.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4942427.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 5566⤵
- Program crash
PID:1644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5470569.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5470569.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Checks SCSI registry key(s)
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 1365⤵
- Program crash
PID:3496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4457621.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4457621.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 1484⤵
- Program crash
PID:3412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e8864796.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e8864796.exe2⤵
- Executes dropped EXE
PID:1976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2164 -ip 21641⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1624 -ip 16241⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3200 -ip 32001⤵PID:2852
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5de9367f72e48f43edc2f1979ace7a2bc
SHA15219e61d941a421315e32eabc7ac9c3944f80181
SHA256c7b26d2ebb210eca38eed90eefe474b254f53dca6496fd044a87ccfe7bbe6c86
SHA5127a3d286cae4bb3816dd1af0bb46ea6591568c28ca8cee0eb5aeb1caafb6886476183159041d367201077d8ab2d22be827af5e95ca39eedb457e01ba9be4c768e
-
Filesize
1.2MB
MD5eb4f12e3eb5a61a3cc43c606b04e85fb
SHA12955eac7466e41dfb9d70ccb708eab600b1b2d9a
SHA256be58893697215a2384e1b6d915971e46a6506757718ff8d92be24e4c043f119e
SHA51282ee482088c38ca825ce89a41a10fa17be3664a8856f2897a7588a4d2e69030b19bc7003062599158c988d890308688dd2ed82a41b70aafaf51a67f17b2146c8
-
Filesize
1.0MB
MD51b30e2b46651a132dce68651e98312de
SHA1f98fe544db67756111c5f49dfce5ee748a933c61
SHA2561374fb694ed022d7cc221b2bdab447cb28368914ad2e0715c663de26001fe541
SHA512bba3099f9d12ba4f1e5c2513bb2cbb918b170e678f536ad21f6e8e7f127cc35082a2394957d4d3c7311a80b56c59c3c0ee1db158fac4f79e1f60bd5bb84b3ffb
-
Filesize
835KB
MD577da02fd3836daf3a716b5f15188c8a6
SHA1644abdb953e857a803ad5d7edc9a2f25949cac92
SHA25601888d19433a22cf8d9fb00c2617568e9423878c9a189e2f8fc8ea51b70a90ab
SHA512ae9a1a729178db70ea86ae355f0be777d94f7390473aad2fd5afc4971fbc7198e5a76391b6f406861648c29654855195134bcfdc67f593ef7e372b81def622e1
-
Filesize
884KB
MD5f9ebf61a1a4bfd8251d830ce1959b4a3
SHA1b13e8f00d0438f8304c6c1da3549977e0803287e
SHA25620a34a5b3ea0182f831dbc7b48ea03223daeb2afdd3540fcaef6cca6fe2972b9
SHA51200c336e2de833be8d227994644cd2cbcf665d7f36aa93de0647ddc67bb5a80098aadc902ac71d0953dccae2bfb109ec1a6e0d581949833a9346331a3ed732db8
-
Filesize
475KB
MD58414aa5388c54ecc9045c0fc78b7b3bd
SHA18ca702c68c1b6dd02e8f4759e13e102e91ea23eb
SHA2568bbd0f18ff7becb8601892364ac8a96951b915493898de58e5e9b43c906c814a
SHA5126469e5953798db16ac294588b0febc10af3af74c2fadd006cf6920cc993a6bec77cb91e416f551598671fedf13587550f33600342e18dafa56e838aaa60cbc2c
-
Filesize
11KB
MD540366aa5d4e7524ca65f8188a6c13b2e
SHA1b5d52afb53bb31d7aea23bd1c89b98820ab8e329
SHA256f34d4e4cb5012c143d25055a9b7a899ddbfbd5e88c6fb3979bb382a3f5b1b69b
SHA5127bffbd6f30f4b0b15cd4e27152e6ec46ad3efc25e3b47318d3e893f6ec7f2336107e03d091660c660e79844e5b49d804b993093b7bd09c726a21d4ff37c977a3
-
Filesize
1.0MB
MD5fc4c90f9a7556f7f9d380000559aa293
SHA1c558b17befdd5747afe5552ff0676f15299efe44
SHA2565d2f8086eaf672566d2b7950b0681773ba7568b742e4d6c05657af9192b103ac
SHA512f4f9ef3694fef80e5702d1a97b8bd6d335c6042998ad51267c67a13b40901613001971d9b0379e0ae8da7f47808db7ca7d617d04979b0d9cd551383c5f6f8082