Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 10:04
Static task
static1
Behavioral task
behavioral1
Sample
6fcbcc98ebbbe636a0fe0e54638c2620_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6fcbcc98ebbbe636a0fe0e54638c2620_NeikiAnalytics.exe
-
Size
675KB
-
MD5
6fcbcc98ebbbe636a0fe0e54638c2620
-
SHA1
2d721ffb4b9dad939cd44b1723cbcb0af29cb8f1
-
SHA256
8824938b516f326c8fb474e2d13f12a648cbe7fc793dd565bd44ecc9fcbcec96
-
SHA512
74618716926b7f59431bd861eba3e3623d297db902e284ba14442cbebd1738cbe453e3c77cb5e67ca8fad4e2a92d5ede9e33542d39dcbb5af498b26966258fb8
-
SSDEEP
12288:/Mr1y90VQHlyKwme5SYAwaHeIDmb4yImOPsvIaHyqHBhRmux:6yHlyKwAzzmWshSqHR7x
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2584-7-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/2584-11-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/2584-9-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/2584-8-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2kK500If.exe family_redline behavioral1/memory/3652-16-0x0000000000600000-0x000000000063E000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
Processes:
1TM96Rc3.exe2kK500If.exepid process 2736 1TM96Rc3.exe 3652 2kK500If.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6fcbcc98ebbbe636a0fe0e54638c2620_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6fcbcc98ebbbe636a0fe0e54638c2620_NeikiAnalytics.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1TM96Rc3.exedescription pid process target process PID 2736 set thread context of 2584 2736 1TM96Rc3.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3264 2584 WerFault.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
6fcbcc98ebbbe636a0fe0e54638c2620_NeikiAnalytics.exe1TM96Rc3.exedescription pid process target process PID 4552 wrote to memory of 2736 4552 6fcbcc98ebbbe636a0fe0e54638c2620_NeikiAnalytics.exe 1TM96Rc3.exe PID 4552 wrote to memory of 2736 4552 6fcbcc98ebbbe636a0fe0e54638c2620_NeikiAnalytics.exe 1TM96Rc3.exe PID 4552 wrote to memory of 2736 4552 6fcbcc98ebbbe636a0fe0e54638c2620_NeikiAnalytics.exe 1TM96Rc3.exe PID 2736 wrote to memory of 2584 2736 1TM96Rc3.exe AppLaunch.exe PID 2736 wrote to memory of 2584 2736 1TM96Rc3.exe AppLaunch.exe PID 2736 wrote to memory of 2584 2736 1TM96Rc3.exe AppLaunch.exe PID 2736 wrote to memory of 2584 2736 1TM96Rc3.exe AppLaunch.exe PID 2736 wrote to memory of 2584 2736 1TM96Rc3.exe AppLaunch.exe PID 2736 wrote to memory of 2584 2736 1TM96Rc3.exe AppLaunch.exe PID 2736 wrote to memory of 2584 2736 1TM96Rc3.exe AppLaunch.exe PID 2736 wrote to memory of 2584 2736 1TM96Rc3.exe AppLaunch.exe PID 2736 wrote to memory of 2584 2736 1TM96Rc3.exe AppLaunch.exe PID 2736 wrote to memory of 2584 2736 1TM96Rc3.exe AppLaunch.exe PID 4552 wrote to memory of 3652 4552 6fcbcc98ebbbe636a0fe0e54638c2620_NeikiAnalytics.exe 2kK500If.exe PID 4552 wrote to memory of 3652 4552 6fcbcc98ebbbe636a0fe0e54638c2620_NeikiAnalytics.exe 2kK500If.exe PID 4552 wrote to memory of 3652 4552 6fcbcc98ebbbe636a0fe0e54638c2620_NeikiAnalytics.exe 2kK500If.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fcbcc98ebbbe636a0fe0e54638c2620_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6fcbcc98ebbbe636a0fe0e54638c2620_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1TM96Rc3.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1TM96Rc3.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 5404⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2kK500If.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2kK500If.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2584 -ip 25841⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1TM96Rc3.exeFilesize
1.8MB
MD555d3507f18e2f4b729e2d39b42ed30f7
SHA11e0e1f566dc8332c78ab12e7bd3228530e3f9a7d
SHA2567a64de4e9ba61ab53f06e9ca11804a1855928bf2062ce7002f7942075fc9feae
SHA512a546e95c790e6f0c7945b6f063107ce796bffd7bb1e3151820e9e1d50aeb5818ac56af8696dbae0c4042c96795f5ac178a6bf97517b10a94e6f945606c885afa
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2kK500If.exeFilesize
221KB
MD557bc3f29015a6cfa95e2ed5317bc58af
SHA11c9a0fb04acda54d5284c76373dc3c2408edd716
SHA2567713f1b52bf485bbf1b02581551c90ccf137873a59655866e98e6ab1c0839c18
SHA512e5a44d92f4aef9eb437fcb7b9758d211e43f4db07db7c6ae6ba200a581f7722baaf8e47d2775c547276d23f1a46557d30c90794e4044c0930b674889fabdaf2e
-
memory/2584-7-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2584-11-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2584-9-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2584-8-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/3652-17-0x00000000078A0000-0x0000000007E44000-memory.dmpFilesize
5.6MB
-
memory/3652-16-0x0000000000600000-0x000000000063E000-memory.dmpFilesize
248KB
-
memory/3652-15-0x000000007415E000-0x000000007415F000-memory.dmpFilesize
4KB
-
memory/3652-18-0x00000000073D0000-0x0000000007462000-memory.dmpFilesize
584KB
-
memory/3652-19-0x0000000002870000-0x000000000287A000-memory.dmpFilesize
40KB
-
memory/3652-20-0x0000000074150000-0x0000000074900000-memory.dmpFilesize
7.7MB
-
memory/3652-21-0x0000000008470000-0x0000000008A88000-memory.dmpFilesize
6.1MB
-
memory/3652-22-0x0000000007790000-0x000000000789A000-memory.dmpFilesize
1.0MB
-
memory/3652-23-0x00000000074B0000-0x00000000074C2000-memory.dmpFilesize
72KB
-
memory/3652-24-0x0000000007540000-0x000000000757C000-memory.dmpFilesize
240KB
-
memory/3652-25-0x00000000074E0000-0x000000000752C000-memory.dmpFilesize
304KB
-
memory/3652-26-0x000000007415E000-0x000000007415F000-memory.dmpFilesize
4KB
-
memory/3652-27-0x0000000074150000-0x0000000074900000-memory.dmpFilesize
7.7MB