Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 11:52
Static task
static1
Behavioral task
behavioral1
Sample
428992dba52134bc4f24fef76b6deb00_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
428992dba52134bc4f24fef76b6deb00_NeikiAnalytics.exe
-
Size
743KB
-
MD5
428992dba52134bc4f24fef76b6deb00
-
SHA1
f7ac3844b23d2ef68ce5abd29ae72e8c197404bc
-
SHA256
522ef7ed5dee9a88fd0e157cf30caee38b2797c64e4d3e150f0e618147156bcb
-
SHA512
81cab0e00fceccb1b9cb52e9102ca32c5821370f5293a1afc89c5f4c0ce4704114f44455f4e022c41e9f39abef338efbc55714d4a15ccbfb7d20f402cc482ba8
-
SSDEEP
12288:FMrny902sofq/Zv6FIzBF/I6cJVVcz6qovPHcVIXJ9lwyrpr:myu1hvSIzBFg6c/VfqovvcVIZ/l
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral1/memory/728-25-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/728-28-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral1/memory/728-26-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/216-36-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 6 IoCs
pid Process 212 Fy9HR62.exe 5076 vC7ol08.exe 664 1zQ25ak6.exe 2284 2XS3648.exe 3244 3nJ91oF.exe 1248 4du773rX.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 428992dba52134bc4f24fef76b6deb00_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Fy9HR62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vC7ol08.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 664 set thread context of 4692 664 1zQ25ak6.exe 96 PID 2284 set thread context of 728 2284 2XS3648.exe 105 PID 3244 set thread context of 1060 3244 3nJ91oF.exe 111 PID 1248 set thread context of 216 1248 4du773rX.exe 120 -
Program crash 4 IoCs
pid pid_target Process procid_target 4260 664 WerFault.exe 92 1660 2284 WerFault.exe 100 1576 3244 WerFault.exe 109 4820 1248 WerFault.exe 115 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4692 AppLaunch.exe 4692 AppLaunch.exe 4692 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4692 AppLaunch.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1832 wrote to memory of 212 1832 428992dba52134bc4f24fef76b6deb00_NeikiAnalytics.exe 90 PID 1832 wrote to memory of 212 1832 428992dba52134bc4f24fef76b6deb00_NeikiAnalytics.exe 90 PID 1832 wrote to memory of 212 1832 428992dba52134bc4f24fef76b6deb00_NeikiAnalytics.exe 90 PID 212 wrote to memory of 5076 212 Fy9HR62.exe 91 PID 212 wrote to memory of 5076 212 Fy9HR62.exe 91 PID 212 wrote to memory of 5076 212 Fy9HR62.exe 91 PID 5076 wrote to memory of 664 5076 vC7ol08.exe 92 PID 5076 wrote to memory of 664 5076 vC7ol08.exe 92 PID 5076 wrote to memory of 664 5076 vC7ol08.exe 92 PID 664 wrote to memory of 4692 664 1zQ25ak6.exe 96 PID 664 wrote to memory of 4692 664 1zQ25ak6.exe 96 PID 664 wrote to memory of 4692 664 1zQ25ak6.exe 96 PID 664 wrote to memory of 4692 664 1zQ25ak6.exe 96 PID 664 wrote to memory of 4692 664 1zQ25ak6.exe 96 PID 664 wrote to memory of 4692 664 1zQ25ak6.exe 96 PID 664 wrote to memory of 4692 664 1zQ25ak6.exe 96 PID 664 wrote to memory of 4692 664 1zQ25ak6.exe 96 PID 5076 wrote to memory of 2284 5076 vC7ol08.exe 100 PID 5076 wrote to memory of 2284 5076 vC7ol08.exe 100 PID 5076 wrote to memory of 2284 5076 vC7ol08.exe 100 PID 2284 wrote to memory of 4616 2284 2XS3648.exe 104 PID 2284 wrote to memory of 4616 2284 2XS3648.exe 104 PID 2284 wrote to memory of 4616 2284 2XS3648.exe 104 PID 2284 wrote to memory of 728 2284 2XS3648.exe 105 PID 2284 wrote to memory of 728 2284 2XS3648.exe 105 PID 2284 wrote to memory of 728 2284 2XS3648.exe 105 PID 2284 wrote to memory of 728 2284 2XS3648.exe 105 PID 2284 wrote to memory of 728 2284 2XS3648.exe 105 PID 2284 wrote to memory of 728 2284 2XS3648.exe 105 PID 2284 wrote to memory of 728 2284 2XS3648.exe 105 PID 2284 wrote to memory of 728 2284 2XS3648.exe 105 PID 2284 wrote to memory of 728 2284 2XS3648.exe 105 PID 2284 wrote to memory of 728 2284 2XS3648.exe 105 PID 212 wrote to memory of 3244 212 Fy9HR62.exe 109 PID 212 wrote to memory of 3244 212 Fy9HR62.exe 109 PID 212 wrote to memory of 3244 212 Fy9HR62.exe 109 PID 3244 wrote to memory of 1060 3244 3nJ91oF.exe 111 PID 3244 wrote to memory of 1060 3244 3nJ91oF.exe 111 PID 3244 wrote to memory of 1060 3244 3nJ91oF.exe 111 PID 3244 wrote to memory of 1060 3244 3nJ91oF.exe 111 PID 3244 wrote to memory of 1060 3244 3nJ91oF.exe 111 PID 3244 wrote to memory of 1060 3244 3nJ91oF.exe 111 PID 1832 wrote to memory of 1248 1832 428992dba52134bc4f24fef76b6deb00_NeikiAnalytics.exe 115 PID 1832 wrote to memory of 1248 1832 428992dba52134bc4f24fef76b6deb00_NeikiAnalytics.exe 115 PID 1832 wrote to memory of 1248 1832 428992dba52134bc4f24fef76b6deb00_NeikiAnalytics.exe 115 PID 1248 wrote to memory of 2488 1248 4du773rX.exe 119 PID 1248 wrote to memory of 2488 1248 4du773rX.exe 119 PID 1248 wrote to memory of 2488 1248 4du773rX.exe 119 PID 1248 wrote to memory of 216 1248 4du773rX.exe 120 PID 1248 wrote to memory of 216 1248 4du773rX.exe 120 PID 1248 wrote to memory of 216 1248 4du773rX.exe 120 PID 1248 wrote to memory of 216 1248 4du773rX.exe 120 PID 1248 wrote to memory of 216 1248 4du773rX.exe 120 PID 1248 wrote to memory of 216 1248 4du773rX.exe 120 PID 1248 wrote to memory of 216 1248 4du773rX.exe 120 PID 1248 wrote to memory of 216 1248 4du773rX.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\428992dba52134bc4f24fef76b6deb00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\428992dba52134bc4f24fef76b6deb00_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fy9HR62.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fy9HR62.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vC7ol08.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vC7ol08.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1zQ25ak6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1zQ25ak6.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 664 -s 5725⤵
- Program crash
PID:4260
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2XS3648.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2XS3648.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4616
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 6005⤵
- Program crash
PID:1660
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3nJ91oF.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3nJ91oF.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Checks SCSI registry key(s)
PID:1060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 1524⤵
- Program crash
PID:1576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4du773rX.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4du773rX.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2488
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 5843⤵
- Program crash
PID:4820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 664 -ip 6641⤵PID:2168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2284 -ip 22841⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3244 -ip 32441⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1248 -ip 12481⤵PID:608
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4456,i,6593821857742176458,13646536021844995125,262144 --variations-seed-version --mojo-platform-channel-handle=4472 /prefetch:81⤵PID:1252
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD595604fd57e2b5711e25790eb55ba11cd
SHA10c53f906f03a2bfcb703aca579053368980f82aa
SHA256375499f67d3044ad98c537e6071ee591d5b270533ad71ccb72dc9fa5da98aa1c
SHA5121b6566da5fd20da8aa823c1164e5990f9615968d5f7d18f7edf6ae9ef458d50117d7bf9a75231cc330f463f0716447af76265c32fe87b8347b56cb7e23f09169
-
Filesize
509KB
MD55ded212835c43bd38b9d24e84bb35b7e
SHA18dac06330040022fffb631b9a2ca3b28ae4c10fd
SHA256f02438bdfbf6b526865e085e41a51bd54139809ce02f3f3836b250d40c1e0784
SHA512d14870cc50e54eee3c3cf4cf81e8d9c3c42af8ac5cdc72d5d15f6d33b259e60ea4193e2697b846d6ba34f4dc404de86b917d992ba6fa61e1c80cb81501274902
-
Filesize
145KB
MD54b36b6ae6984fc3029f7e71cc552561e
SHA1ee2fe1cc3c5f92a5a67df42a3e4f220bc708a33b
SHA256033f8ad9166fdd0e483a0ba198c663ebc25a58c3afc34c9edfcb0a16eca30f6b
SHA5120313312fd80b7efb5e4e29dd44ffcafaf964e2f24f73c6d05d9c4c39398fbaa3d5e0961e2947b5b2201359d982ea7a51922cfc2f4a2e439676a43bb1b80aa558
-
Filesize
325KB
MD5e60cd25ef90f1e3467442bd1b3682941
SHA189cad7c402c9e12c3760ee66c61a5915d2e7cb7d
SHA256d6efde9bbe548ac554251ffba7189465381192e2310340ec037594c0ee71a627
SHA5123b4cd9b7c1c51ccdbf5d2989ea40ee59a4ced7ae14276f7c1f93c0977d35f9942ba3c638498954bb587c355452e8fffc7add1e4197db63fd02dd3b0f78951258
-
Filesize
129KB
MD54ed940ea493451635145489ffbdec386
SHA14b5d0ba229b8ac04f753864c1170da0070673e35
SHA256b736077e8eccf72bc48e2a28576bb47d59bdaa335baa2dc333fb3701becfacaa
SHA5128feea024e7bb279f401e144d80c20bd6022249ebe381e1ed36b7e19a382e1e7edd3a2b1e4f74e54a5e6dbe6bfe6ff3b27fb44fd0c2407551b1a33fbea9be229c
-
Filesize
295KB
MD5a7d374710fcecb71233c825f2a6ef2da
SHA186bcc8204de3af0281e8f3502a8798cb4d707a3d
SHA25609e0708e55aefdd063e766501927ce8bfa6c0dbe41cd17334809be5420d2a7a8
SHA512aa91b798926c07e4315016c7d46731eb9e5e7fe9c8bba1cc378c475effd0f5c0db4bb2cae37b707860eff1cb07b634a6c74990d5f06516537f35b39768ebd2b0