Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
6063d6416f5d32fef626bef67d953880_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
6063d6416f5d32fef626bef67d953880_NeikiAnalytics.exe
-
Size
706KB
-
MD5
6063d6416f5d32fef626bef67d953880
-
SHA1
dfa3ec3089bf946de3670331787d36e6d4bf9d90
-
SHA256
d9e8eb988cb030034b6748c52927764a8f251a4ed39c62639b0d9b30f35ca90b
-
SHA512
86456e38cc6ff3ba70bd5140147cf63fce89d990c8b8cfcaeccca73ce391188feb274ab55c878ca080226b73d4f179871a13e317fd2df3394c70092da28b4542
-
SSDEEP
12288:xr/y90QTV3zN0uER7O7RUENY3jlCx+O+JUPizryXMQ9:By5TV3zu8qBlQ+ZUPizmcQ9
Malware Config
Extracted
redline
norm
77.91.68.70:19073
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/4844-28-0x00000000004F0000-0x00000000004FA000-memory.dmp healer behavioral1/files/0x0007000000023496-35.dat healer behavioral1/memory/4196-37-0x0000000000210000-0x000000000021A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8547838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8547838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8547838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8547838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8547838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8547838.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b7120036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b7120036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b7120036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b7120036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b7120036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b7120036.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2328-42-0x0000000000450000-0x0000000000480000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2608 v8882248.exe 1228 v2489887.exe 4308 v4883016.exe 4844 a8547838.exe 4196 b7120036.exe 2328 c6578523.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8547838.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b7120036.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8547838.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6063d6416f5d32fef626bef67d953880_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8882248.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2489887.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4883016.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 416 sc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4844 a8547838.exe 4844 a8547838.exe 4196 b7120036.exe 4196 b7120036.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4844 a8547838.exe Token: SeDebugPrivilege 4196 b7120036.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4672 wrote to memory of 2608 4672 6063d6416f5d32fef626bef67d953880_NeikiAnalytics.exe 82 PID 4672 wrote to memory of 2608 4672 6063d6416f5d32fef626bef67d953880_NeikiAnalytics.exe 82 PID 4672 wrote to memory of 2608 4672 6063d6416f5d32fef626bef67d953880_NeikiAnalytics.exe 82 PID 2608 wrote to memory of 1228 2608 v8882248.exe 84 PID 2608 wrote to memory of 1228 2608 v8882248.exe 84 PID 2608 wrote to memory of 1228 2608 v8882248.exe 84 PID 1228 wrote to memory of 4308 1228 v2489887.exe 85 PID 1228 wrote to memory of 4308 1228 v2489887.exe 85 PID 1228 wrote to memory of 4308 1228 v2489887.exe 85 PID 4308 wrote to memory of 4844 4308 v4883016.exe 86 PID 4308 wrote to memory of 4844 4308 v4883016.exe 86 PID 4308 wrote to memory of 4844 4308 v4883016.exe 86 PID 4308 wrote to memory of 4196 4308 v4883016.exe 95 PID 4308 wrote to memory of 4196 4308 v4883016.exe 95 PID 1228 wrote to memory of 2328 1228 v2489887.exe 96 PID 1228 wrote to memory of 2328 1228 v2489887.exe 96 PID 1228 wrote to memory of 2328 1228 v2489887.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\6063d6416f5d32fef626bef67d953880_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6063d6416f5d32fef626bef67d953880_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8882248.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8882248.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2489887.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2489887.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4883016.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4883016.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8547838.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8547838.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7120036.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7120036.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6578523.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6578523.exe4⤵
- Executes dropped EXE
PID:2328
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:416
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
529KB
MD5609e798c25afc35ea61beda17d97db52
SHA187ebd63ef3cde5bb1402edb84eac6aa05224e108
SHA2563eb00ad8259cdcfe0cd6e8aa81162312027a9a4220ee2022ac3af92cf49f56bb
SHA5126375295bcc114f5bd943ad84227c69de8c610b91bf6f5bfbf8b7e19e59b7469bd0300ca56cb1403ce6eaad3a53f59cd8be34f3a137083bad1eadc46492276dcc
-
Filesize
405KB
MD575f0e9dfc4c5d3856bd1f9582b6787af
SHA1de1c59d4d54e0c194cb2eaf4ca9e3064ac5b55c9
SHA2568c369ea8762078104f0ed6c7edc449c4c4e58b32fbe0b9538cf540ddcbd09f52
SHA51281739139ba6d7e0f218f2fddbf500ee03804d9dd1a5f930d3cb5a0fb1144fabee48fbbe27f0443dde77196f788a70999c2d4aa8baf51f879253044a945fcec9a
-
Filesize
266KB
MD5b4ea1ca8aec2e8f0cd17fa5a6135c416
SHA1e1af24824b7be9a4ebf8d208085e47cec78d983a
SHA25627e99bec73fc58be6a10902c415273ad349eee401ae68e9f85cbd7cfb16697e9
SHA51289622f24ef5fcdda9af9175dd17813fb40e8f2aa70052c566c5c3b034846cfab1d7217d5b124009332bd6bbc0786a2af2bd7bc5cc37c51b43630340830a1ef8d
-
Filesize
201KB
MD5adcd00b059d17622a9cf6067604e81f0
SHA12db3d3eee9b17d89b09806635180691fb4c68054
SHA256d733674c4736710fc07825705e22940e52c8587af8493f78b397ba99b0c1b813
SHA51276b363b60d67d579879ae7e478477ed1eca4a4f79b650aaee1d4b912d98eb8814a69533e6394ce1f65087ef42de3a80049e5d078539a5cd35887dbed256a60c1
-
Filesize
104KB
MD5876705a778615caf71bcf084f453fbc1
SHA17b85db33e41ce38862fe0a20d97ef955a4653eee
SHA256f3888824a419fccce8b8c73328ad281a4e62c2a7fc70654ba2c2aa363e753134
SHA51259b8790f13fe56090025f2ea4a279be51272558d546e4800d59df12e702224688e37fa7fc433c2377187800dfd343fc2e7a4c8e3c4a42e697c8a3156b06da242
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91