Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2024 23:49

General

  • Target

    84fefeb4f40c20caf0a4028fd31dc710NeikiAnalytics_NeikiAnalytics.exe

  • Size

    554KB

  • MD5

    84fefeb4f40c20caf0a4028fd31dc710

  • SHA1

    9a961313d5e16e6856d01880ff6d2d224e50971c

  • SHA256

    8d3f3389a39ec64572da2c1c222f4b32b6771568e40153440a79e1ea151029a1

  • SHA512

    bafffc692d7f882822826d66b80c7a882470986bfcd2b3ad61d7366a14df873f6c38ca0f9c97352b2553810e354bbb76485f58efa80460e0c902a4723c43847c

  • SSDEEP

    12288:6RQy90odDHJchIER0tKOwrk/OI89QBM0z79JMyUz3iOC1vZLo:PyjxJmhROKhri893679JM72xpo

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Signatures

  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84fefeb4f40c20caf0a4028fd31dc710NeikiAnalytics_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\84fefeb4f40c20caf0a4028fd31dc710NeikiAnalytics_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVi8574.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVi8574.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr830593.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr830593.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4256
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku602293.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku602293.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVi8574.exe

    Filesize

    412KB

    MD5

    3dd0d54d5d94af4887dc5b90ff5e3816

    SHA1

    27accb2c0431fb60035198c5c30b70accebdddaf

    SHA256

    8982fb60f5e03018746e24758f03bd15e785e754791b66bbf658afab67fc4134

    SHA512

    30d5746d4860a52608b9ea26eed99e0e2bacf9383f16aec84bcdc9cac3f9903c98860d676071e5c13069ebf6f5e974b7c9b62fd31b8a474732c1eb0340a3892c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr830593.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku602293.exe

    Filesize

    383KB

    MD5

    2a7799dac75250c9810cb1c12e5cce97

    SHA1

    f0809023d562e4ee2ed5812b36432650e49f1338

    SHA256

    9e90e637f9d9aa955831c50519ba9200e00e69af13d9991e805326a304a91927

    SHA512

    69891029aeec8f4fe87a41eb1a8ee5384e8d4e503093f6293138a7c49be941a8110f63b55a471c832deef1b2113b90de8f7eec4ecb913d478fcfce3fb3a3e198

  • memory/2124-59-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-22-0x0000000007400000-0x00000000079A4000-memory.dmp

    Filesize

    5.6MB

  • memory/2124-21-0x0000000004D10000-0x0000000004D56000-memory.dmp

    Filesize

    280KB

  • memory/2124-56-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-23-0x0000000007310000-0x0000000007354000-memory.dmp

    Filesize

    272KB

  • memory/2124-24-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-71-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-87-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-85-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-83-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-81-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-79-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-77-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-75-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-73-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-51-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-67-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-66-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-61-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-934-0x0000000008250000-0x000000000829C000-memory.dmp

    Filesize

    304KB

  • memory/2124-933-0x0000000008100000-0x000000000813C000-memory.dmp

    Filesize

    240KB

  • memory/2124-57-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-69-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-49-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-48-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-45-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-43-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-41-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-40-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-37-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-35-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-33-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-29-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-27-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-63-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-53-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-31-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-25-0x0000000007310000-0x000000000734F000-memory.dmp

    Filesize

    252KB

  • memory/2124-930-0x00000000079B0000-0x0000000007FC8000-memory.dmp

    Filesize

    6.1MB

  • memory/2124-931-0x0000000007FD0000-0x00000000080DA000-memory.dmp

    Filesize

    1.0MB

  • memory/2124-932-0x00000000080E0000-0x00000000080F2000-memory.dmp

    Filesize

    72KB

  • memory/4256-15-0x0000000000A90000-0x0000000000A9A000-memory.dmp

    Filesize

    40KB

  • memory/4256-14-0x00007FFA94693000-0x00007FFA94695000-memory.dmp

    Filesize

    8KB