Analysis
-
max time kernel
136s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
23fff09f2f63491da2c2bab5c5eceae1af49b5242bdb2921ce4b83d5c212fefa_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
23fff09f2f63491da2c2bab5c5eceae1af49b5242bdb2921ce4b83d5c212fefa_NeikiAnalytics.exe
-
Size
660KB
-
MD5
0349900a4eb15cde34ce52818633a1d0
-
SHA1
56f1001d82f8b20431397f266256b1b276d6f474
-
SHA256
23fff09f2f63491da2c2bab5c5eceae1af49b5242bdb2921ce4b83d5c212fefa
-
SHA512
61db6915f16fde52c5ac769d5bbdb33b50eab755a720d72e0c8c3e70cb05c79386f87a166976fe152e15973f87c1ed764664ac83541b13a79ffeee2fc45c3d56
-
SSDEEP
12288:Qpuy90bdYwvrcrycpRIvhv/IV9w8r03ZiXiLdmk7Hu2sjL7p:DySd3I2cpRkl/IVq+IiEzu2y
Malware Config
Extracted
redline
hares
83.97.73.128:19071
-
auth_value
62fed2fd42b168e956200885cefb36a7
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2904-22-0x0000000000540000-0x000000000054A000-memory.dmp healer behavioral1/files/0x000700000002345a-29.dat healer behavioral1/memory/1972-31-0x0000000000040000-0x000000000004A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b7591528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8176298.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8176298.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8176298.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8176298.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b7591528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b7591528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b7591528.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b7591528.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8176298.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8176298.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b7591528.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3328-36-0x0000000000540000-0x0000000000570000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 2184 v7006892.exe 3364 v8013823.exe 2904 a8176298.exe 1972 b7591528.exe 3328 c1666240.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8176298.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8176298.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b7591528.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 23fff09f2f63491da2c2bab5c5eceae1af49b5242bdb2921ce4b83d5c212fefa_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7006892.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8013823.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2904 a8176298.exe 2904 a8176298.exe 1972 b7591528.exe 1972 b7591528.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2904 a8176298.exe Token: SeDebugPrivilege 1972 b7591528.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2184 2120 23fff09f2f63491da2c2bab5c5eceae1af49b5242bdb2921ce4b83d5c212fefa_NeikiAnalytics.exe 84 PID 2120 wrote to memory of 2184 2120 23fff09f2f63491da2c2bab5c5eceae1af49b5242bdb2921ce4b83d5c212fefa_NeikiAnalytics.exe 84 PID 2120 wrote to memory of 2184 2120 23fff09f2f63491da2c2bab5c5eceae1af49b5242bdb2921ce4b83d5c212fefa_NeikiAnalytics.exe 84 PID 2184 wrote to memory of 3364 2184 v7006892.exe 85 PID 2184 wrote to memory of 3364 2184 v7006892.exe 85 PID 2184 wrote to memory of 3364 2184 v7006892.exe 85 PID 3364 wrote to memory of 2904 3364 v8013823.exe 86 PID 3364 wrote to memory of 2904 3364 v8013823.exe 86 PID 3364 wrote to memory of 2904 3364 v8013823.exe 86 PID 3364 wrote to memory of 1972 3364 v8013823.exe 96 PID 3364 wrote to memory of 1972 3364 v8013823.exe 96 PID 2184 wrote to memory of 3328 2184 v7006892.exe 97 PID 2184 wrote to memory of 3328 2184 v7006892.exe 97 PID 2184 wrote to memory of 3328 2184 v7006892.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\23fff09f2f63491da2c2bab5c5eceae1af49b5242bdb2921ce4b83d5c212fefa_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\23fff09f2f63491da2c2bab5c5eceae1af49b5242bdb2921ce4b83d5c212fefa_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7006892.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7006892.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8013823.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8013823.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8176298.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8176298.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7591528.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7591528.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1666240.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1666240.exe3⤵
- Executes dropped EXE
PID:3328
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
487KB
MD5828b90c9881e3ed72f916c124d6cde23
SHA15289642db09f7f29c4c9bdeebf994b32ecceedce
SHA2560ea3f2e11cde2c7958267c125757d37c05bf7aa75283ea1d06636b1d18f5a1e9
SHA5125d0b0173547a2ea28be3c660e5862e1ab70b27c7c41fa31737a968378d06ed21c1bd5042d9a4ef10a15c2eb0dede99b018e7fc13d20e3c077bdd284d828ea78c
-
Filesize
388KB
MD5512fa87d5c19f2e4c00dc9ead29de52f
SHA17031d8d53e6801879b4c173e3c703307eeca842a
SHA256c6b454ebb7701d1e1f665e32bc79d4ab10262cbf34ec004cdfa3e76cc1189194
SHA5121c11eb7dc27424b965438edaca8f074394d432c0c7975557e3c5c700ece26e3738e8d2d5cdb47c3b0d10e2b5e463327eda35637582ef019f9ee8b037748fefc2
-
Filesize
227KB
MD593f2fddfc416ba0575bdbbec89f32f2e
SHA1c4921de1651a2d05caac807afb0053acd440ec21
SHA256fb2798360f7604bb2955e1a45011c4d59a437866b39bc923a4f10a4caef5d4f2
SHA5128885849b8ba08dc13ed7a2104270672d81cbff5cf2122d6dd870aa06b4d7ecd6fd1c0214ff05410740ec9a5000281802ac3817f4f47f7d612f49cdf635afa586
-
Filesize
176KB
MD5211a06e9ae68ced1234252a48696431b
SHA169950e2ee2fafd177d1a295836713bfd8d18df9c
SHA2560bdca9c84103454e329cfde4e69dc41a0ec0196c078c8fc195b0fa739d2f905d
SHA512b1643ba376075619335b4bdf0d7610aece13b7c9db60eecb508465f97ef3e6a9d5297f9ac8529886efa052cdd8814ac7d4eeab44812f797a1b2dc5fa967ee7eb
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91