Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 04:03
Static task
static1
Behavioral task
behavioral1
Sample
49a50984850c9f0ddb7e50596fa38c97f86915635a2d83c9c1f53e5e72ba9701_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
49a50984850c9f0ddb7e50596fa38c97f86915635a2d83c9c1f53e5e72ba9701_NeikiAnalytics.exe
-
Size
433KB
-
MD5
6ceecba79d0895eb3d914391ca2cc2c0
-
SHA1
c2a2387735af8ec9e73178f5294387e14771ab6f
-
SHA256
49a50984850c9f0ddb7e50596fa38c97f86915635a2d83c9c1f53e5e72ba9701
-
SHA512
aec66aa9227e074578a53b936f9b532a8748bfa05e8bfdff89a90ccdf1441432c6abb16a8b69b631d1685f88174dfe7b83327bfe25e875b78bd8fc14acc1f345
-
SSDEEP
12288:jMr8y90e4boilTG1au4t+h5jAXqrrc7v1:TyT+oSG5jA9Z
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000800000002342b-12.dat healer behavioral1/memory/5024-15-0x0000000000820000-0x000000000082A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7904488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7904488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7904488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7904488.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a7904488.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7904488.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023428-30.dat family_redline behavioral1/memory/4692-32-0x0000000000110000-0x0000000000140000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation saves.exe Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation b8709862.exe -
Executes dropped EXE 7 IoCs
pid Process 4024 v5702059.exe 5024 a7904488.exe 3692 b8709862.exe 4780 saves.exe 4692 c9155475.exe 2888 saves.exe 100 saves.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a7904488.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49a50984850c9f0ddb7e50596fa38c97f86915635a2d83c9c1f53e5e72ba9701_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5702059.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1784 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5024 a7904488.exe 5024 a7904488.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5024 a7904488.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2808 wrote to memory of 4024 2808 49a50984850c9f0ddb7e50596fa38c97f86915635a2d83c9c1f53e5e72ba9701_NeikiAnalytics.exe 82 PID 2808 wrote to memory of 4024 2808 49a50984850c9f0ddb7e50596fa38c97f86915635a2d83c9c1f53e5e72ba9701_NeikiAnalytics.exe 82 PID 2808 wrote to memory of 4024 2808 49a50984850c9f0ddb7e50596fa38c97f86915635a2d83c9c1f53e5e72ba9701_NeikiAnalytics.exe 82 PID 4024 wrote to memory of 5024 4024 v5702059.exe 83 PID 4024 wrote to memory of 5024 4024 v5702059.exe 83 PID 4024 wrote to memory of 3692 4024 v5702059.exe 92 PID 4024 wrote to memory of 3692 4024 v5702059.exe 92 PID 4024 wrote to memory of 3692 4024 v5702059.exe 92 PID 3692 wrote to memory of 4780 3692 b8709862.exe 93 PID 3692 wrote to memory of 4780 3692 b8709862.exe 93 PID 3692 wrote to memory of 4780 3692 b8709862.exe 93 PID 2808 wrote to memory of 4692 2808 49a50984850c9f0ddb7e50596fa38c97f86915635a2d83c9c1f53e5e72ba9701_NeikiAnalytics.exe 95 PID 2808 wrote to memory of 4692 2808 49a50984850c9f0ddb7e50596fa38c97f86915635a2d83c9c1f53e5e72ba9701_NeikiAnalytics.exe 95 PID 2808 wrote to memory of 4692 2808 49a50984850c9f0ddb7e50596fa38c97f86915635a2d83c9c1f53e5e72ba9701_NeikiAnalytics.exe 95 PID 4780 wrote to memory of 1784 4780 saves.exe 97 PID 4780 wrote to memory of 1784 4780 saves.exe 97 PID 4780 wrote to memory of 1784 4780 saves.exe 97 PID 4780 wrote to memory of 4076 4780 saves.exe 98 PID 4780 wrote to memory of 4076 4780 saves.exe 98 PID 4780 wrote to memory of 4076 4780 saves.exe 98 PID 4076 wrote to memory of 1516 4076 cmd.exe 101 PID 4076 wrote to memory of 1516 4076 cmd.exe 101 PID 4076 wrote to memory of 1516 4076 cmd.exe 101 PID 4076 wrote to memory of 760 4076 cmd.exe 102 PID 4076 wrote to memory of 760 4076 cmd.exe 102 PID 4076 wrote to memory of 760 4076 cmd.exe 102 PID 4076 wrote to memory of 4336 4076 cmd.exe 103 PID 4076 wrote to memory of 4336 4076 cmd.exe 103 PID 4076 wrote to memory of 4336 4076 cmd.exe 103 PID 4076 wrote to memory of 5096 4076 cmd.exe 104 PID 4076 wrote to memory of 5096 4076 cmd.exe 104 PID 4076 wrote to memory of 5096 4076 cmd.exe 104 PID 4076 wrote to memory of 1056 4076 cmd.exe 105 PID 4076 wrote to memory of 1056 4076 cmd.exe 105 PID 4076 wrote to memory of 1056 4076 cmd.exe 105 PID 4076 wrote to memory of 952 4076 cmd.exe 106 PID 4076 wrote to memory of 952 4076 cmd.exe 106 PID 4076 wrote to memory of 952 4076 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\49a50984850c9f0ddb7e50596fa38c97f86915635a2d83c9c1f53e5e72ba9701_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\49a50984850c9f0ddb7e50596fa38c97f86915635a2d83c9c1f53e5e72ba9701_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5702059.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5702059.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7904488.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7904488.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8709862.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8709862.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F5⤵
- Scheduled Task/Job: Scheduled Task
PID:1784
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"6⤵PID:760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E6⤵PID:4336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:5096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"6⤵PID:1056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E6⤵PID:952
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c9155475.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c9155475.exe2⤵
- Executes dropped EXE
PID:4692
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2888
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56be3c54c7d9910fd3120148b6730cc3b
SHA16aa57ae1b226bc2ce99c696973be440229b8c724
SHA2569047d8a9a0a32396dfaba8edeba41c4f273be36b3111547b76a66363c57b4390
SHA5123e8bfc081cab88194f8ea3f752193af432bf7ce7517991c8a3192978253d69e94191666ccc4faf3be476f0fd8add5d570523371430c4b4906367df1ac1f8ab26
-
Filesize
277KB
MD57091d9dfed0ca80f9cd4f4a810501e91
SHA1225b5893280f3284c7c1db4d8c125d5511f4ad72
SHA25647468185a9c0fada4d543f71f58bdebbe0a86977fb8493f8ace554b7f1656b8c
SHA51250fb27aaefbd429374b40e62c62a8a799379c78690a60c8bd45c0f6bfaf5ca0e0f210428280d875fe5ff2f28a3d6dc633026663b82c3fab0b75c93680b7fe08d
-
Filesize
11KB
MD516e7cc807f53ce38eb67dad191a7c3a4
SHA19c4140d8e70d69e66a9ed3e663579a1391fd5725
SHA25689bbab4c734612c2db9625463044573d30d03f2cd515ed05ddbcad56b8c43e79
SHA5122c6df5b3ae8c11ff710320de231ba6fa0ac7326ac32507550f574a0c824bc521c017992706f7277a3f34c688b7fa9e5732e9aaf7e1d1db263d433bcfa6efb98e
-
Filesize
338KB
MD5d2b8675eaf4b13e54a8de89354e02104
SHA1e5d070a6e58d11b3532dbe6541d9a8942f6e9990
SHA256eed3fda9f7a57b8bf1ff15c84fcec1ff761eee04c680cad8f7f8d69e237c1d31
SHA512bdc510eda3db331ba74aabcf69cdc1ad387ff93cd97d4a92c878dbd447efb1c7b0f99c891d15713bbe6348e358e8bdae9c57eac4a50430911becedc6c6a165cc