Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03-03-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0.exe
Resource
win10v2004-20240226-en
General
-
Target
794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0.exe
-
Size
666KB
-
MD5
86d80efcf39ac0644815a6a7793b4e07
-
SHA1
abf36fbcb4de003a0c4acb063a3752ebfd849298
-
SHA256
794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0
-
SHA512
b223b880c06f5ea76c80833d83d57b57b71e4c78b77c8641162fd5c12805bcc406ce7ab5929bb216de7da9813d63f422050912d91eae32afce1702a17502ee8b
-
SSDEEP
12288:JMrNy9050p+mG2mpcnprJu/v78tWYb0fqH7IIDF0sgKkdyDBZ:EyCg+jcpVAv78IYgCH7IMh3Qyn
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\buOF05nB53.exe healer behavioral1/memory/3864-14-0x0000000000B50000-0x0000000000B5A000-memory.dmp healer -
Processes:
buOF05nB53.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buOF05nB53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buOF05nB53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buOF05nB53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buOF05nB53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buOF05nB53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buOF05nB53.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2220-25-0x0000000002340000-0x0000000002386000-memory.dmp family_redline behavioral1/memory/2220-31-0x0000000004BB0000-0x0000000004BF4000-memory.dmp family_redline behavioral1/memory/2220-32-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-33-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-35-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-37-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-39-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-41-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-43-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-45-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-47-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-49-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-51-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-53-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-55-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-57-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-59-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-61-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-63-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-65-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-67-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-69-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-71-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-73-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-75-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-77-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-79-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-81-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-83-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-85-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-87-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-89-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-91-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-93-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/2220-95-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\buOF05nB53.exe INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3864-14-0x0000000000B50000-0x0000000000B5A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Executes dropped EXE 3 IoCs
Processes:
plsp92Cu08.exebuOF05nB53.execato69Uw10.exepid process 4912 plsp92Cu08.exe 3864 buOF05nB53.exe 2220 cato69Uw10.exe -
Processes:
buOF05nB53.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buOF05nB53.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0.exeplsp92Cu08.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plsp92Cu08.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
buOF05nB53.exepid process 3864 buOF05nB53.exe 3864 buOF05nB53.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
buOF05nB53.execato69Uw10.exedescription pid process Token: SeDebugPrivilege 3864 buOF05nB53.exe Token: SeDebugPrivilege 2220 cato69Uw10.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0.exeplsp92Cu08.exedescription pid process target process PID 3968 wrote to memory of 4912 3968 794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0.exe plsp92Cu08.exe PID 3968 wrote to memory of 4912 3968 794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0.exe plsp92Cu08.exe PID 3968 wrote to memory of 4912 3968 794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0.exe plsp92Cu08.exe PID 4912 wrote to memory of 3864 4912 plsp92Cu08.exe buOF05nB53.exe PID 4912 wrote to memory of 3864 4912 plsp92Cu08.exe buOF05nB53.exe PID 4912 wrote to memory of 2220 4912 plsp92Cu08.exe cato69Uw10.exe PID 4912 wrote to memory of 2220 4912 plsp92Cu08.exe cato69Uw10.exe PID 4912 wrote to memory of 2220 4912 plsp92Cu08.exe cato69Uw10.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0.exe"C:\Users\Admin\AppData\Local\Temp\794da2c962cb4a1f2df6f0d966e94bc0ef08c6b20138ffd0f2f8e7d6d9cfd7b0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plsp92Cu08.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plsp92Cu08.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\buOF05nB53.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\buOF05nB53.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cato69Uw10.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cato69Uw10.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD5b4944bc275ae14c46b017da4121ca43b
SHA1f791c3ac27e502e2aa6b4c6b0abbd116ac96c6f3
SHA25662a2b9cf24ec16917202c5938495357bdc6b4861a77520225388ee25370d1ce8
SHA512b82bc47d7fa503ba545b74796695edb7db82535c181b19b33242cb67fb87e79bedb79da6b64cbb43978290879e9923b7f010ccf78e4027847166c0d1cdddc5f0
-
Filesize
11KB
MD53b416a1b882466bd99311dbab98fb42d
SHA1286eaf9931732e12f2ba571d44e4bb20e20d0022
SHA2569810f5b05ccbee3d0d4dc6368bbafdb3fd80eb506f5f443969dd98747febe29d
SHA5125903569d34bced97c27426313c309f243d5eb145bf496eccd2ee598a61154da0057b4753a6a1de1fa9a8f76bb51b6a7c53937d91456abda15cce93ac9554baad
-
Filesize
304KB
MD5fc9d1d13726797f824009a1594b5a9c3
SHA1447b53284c76edef32a942621ad7fdfd0f3ce704
SHA256872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276
SHA512e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729