Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57.exe
Resource
win10v2004-20240226-en
General
-
Target
a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57.exe
-
Size
917KB
-
MD5
6fdfe49a6a2bfde4671bffb38d338f33
-
SHA1
35f4533d79757b9e614a87f19a7a6124fb2c428a
-
SHA256
a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57
-
SHA512
6c8e571007a8c46f729b1269bf184779f3572ec2edcc8e68e8286fd34560726f63ffe90a118ee14680e1573e0b56643a1232e18aeb5b7789918ca9a07f4e57c5
-
SSDEEP
24576:yySANA2vRMtGsJa0pZjc+whK6qVPvqx6jrTd:Z1NA25MtGsJa0TjNw46OX
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023268-19.dat healer behavioral1/memory/224-21-0x0000000000280000-0x000000000028A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4824473.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4824473.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4824473.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4824473.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4824473.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4824473.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023269-26.dat family_redline behavioral1/memory/3856-29-0x0000000000C60000-0x0000000000C8A000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023268-19.dat INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/224-21-0x0000000000280000-0x000000000028A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023269-26.dat INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3856-29-0x0000000000C60000-0x0000000000C8A000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Executes dropped EXE 4 IoCs
pid Process 4024 v3975467.exe 3096 v1104218.exe 224 a4824473.exe 3856 b4836122.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4824473.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3975467.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1104218.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 224 a4824473.exe 224 a4824473.exe 224 a4824473.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 224 a4824473.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 732 wrote to memory of 4024 732 a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57.exe 96 PID 732 wrote to memory of 4024 732 a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57.exe 96 PID 732 wrote to memory of 4024 732 a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57.exe 96 PID 4024 wrote to memory of 3096 4024 v3975467.exe 97 PID 4024 wrote to memory of 3096 4024 v3975467.exe 97 PID 4024 wrote to memory of 3096 4024 v3975467.exe 97 PID 3096 wrote to memory of 224 3096 v1104218.exe 98 PID 3096 wrote to memory of 224 3096 v1104218.exe 98 PID 3096 wrote to memory of 3856 3096 v1104218.exe 104 PID 3096 wrote to memory of 3856 3096 v1104218.exe 104 PID 3096 wrote to memory of 3856 3096 v1104218.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57.exe"C:\Users\Admin\AppData\Local\Temp\a4ee08aad287045b40a41a2ce0ff06d21d1b269f9113fdb52e2c4dae2904fd57.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3975467.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3975467.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1104218.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1104218.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4824473.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4824473.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4836122.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4836122.exe4⤵
- Executes dropped EXE
PID:3856
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1712 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:1168
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
638KB
MD574de358eaea2b08bd289236d327c8b02
SHA14bd4388da5148cd3175fcfe3822853695bfcc537
SHA2561c8e7cb1fbab7d6fec241c2e36c14113a9a3b5cbf5cb1a86b66ce6d0baa61132
SHA512e048b7098b3a9b8a569db702c890e12cd6dba73123061e1bf06f20393203b62d109dc5265f4640f930fc82304e3467c37ee4ecab570401c40bdbc743a9afdfb4
-
Filesize
192KB
MD596f4143eec3ae4cb1306b1057d364183
SHA145ea4d6aa668ea412d2a9b934c801c4604ff4173
SHA256a9121eabab867b2c02ed2f707dbe01457ce7082808bbcd53395090d4437d8d10
SHA51292e98660d8f6dd5c43c39b42b0506b486db479095695a7a47866cf648a5d433e1b7c79116bb450d81cf93e3b382bb48b2106e16a691bd3455ddfdce8705bcc15
-
Filesize
11KB
MD53e93298d9c8ec3e5bffeaecd73d304fb
SHA19a80854ab78b82d54911731b6f90b286cf143189
SHA256b6f526e716440c0151c35004d3af2a05cf16cc35317382bc7539617cf52f4f7d
SHA512cd37302c86e51476169f17b3f812e5d1300bd6b2bc7306f67478e40d3707eeb4df580fec2f0394deb7e9db5a18ae9d47ecd48359d11b9a826c9db35d35bb7f6b
-
Filesize
145KB
MD51350acd255540c950ab409f52038148f
SHA1341e09d9062c15bf1505dd081a414c681ea223a0
SHA256331ccc9762453574af6c041726c67e784f5b775a6f090c84795c457d7cd6d405
SHA512144ec20b21d0824c8f91b30d1e6c7630e5f0aa38ea0854215633ff8a9b357a0f8541e02c7df4ba59918b0c5f5ebfaa3c917277b044506215cf8e4476f0c90530