Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2024 15:02
Static task
static1
Behavioral task
behavioral1
Sample
382a6e0a0801a10f3559789811792b7dcd1d919c96d09e2acc3d5817790877df.exe
Resource
win10v2004-20240412-en
General
-
Target
382a6e0a0801a10f3559789811792b7dcd1d919c96d09e2acc3d5817790877df.exe
-
Size
526KB
-
MD5
7b7fa3fa05d2195e3c826165047d191c
-
SHA1
585082204f514352a5f74e87e2b1d75cb61028cb
-
SHA256
382a6e0a0801a10f3559789811792b7dcd1d919c96d09e2acc3d5817790877df
-
SHA512
e8f9f2b248edb3a3487ac070e61c4125e76804c3f6bb6bb3e9502a162e036d945d1bd0f1508be4a9d79f59f4805561497f451650e69c8d5afd5056f689f24455
-
SSDEEP
12288:wMrgy90Fz/fTJtuZmPDm0ARcbBHMcPeyFq6GGB5KP:AyYTuZwD/ccPGKBKP
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/3608-21-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral1/memory/3608-22-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral1/memory/3608-23-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral1/memory/3608-25-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023456-13.dat healer behavioral1/memory/1472-14-0x00000000004F0000-0x00000000004FA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q7765974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q7765974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q7765974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q7765974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q7765974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q7765974.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2356-29-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023456-13.dat INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1472-14-0x00000000004F0000-0x00000000004FA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 1 IoCs
resource yara_rule behavioral1/memory/2356-29-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Executes dropped EXE 4 IoCs
pid Process 2432 z4673185.exe 1472 q7765974.exe 4640 r2796540.exe 1236 s2785043.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q7765974.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 382a6e0a0801a10f3559789811792b7dcd1d919c96d09e2acc3d5817790877df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4673185.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4640 set thread context of 3608 4640 r2796540.exe 96 PID 1236 set thread context of 2356 1236 s2785043.exe 103 -
Program crash 3 IoCs
pid pid_target Process procid_target 4668 3608 WerFault.exe 96 3344 4640 WerFault.exe 94 2308 1236 WerFault.exe 101 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1472 q7765974.exe 1472 q7765974.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1472 q7765974.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3396 wrote to memory of 2432 3396 382a6e0a0801a10f3559789811792b7dcd1d919c96d09e2acc3d5817790877df.exe 84 PID 3396 wrote to memory of 2432 3396 382a6e0a0801a10f3559789811792b7dcd1d919c96d09e2acc3d5817790877df.exe 84 PID 3396 wrote to memory of 2432 3396 382a6e0a0801a10f3559789811792b7dcd1d919c96d09e2acc3d5817790877df.exe 84 PID 2432 wrote to memory of 1472 2432 z4673185.exe 85 PID 2432 wrote to memory of 1472 2432 z4673185.exe 85 PID 2432 wrote to memory of 4640 2432 z4673185.exe 94 PID 2432 wrote to memory of 4640 2432 z4673185.exe 94 PID 2432 wrote to memory of 4640 2432 z4673185.exe 94 PID 4640 wrote to memory of 3608 4640 r2796540.exe 96 PID 4640 wrote to memory of 3608 4640 r2796540.exe 96 PID 4640 wrote to memory of 3608 4640 r2796540.exe 96 PID 4640 wrote to memory of 3608 4640 r2796540.exe 96 PID 4640 wrote to memory of 3608 4640 r2796540.exe 96 PID 4640 wrote to memory of 3608 4640 r2796540.exe 96 PID 4640 wrote to memory of 3608 4640 r2796540.exe 96 PID 4640 wrote to memory of 3608 4640 r2796540.exe 96 PID 4640 wrote to memory of 3608 4640 r2796540.exe 96 PID 4640 wrote to memory of 3608 4640 r2796540.exe 96 PID 3396 wrote to memory of 1236 3396 382a6e0a0801a10f3559789811792b7dcd1d919c96d09e2acc3d5817790877df.exe 101 PID 3396 wrote to memory of 1236 3396 382a6e0a0801a10f3559789811792b7dcd1d919c96d09e2acc3d5817790877df.exe 101 PID 3396 wrote to memory of 1236 3396 382a6e0a0801a10f3559789811792b7dcd1d919c96d09e2acc3d5817790877df.exe 101 PID 1236 wrote to memory of 2356 1236 s2785043.exe 103 PID 1236 wrote to memory of 2356 1236 s2785043.exe 103 PID 1236 wrote to memory of 2356 1236 s2785043.exe 103 PID 1236 wrote to memory of 2356 1236 s2785043.exe 103 PID 1236 wrote to memory of 2356 1236 s2785043.exe 103 PID 1236 wrote to memory of 2356 1236 s2785043.exe 103 PID 1236 wrote to memory of 2356 1236 s2785043.exe 103 PID 1236 wrote to memory of 2356 1236 s2785043.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\382a6e0a0801a10f3559789811792b7dcd1d919c96d09e2acc3d5817790877df.exe"C:\Users\Admin\AppData\Local\Temp\382a6e0a0801a10f3559789811792b7dcd1d919c96d09e2acc3d5817790877df.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4673185.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4673185.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\q7765974.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\q7765974.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2796540.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2796540.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 5405⤵
- Program crash
PID:4668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 1524⤵
- Program crash
PID:3344
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2785043.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2785043.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:2356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 1523⤵
- Program crash
PID:2308
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4640 -ip 46401⤵PID:1588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3608 -ip 36081⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1236 -ip 12361⤵PID:1640
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
310KB
MD56ed183ac5c3d07c9fe1842a5d71b2eb8
SHA1eabad50dc71cbe324d6e5a2bb99a30e6694c88a3
SHA256035025a13c06fcd87553f68f7e97838d3858b7b1e0ecfc9d4e2654077b452b3d
SHA512f9bc742f50736e0399e91bcded2793a06b0b74f34c35c30013eeab8aadde2fa57829e8b0347fea07a1bd36cd481aba5aa01fa96cdfc716d8de12037cf6b76726
-
Filesize
296KB
MD53b68417945578195a3df5d3142811db0
SHA179a78301f6011127914aaf3de88c121345a3d7c3
SHA256f894040a843df87dae9a4cdf4d0e611eb1504ba82716ed1ebe86eb8ef07da111
SHA512f754b1e78060cf03e40e0431e7882fec4f8145eadae0fe2a68532ba7d78f8f185fad8b2ef26e979ea11a0a50a88864a82fca06b4247451672d94d7bab9e4bfd4
-
Filesize
11KB
MD512d98f3000af27fdfca20f1af7541361
SHA1136e8999ad6e024bbde29a5c75c9d4cf47ac2ac6
SHA256cd5e91956a19343419a65eb45c5388b577ff39fbdc75951ff585e1c68ac7a413
SHA5120b54fe7b6b8b4a90da154286143ad12e788ce403dfdd7a3607c9af8eeb905e1008f68804f8e9ee72154f70561b5ab843d5bf00a2f2aaf2d21b191c70c5aa634b
-
Filesize
276KB
MD5879e771f3b81012db6cc6c4c035442c1
SHA1359fd80a794a4f9120fd24e0877a71a1a0a9e8a3
SHA256ef8bfc7607f43e580c360c060e5baad0f548153b8af20035ecebb1eff3c58b44
SHA512a76920497d11257a0945e419ea642583363bb91978f37c1510abd629ea51bc2befcc48098e8167dc9df1e29520af7f82cf92cd156b79d87f8026cfac03a15d26