Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 00:06
Static task
static1
Behavioral task
behavioral1
Sample
8cf9ccd6da36205ee83da0b0a5e7f6cc91d5bf077df572fab6e7109ae76cd4d9.exe
Resource
win10v2004-20240508-en
General
-
Target
8cf9ccd6da36205ee83da0b0a5e7f6cc91d5bf077df572fab6e7109ae76cd4d9.exe
-
Size
478KB
-
MD5
56cbda6826023f3af9c6781e81eb5eb2
-
SHA1
da2db737b6856bd7495fd7f4965f1ad7c1608c35
-
SHA256
8cf9ccd6da36205ee83da0b0a5e7f6cc91d5bf077df572fab6e7109ae76cd4d9
-
SHA512
98230f7393443acef809e5696e74cd194dd63cfbbb5d7cb3b8751d19d0ddc991299da2809cc4462249cc4b3c1ef578b6be44e5b79a87ae6dd8bb4b26bd571316
-
SSDEEP
12288:CMrmy905CjTVLGuS5c1u31pTHoaPH+yvN5GOMU:gyB5Lj2XTTI8+iNUy
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4100-15-0x00000000022D0000-0x00000000022EA000-memory.dmp healer behavioral1/memory/4100-18-0x0000000002310000-0x0000000002328000-memory.dmp healer behavioral1/memory/4100-47-0x0000000002310000-0x0000000002322000-memory.dmp healer behavioral1/memory/4100-45-0x0000000002310000-0x0000000002322000-memory.dmp healer behavioral1/memory/4100-43-0x0000000002310000-0x0000000002322000-memory.dmp healer behavioral1/memory/4100-42-0x0000000002310000-0x0000000002322000-memory.dmp healer behavioral1/memory/4100-39-0x0000000002310000-0x0000000002322000-memory.dmp healer behavioral1/memory/4100-37-0x0000000002310000-0x0000000002322000-memory.dmp healer behavioral1/memory/4100-35-0x0000000002310000-0x0000000002322000-memory.dmp healer behavioral1/memory/4100-33-0x0000000002310000-0x0000000002322000-memory.dmp healer behavioral1/memory/4100-31-0x0000000002310000-0x0000000002322000-memory.dmp healer behavioral1/memory/4100-29-0x0000000002310000-0x0000000002322000-memory.dmp healer behavioral1/memory/4100-27-0x0000000002310000-0x0000000002322000-memory.dmp healer behavioral1/memory/4100-25-0x0000000002310000-0x0000000002322000-memory.dmp healer behavioral1/memory/4100-23-0x0000000002310000-0x0000000002322000-memory.dmp healer behavioral1/memory/4100-21-0x0000000002310000-0x0000000002322000-memory.dmp healer behavioral1/memory/4100-20-0x0000000002310000-0x0000000002322000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k0666833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0666833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0666833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0666833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0666833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0666833.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x00070000000233fd-53.dat family_redline behavioral1/memory/3616-54-0x00000000005A0000-0x00000000005D0000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 17 IoCs
resource yara_rule behavioral1/memory/4100-15-0x00000000022D0000-0x00000000022EA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-18-0x0000000002310000-0x0000000002328000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-47-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-45-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-43-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-42-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-39-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-37-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-35-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-33-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-31-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-29-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-27-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-25-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-23-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-21-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/4100-20-0x0000000002310000-0x0000000002322000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 2 IoCs
resource yara_rule behavioral1/files/0x00070000000233fd-53.dat INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/3616-54-0x00000000005A0000-0x00000000005D0000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Executes dropped EXE 3 IoCs
pid Process 2996 y2529164.exe 4100 k0666833.exe 3616 l1131425.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k0666833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0666833.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8cf9ccd6da36205ee83da0b0a5e7f6cc91d5bf077df572fab6e7109ae76cd4d9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2529164.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4100 k0666833.exe 4100 k0666833.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4100 k0666833.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2996 1736 8cf9ccd6da36205ee83da0b0a5e7f6cc91d5bf077df572fab6e7109ae76cd4d9.exe 80 PID 1736 wrote to memory of 2996 1736 8cf9ccd6da36205ee83da0b0a5e7f6cc91d5bf077df572fab6e7109ae76cd4d9.exe 80 PID 1736 wrote to memory of 2996 1736 8cf9ccd6da36205ee83da0b0a5e7f6cc91d5bf077df572fab6e7109ae76cd4d9.exe 80 PID 2996 wrote to memory of 4100 2996 y2529164.exe 81 PID 2996 wrote to memory of 4100 2996 y2529164.exe 81 PID 2996 wrote to memory of 4100 2996 y2529164.exe 81 PID 2996 wrote to memory of 3616 2996 y2529164.exe 88 PID 2996 wrote to memory of 3616 2996 y2529164.exe 88 PID 2996 wrote to memory of 3616 2996 y2529164.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cf9ccd6da36205ee83da0b0a5e7f6cc91d5bf077df572fab6e7109ae76cd4d9.exe"C:\Users\Admin\AppData\Local\Temp\8cf9ccd6da36205ee83da0b0a5e7f6cc91d5bf077df572fab6e7109ae76cd4d9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2529164.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2529164.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0666833.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0666833.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1131425.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1131425.exe3⤵
- Executes dropped EXE
PID:3616
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD59c6160862fa8560e45fccebe7fb58749
SHA169f4d61cc56957de57ee17332d1c3b36afd0508b
SHA256f582bfe6cadebe2a797a4b134f1216b50b186386654a9a2f3b781a9174ff8aa4
SHA512f32f637ac847e32801d1aa0f3838fdb318a8479b3b3b129a7fe23054f2e473f133c3d28d84bf9e379319ac6d6bf037e34eabfe1340973dc7a8430fc7351253d8
-
Filesize
180KB
MD51ef1ec54bc58c2e7abd5db51dc8dc7d7
SHA1ef792db55d8bcf599bfe29403efe00a1d83da1fd
SHA256d4c37587c865d0bffc9df10e1a538a5f3df434e8df6b287a69d44904d3d3e7a7
SHA5126c617dfc2d07d89354a23d6df8504dffd8ee6655a1f06d1e5d62099494b3810274e835bff7ab68f8c37ef2044436ac2b1b57a226e8d48e4148c0e9dbfd55a5ac
-
Filesize
168KB
MD59dec018dfb97de39054b74c355bfdc15
SHA1fcf14c4e1ed8b11a36a503b1376906721913a2f1
SHA2568c6754ccfd277249945f93eca2f53aa9c26864400e423a18d3a1e96dc8d59cf6
SHA512a6c179c6a3b3f1e9376dacb214d5221090e4f4a586838dcf9402db17771b0538f51d92b044e36023d3fe0edd2ad2ed4eaf2bf73ad4ee1b2d574051ac03070da0