Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
22dd95c07bea90fada5a83b65f8fc90e5ebe8b37332e3895926cad58160aeb7c.exe
Resource
win10v2004-20240508-en
General
-
Target
22dd95c07bea90fada5a83b65f8fc90e5ebe8b37332e3895926cad58160aeb7c.exe
-
Size
307KB
-
MD5
8b19ea848d55ba867ec04670a326db4a
-
SHA1
93f9e4233e44756d26d436532dccad9bdebdc083
-
SHA256
22dd95c07bea90fada5a83b65f8fc90e5ebe8b37332e3895926cad58160aeb7c
-
SHA512
538490707176b4e78b446e5b86b850b687141f844895f1673dbccdec97be94f72fcd66631a0b92d64a8de097a3aab80f1eda5bc56b1bf8cf0bbc700c8dcda7e7
-
SSDEEP
6144:KIy+bnr+ep0yN90QEz5F5OYc1u31g4TByp/hMCp1QzQ9aut77D:UMriy90rxc1u31TTEp/jp1uQo8n
Malware Config
Extracted
redline
mufos
217.196.96.102:4132
-
auth_value
136f202e6569ad5815c34377858a255c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2820-8-0x00000000049F0000-0x0000000004A0A000-memory.dmp healer behavioral1/memory/2820-11-0x0000000004AC0000-0x0000000004AD8000-memory.dmp healer behavioral1/memory/2820-41-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/2820-39-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/2820-37-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/2820-35-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/2820-33-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/2820-31-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/2820-29-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/2820-27-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/2820-26-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/2820-23-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/2820-21-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/2820-19-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/2820-17-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/2820-15-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/2820-14-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5161310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5161310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5161310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5161310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5161310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5161310.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000700000002340a-45.dat family_redline behavioral1/memory/2920-47-0x0000000000880000-0x00000000008AE000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 17 IoCs
resource yara_rule behavioral1/memory/2820-8-0x00000000049F0000-0x0000000004A0A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-11-0x0000000004AC0000-0x0000000004AD8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-41-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-39-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-37-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-35-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-33-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-31-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-29-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-27-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-26-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-23-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-21-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-19-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-17-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-15-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2820-14-0x0000000004AC0000-0x0000000004AD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 2 IoCs
resource yara_rule behavioral1/files/0x000700000002340a-45.dat INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/2920-47-0x0000000000880000-0x00000000008AE000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Executes dropped EXE 2 IoCs
pid Process 2820 a5161310.exe 2920 b9279511.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5161310.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5161310.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 22dd95c07bea90fada5a83b65f8fc90e5ebe8b37332e3895926cad58160aeb7c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2820 a5161310.exe 2820 a5161310.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2820 a5161310.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4320 wrote to memory of 2820 4320 22dd95c07bea90fada5a83b65f8fc90e5ebe8b37332e3895926cad58160aeb7c.exe 82 PID 4320 wrote to memory of 2820 4320 22dd95c07bea90fada5a83b65f8fc90e5ebe8b37332e3895926cad58160aeb7c.exe 82 PID 4320 wrote to memory of 2820 4320 22dd95c07bea90fada5a83b65f8fc90e5ebe8b37332e3895926cad58160aeb7c.exe 82 PID 4320 wrote to memory of 2920 4320 22dd95c07bea90fada5a83b65f8fc90e5ebe8b37332e3895926cad58160aeb7c.exe 88 PID 4320 wrote to memory of 2920 4320 22dd95c07bea90fada5a83b65f8fc90e5ebe8b37332e3895926cad58160aeb7c.exe 88 PID 4320 wrote to memory of 2920 4320 22dd95c07bea90fada5a83b65f8fc90e5ebe8b37332e3895926cad58160aeb7c.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\22dd95c07bea90fada5a83b65f8fc90e5ebe8b37332e3895926cad58160aeb7c.exe"C:\Users\Admin\AppData\Local\Temp\22dd95c07bea90fada5a83b65f8fc90e5ebe8b37332e3895926cad58160aeb7c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a5161310.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a5161310.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b9279511.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b9279511.exe2⤵
- Executes dropped EXE
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181KB
MD5a4baef56aa878790a27336ca8cba705d
SHA1b0cab82469e3af3c4ed2f4cea36d97bb09db774b
SHA256cbb1d46fb49b324e66076ee190aa3fe7d1732fbd9b824d5faf474e433f9dc040
SHA512eaddcd812db2964cd1d65e10c3dc2a52da91f398a1404f3f2a3faadefa0631117971fe62da280db91a7fd09070f22cd4e1e38a6681e127e75832cfe0fe2dcc63
-
Filesize
168KB
MD539dbecf46a34336df55214ca6396be0b
SHA1c2c8b626ce04c64f02df3de1ae4bb909093e59a0
SHA25605958ce32ec64fdd7a96755a34a8bfa42aa24d24b0d0f12a5d2c636458948bf4
SHA512e8619ea0c6c22dd28f47c01c3c63f6dc31c9d8f6bb13eb9794089618695aca127d7ac6b1e412268c86b82c6d6366f1e2678eed9f148cd79a7d4a74371469470b