Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 05:05
Static task
static1
Behavioral task
behavioral1
Sample
fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f.exe
Resource
win10v2004-20240226-en
General
-
Target
fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f.exe
-
Size
720KB
-
MD5
26a6c9f571da1f281827229690bbc262
-
SHA1
916c94c00abe47abecc7945ed6db2471b32462bf
-
SHA256
fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f
-
SHA512
ddffa882c5da55f3fb6ac445aa5c2a18c56c7f08bd2a6bf66a2dc8bae5fa4e27e6f8ac235c845de3104336bdc68064081f5d1b349b930d7816eb4fa44aab3342
-
SSDEEP
12288:iICy90HakVOwfql3+fYShpuFNjicL7w/XhhXcSSr6G2K4GgfXt+3:8y6wlJKhpuFNxc/XDZe6XVGgf9+3
Malware Config
Extracted
redline
mucha
83.97.73.131:19071
-
auth_value
5d76e123341992ecf110010eb89456f0
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/4420-29-0x0000000000500000-0x000000000050A000-memory.dmp healer behavioral1/files/0x0007000000023256-37.dat healer behavioral1/memory/1624-39-0x0000000000410000-0x000000000041A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8761450.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b1630033.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1630033.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1630033.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1630033.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8761450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8761450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8761450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1630033.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1630033.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8761450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8761450.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1852-44-0x0000000000510000-0x0000000000540000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 3 IoCs
resource yara_rule behavioral1/memory/4420-29-0x0000000000500000-0x000000000050A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/files/0x0007000000023256-37.dat INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1624-39-0x0000000000410000-0x000000000041A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 1 IoCs
resource yara_rule behavioral1/memory/1852-44-0x0000000000510000-0x0000000000540000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Executes dropped EXE 6 IoCs
pid Process 2916 v3613920.exe 2236 v9658845.exe 4456 v9161045.exe 4420 a8761450.exe 1624 b1630033.exe 1852 c2402071.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b1630033.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8761450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8761450.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3613920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9658845.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v9161045.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4420 a8761450.exe 4420 a8761450.exe 1624 b1630033.exe 1624 b1630033.exe 1624 b1630033.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4420 a8761450.exe Token: SeDebugPrivilege 1624 b1630033.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 536 wrote to memory of 2916 536 fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f.exe 91 PID 536 wrote to memory of 2916 536 fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f.exe 91 PID 536 wrote to memory of 2916 536 fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f.exe 91 PID 2916 wrote to memory of 2236 2916 v3613920.exe 92 PID 2916 wrote to memory of 2236 2916 v3613920.exe 92 PID 2916 wrote to memory of 2236 2916 v3613920.exe 92 PID 2236 wrote to memory of 4456 2236 v9658845.exe 93 PID 2236 wrote to memory of 4456 2236 v9658845.exe 93 PID 2236 wrote to memory of 4456 2236 v9658845.exe 93 PID 4456 wrote to memory of 4420 4456 v9161045.exe 94 PID 4456 wrote to memory of 4420 4456 v9161045.exe 94 PID 4456 wrote to memory of 4420 4456 v9161045.exe 94 PID 4456 wrote to memory of 1624 4456 v9161045.exe 104 PID 4456 wrote to memory of 1624 4456 v9161045.exe 104 PID 2236 wrote to memory of 1852 2236 v9658845.exe 106 PID 2236 wrote to memory of 1852 2236 v9658845.exe 106 PID 2236 wrote to memory of 1852 2236 v9658845.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f.exe"C:\Users\Admin\AppData\Local\Temp\fa42ffe9f7270e1e17e542107acce4f8ca9af8914c63c03f6aa60dfe8b2e971f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3613920.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3613920.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9658845.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9658845.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9161045.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9161045.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8761450.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8761450.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1630033.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1630033.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2402071.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2402071.exe4⤵
- Executes dropped EXE
PID:1852
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:4452
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
548KB
MD5433c2b0d9ce1597f843c52dea3e4f048
SHA18bcb1bf1a286045fcab2c100178b2763cce35d29
SHA2562962f1add9c0a50c2256c431c4ae32542fe700f8e7be1cb93d2958a939bcba08
SHA5128035949de415ce00526ef88f62ad189adccc2f4915b7f7c60b7cf1a967ec529747d2c07c621ec63203b5d63e8b32f8e3d21cd2ed7bc9ef0272712c532de48a57
-
Filesize
423KB
MD5e2abd5f6615125babc195e782066f8e5
SHA129f3d529f0e1f12250c5e9817bd17861478dae59
SHA25662ccc19a6ec1d2d6ca4eaacd692d328666f8beac9c09ffe63a412680e55f624c
SHA512c5f21d256dbbe95c5bf75c2a55f877d160ac5b54d9ae6424f01aea2abc5c8083124f012636485a9a2b2ca0c5b401b7cccf5af9d310cf7257131d443c77ef3503
-
Filesize
251KB
MD56871e8c345785cc0af7950ea7289c51d
SHA17127a78cef6d5cf2a76d711107da664dc8fc868a
SHA25617384a96ef0f2009a8cbd85001b77ff401a97d0da7eba7557cae7a7e4b492f3a
SHA51200ac0509bbc4eb8ff56942c5cf02c22fe9f1a3405295a19b2e847cb156737b6bb0d783df62d5b61a108ab289aab35359f38f61e82b6f324773fe833a13af952a
-
Filesize
227KB
MD5a8e7ce86249fdf3ddc0d2cca9668238b
SHA12505f7c21183c240d6026bc5e0c1d401ec6bc250
SHA2562ce678b314d2fc218b621460467fb18739112eba2928d73e8c19f4c7cfaa2e68
SHA5125efe328e3ab7db14d238b8aaa6ce0c1cfb8f87dc165ee7ceff216460cdcfc4e3ea181efb3f0946ce44fed4f84996d614a52411862142fefdc5f5703bf1e57bcb
-
Filesize
176KB
MD5211a06e9ae68ced1234252a48696431b
SHA169950e2ee2fafd177d1a295836713bfd8d18df9c
SHA2560bdca9c84103454e329cfde4e69dc41a0ec0196c078c8fc195b0fa739d2f905d
SHA512b1643ba376075619335b4bdf0d7610aece13b7c9db60eecb508465f97ef3e6a9d5297f9ac8529886efa052cdd8814ac7d4eeab44812f797a1b2dc5fa967ee7eb
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91