Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 14:42
Static task
static1
General
-
Target
bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387.exe
-
Size
373KB
-
MD5
54d2dcca449229bc210b853b0a52bdc5
-
SHA1
07b9e5e210c362612268757ea4b640a1120ede24
-
SHA256
bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387
-
SHA512
17b401edb54f5524630e9a5957b7b4141ed6638a9f1051be3d08e7b568e40a61f520280023ea2ef2aac2233858946ad47107fcc5e010800f13e16e48fa5faa8c
-
SSDEEP
6144:KJy+bnr+1p0yN90QEvuWi9trCxH4MTtIg/kDKb1CXnlH6ThA03uS1QUrT:7MrJy90INuYO5jAl+A031D
Malware Config
Extracted
redline
rwan
77.91.124.73:19071
-
auth_value
7c40eda5da4f888d6f61befbf947d9fe
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x000a000000023b9b-19.dat mystic_family -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b9a-13.dat healer behavioral1/memory/2248-15-0x0000000000180000-0x000000000018A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2661148.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a2661148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2661148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2661148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2661148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2661148.exe -
Mystic family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b97-22.dat family_redline behavioral1/memory/4672-24-0x0000000000890000-0x00000000008C0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 3676 v4917258.exe 2248 a2661148.exe 3712 b3848126.exe 4672 c5579974.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a2661148.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4917258.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4917258.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3848126.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5579974.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2248 a2661148.exe 2248 a2661148.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2248 a2661148.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4452 wrote to memory of 3676 4452 bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387.exe 85 PID 4452 wrote to memory of 3676 4452 bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387.exe 85 PID 4452 wrote to memory of 3676 4452 bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387.exe 85 PID 3676 wrote to memory of 2248 3676 v4917258.exe 86 PID 3676 wrote to memory of 2248 3676 v4917258.exe 86 PID 3676 wrote to memory of 3712 3676 v4917258.exe 94 PID 3676 wrote to memory of 3712 3676 v4917258.exe 94 PID 3676 wrote to memory of 3712 3676 v4917258.exe 94 PID 4452 wrote to memory of 4672 4452 bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387.exe 95 PID 4452 wrote to memory of 4672 4452 bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387.exe 95 PID 4452 wrote to memory of 4672 4452 bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387.exe"C:\Users\Admin\AppData\Local\Temp\bc13fcc751c4f254fa91951804fe7dce4429b9a1e8bc51f4d102ff5b33bf2387.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4917258.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4917258.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2661148.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2661148.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3848126.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3848126.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3712
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c5579974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c5579974.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4672
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD5659a82c498a17b151c9402ac467be7b8
SHA1d4ccd301a7530046a3066b5f4a2fc6a24fa50fa7
SHA2561cc4200ca39f891a36c3c98eda4aac27104e13431b040a0cad0cdf1b1660fc26
SHA512eae26efa78b1612e7b1686cb927ad54a31342ebcafc6ccaffd2184c6a07a217df7e7b004fb8993ab7fd142770165ec0f2bbbbcc0e817b2e2eb84c7ead549bc64
-
Filesize
216KB
MD5833732216d23886a618f95677f2bc239
SHA13b360149cbe355483400d23f58aa8db5165d235a
SHA256f610676df40977d3f777d5c1bbbac665f0d7810066bd6ba341c4e7655cc8c3bc
SHA512dca025ea2278f60a1b2d9361f029965c0f91328b50875784aafb7ff0a20fbe71970502fd206052b03e1f11cae87ae91c5d3cb8dc3cea2e75e245515a244f2514
-
Filesize
12KB
MD5af906d63692273262ae398e18361ce58
SHA1cde7844d6a3f79e546dc34667e4b4486815ec0e6
SHA25655fe927d001779f2c8fc74b953902586c384c0df07f102d6f00ecb15dc0e998d
SHA5129b1fe61b231e98ea7f40f8b83c80460563f8d57c9577ecfd14f6bd1c7b8922108de284f8f4732bf9560e8c7bec429f9458ae79dfe77a2830d07cf401c21976b5
-
Filesize
140KB
MD5a29845dcf0e02c8b1e3bb06fbde3cda2
SHA14ab2285f1ff8229f94bde577744664a3f63b88ee
SHA2563b4230e32b3f96f7578f321b79e07932f373e4d73f94cfe4e21059a5ad00b39d
SHA512d0d8bb33eba94f54c04d122ef7f2d523f2c7cbbc7902d15c479e34aedb3175f2015361417d6673b804a47166968d32264f15faba5790e11ea3d138c21b709871