Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 08:38
Static task
static1
Behavioral task
behavioral1
Sample
b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71N.exe
Resource
win10v2004-20241007-en
General
-
Target
b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71N.exe
-
Size
473KB
-
MD5
e51225531182c11a62584a3899342020
-
SHA1
326bca9fb80a27585cc510f28154873745f12e38
-
SHA256
b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71
-
SHA512
0b6860b6b352daecc7f81677c9cf739472439a6e736d20bad16a3de25a6b72ca319cd71673bb31e80b020204d4798401aa3b33378e7750f7e5e9a291fed0a15e
-
SSDEEP
12288:/MrMy90BjEe45JUFUBIJGB+vs5nwgos/XmoyR5u:ry8jEe45JUFCcGB+vs5nNo2Gu
Malware Config
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b8f-19.dat healer behavioral1/memory/1356-22-0x0000000000C60000-0x0000000000C6A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g5693974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g5693974.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g5693974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g5693974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g5693974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g5693974.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b90-26.dat family_redline behavioral1/memory/760-28-0x0000000000A70000-0x0000000000AA0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 2148 x5235607.exe 428 x7588907.exe 1356 g5693974.exe 760 i1478562.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g5693974.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5235607.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7588907.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71N.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5052 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x5235607.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x7588907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i1478562.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1356 g5693974.exe 1356 g5693974.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1356 g5693974.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4736 wrote to memory of 2148 4736 b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71N.exe 84 PID 4736 wrote to memory of 2148 4736 b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71N.exe 84 PID 4736 wrote to memory of 2148 4736 b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71N.exe 84 PID 2148 wrote to memory of 428 2148 x5235607.exe 85 PID 2148 wrote to memory of 428 2148 x5235607.exe 85 PID 2148 wrote to memory of 428 2148 x5235607.exe 85 PID 428 wrote to memory of 1356 428 x7588907.exe 86 PID 428 wrote to memory of 1356 428 x7588907.exe 86 PID 428 wrote to memory of 760 428 x7588907.exe 95 PID 428 wrote to memory of 760 428 x7588907.exe 95 PID 428 wrote to memory of 760 428 x7588907.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71N.exe"C:\Users\Admin\AppData\Local\Temp\b95b987d296dc7dab581d99b7c28b882bbd077c00385eb5b7f5fec8d1d8d9d71N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5235607.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5235607.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7588907.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7588907.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5693974.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5693974.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1478562.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1478562.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:760
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5052
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371KB
MD5e41600003f1d3b36a23d3b8a4fb6d8bd
SHA1d14d82b5d256036fd6bdcca98961389a048193ad
SHA2567db6fdadb651c3eefd8290e569a7efd0fe7d50fd826ea9418136e148991f52b5
SHA512790196ddc5a9a3a8dbc736a30314d455201614fce0d0910546671d34a9e6868c8e92d46f3ec57dfd9c65472e0d26af758d3ebb9d8a654c15785fc96d367c175c
-
Filesize
206KB
MD5bf2b84b09ebe03c1a0254c0ba14e3257
SHA1aacc029a047df22e9a9a93f7eb21f443dcad5e78
SHA2562b7305f5a327d04f13df7af7216898420f95c9785be635927afe5093ea056a4f
SHA512aeff0d9fbf23f9f0c523ac45ffde512a4d55b134acf4ec4d07b3d406e4634297d34264154e147534ea05bdced0313f9f0d584447c01071c8edbf47e8c5f9b69a
-
Filesize
12KB
MD54ecf3ff73df3eb539eb28b55fd929abb
SHA1dee98e1d25c1e39592af927080765883f52d07e0
SHA2569d24845dbcd9355edc93e2f98f9ed46a4452b3e40e0fec9370afa51e1397d53d
SHA5124a9198b97b97ec058cf776f3a62eaf71e4a1fc5b7d55d8c33663467d471f20f1bd561b5c33799afddbb906de1575e69768f4e14b3f64ab5b02dcc2c278b27c53
-
Filesize
176KB
MD52f0faa047b3462e4e59e12de60a11797
SHA12baffe8a2900d9150785b761fb4189e59a9d686d
SHA256fad49c1daeecd9880c1e42ef462f8d90223d6689f380232b7c8822a942681ba8
SHA512db9fd56d1a780c55ee52bcc6df54c0cde26c95a0575e9602ef60755185eeb5bffd78d464c82c3b6988b22aba306db199d2158456e3293a94275a6fefac264a36