Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:57
Static task
static1
Behavioral task
behavioral1
Sample
366e4ba8c0342b0301add57564192753582311b3d08eb7ef561431bcccd90575.exe
Resource
win10v2004-20241007-en
General
-
Target
366e4ba8c0342b0301add57564192753582311b3d08eb7ef561431bcccd90575.exe
-
Size
479KB
-
MD5
ef486ccc6db5f323638a22f5d3e09de1
-
SHA1
06da0362843e45ebf70596a08b97589e10269bb0
-
SHA256
366e4ba8c0342b0301add57564192753582311b3d08eb7ef561431bcccd90575
-
SHA512
d4b1111aca558b7d958693ddea16133e4b47afa97ee85347a0502b34e85b045c11a6f6ddcdc354d159e5c4e71bc7733143adc824be0442a24e2a7015dae75045
-
SSDEEP
12288:uMrpy90dk57lIqw2Qvd3rKvnG77eSYuQzBD1kT:3ybzwXv5A5DB5M
Malware Config
Extracted
redline
mufos
217.196.96.102:4132
-
auth_value
136f202e6569ad5815c34377858a255c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4936-15-0x0000000002140000-0x000000000215A000-memory.dmp healer behavioral1/memory/4936-17-0x0000000002540000-0x0000000002558000-memory.dmp healer behavioral1/memory/4936-34-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4936-26-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4936-46-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4936-44-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4936-42-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4936-40-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4936-38-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4936-36-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4936-22-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4936-20-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4936-19-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4936-32-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4936-30-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4936-28-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4936-24-0x0000000002540000-0x0000000002552000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2715721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2715721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2715721.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a2715721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2715721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2715721.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b62-54.dat family_redline behavioral1/memory/3604-56-0x0000000000D60000-0x0000000000D8E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1320 v8388898.exe 4936 a2715721.exe 3604 b6503885.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2715721.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2715721.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 366e4ba8c0342b0301add57564192753582311b3d08eb7ef561431bcccd90575.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8388898.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2715721.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6503885.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 366e4ba8c0342b0301add57564192753582311b3d08eb7ef561431bcccd90575.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8388898.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4936 a2715721.exe 4936 a2715721.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4936 a2715721.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2476 wrote to memory of 1320 2476 366e4ba8c0342b0301add57564192753582311b3d08eb7ef561431bcccd90575.exe 84 PID 2476 wrote to memory of 1320 2476 366e4ba8c0342b0301add57564192753582311b3d08eb7ef561431bcccd90575.exe 84 PID 2476 wrote to memory of 1320 2476 366e4ba8c0342b0301add57564192753582311b3d08eb7ef561431bcccd90575.exe 84 PID 1320 wrote to memory of 4936 1320 v8388898.exe 85 PID 1320 wrote to memory of 4936 1320 v8388898.exe 85 PID 1320 wrote to memory of 4936 1320 v8388898.exe 85 PID 1320 wrote to memory of 3604 1320 v8388898.exe 94 PID 1320 wrote to memory of 3604 1320 v8388898.exe 94 PID 1320 wrote to memory of 3604 1320 v8388898.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\366e4ba8c0342b0301add57564192753582311b3d08eb7ef561431bcccd90575.exe"C:\Users\Admin\AppData\Local\Temp\366e4ba8c0342b0301add57564192753582311b3d08eb7ef561431bcccd90575.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8388898.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8388898.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2715721.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2715721.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6503885.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6503885.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3604
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5bce5d734a57f984aef7a56a7f725ff03
SHA1afe3b017c7195c999ca32d9d7eb0f970e821691a
SHA2563d836046b5e08543e5f19474ac371559401f9cfbd930b25efe9c9e79fcb1da60
SHA51241e788d045ce2fb352824eefea5f08c0c6fe5ee28474088edb317ec3cb96d9e467b9b19af53ba86b5f05fb8bc82ae9d6f5de90e84ca8981f789bb39422d24c43
-
Filesize
182KB
MD5c36e89a40241202e0eb87fe36dd96ba3
SHA1d62cd1842a3d80ee3dd2e5f78d407831c462c925
SHA2564bdfb8216ea0655b3ac87c13408f7b143f91ffecdb267c2eccd117bc8681f6a6
SHA5125a7f2499ae6d4a2707afcb85fa3c43d9d134acc2f7dabc680cca6aa83f45afa283aa00d67f45f09160aa4b3cc40671e30e520e07a7624c6030bfb7bc784a481f
-
Filesize
168KB
MD535900c6d6b083730d55b281ce2549080
SHA12c4017ac2937d3834d7bdb663115abb16d69aa52
SHA2562873631074bbda5b79042db900d6cc0f3710eedaed9caf6bdb2dba5947e8476b
SHA5129001d98a7cad30de8bf332ed3a5f3986bff722de269c8d568ab555e3ff68adf1d07ceaeb8018d58b7176a98af9e86a1c1b2af72447d2718be644a729e13b4a5b