Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 00:41
Static task
static1
Behavioral task
behavioral1
Sample
7b51faf26c52be0444722e851951c1619a3745f910f21a73bf1c92dcbc925355.exe
Resource
win10v2004-20241007-en
General
-
Target
7b51faf26c52be0444722e851951c1619a3745f910f21a73bf1c92dcbc925355.exe
-
Size
726KB
-
MD5
20c38f9d772d0b9aaba4488d11805a3f
-
SHA1
a471a8747c4b13f707ad01413fe6cd67d71c3dd8
-
SHA256
7b51faf26c52be0444722e851951c1619a3745f910f21a73bf1c92dcbc925355
-
SHA512
222c65a85f5976da0e0e521dc12a22a5c2d14c2e30fe892007fb02580d033fcf935b96c53f2d5a4b23dd9d1edb52fd45a0e7631dcab1f3185df0de4a737c68bc
-
SSDEEP
12288:xMrQy90ZAjseJ4NHXvvyX3RyQfdmaW57WoIw94r+eJBojqkEvU1BB7dURHBNYqH3:VytseqsffY7WoIw8tcEvIBB+RHTHC5u
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000c000000023b61-19.dat healer behavioral1/memory/4196-22-0x0000000000740000-0x000000000074A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iPq24NT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iPq24NT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iPq24NT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iPq24NT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iPq24NT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iPq24NT.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b63-25.dat family_redline behavioral1/memory/4644-28-0x0000000000D00000-0x0000000000D32000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 1616 sTA33cZ.exe 4652 sSd46zl.exe 4196 iPq24NT.exe 4644 kKK82oT.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iPq24NT.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7b51faf26c52be0444722e851951c1619a3745f910f21a73bf1c92dcbc925355.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sTA33cZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sSd46zl.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kKK82oT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b51faf26c52be0444722e851951c1619a3745f910f21a73bf1c92dcbc925355.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sTA33cZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sSd46zl.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4196 iPq24NT.exe 4196 iPq24NT.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4196 iPq24NT.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1616 3056 7b51faf26c52be0444722e851951c1619a3745f910f21a73bf1c92dcbc925355.exe 86 PID 3056 wrote to memory of 1616 3056 7b51faf26c52be0444722e851951c1619a3745f910f21a73bf1c92dcbc925355.exe 86 PID 3056 wrote to memory of 1616 3056 7b51faf26c52be0444722e851951c1619a3745f910f21a73bf1c92dcbc925355.exe 86 PID 1616 wrote to memory of 4652 1616 sTA33cZ.exe 87 PID 1616 wrote to memory of 4652 1616 sTA33cZ.exe 87 PID 1616 wrote to memory of 4652 1616 sTA33cZ.exe 87 PID 4652 wrote to memory of 4196 4652 sSd46zl.exe 88 PID 4652 wrote to memory of 4196 4652 sSd46zl.exe 88 PID 4652 wrote to memory of 4644 4652 sSd46zl.exe 94 PID 4652 wrote to memory of 4644 4652 sSd46zl.exe 94 PID 4652 wrote to memory of 4644 4652 sSd46zl.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b51faf26c52be0444722e851951c1619a3745f910f21a73bf1c92dcbc925355.exe"C:\Users\Admin\AppData\Local\Temp\7b51faf26c52be0444722e851951c1619a3745f910f21a73bf1c92dcbc925355.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sTA33cZ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sTA33cZ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sSd46zl.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sSd46zl.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iPq24NT.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iPq24NT.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kKK82oT.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kKK82oT.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4644
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539KB
MD50087e2c7812cdea5d173cb7f28b2f7c7
SHA18895ca74b9bda0832adb884e76ed48eeda651929
SHA256c292a7353013d4a1c77c6bb937d7150d30338d297faedbe9a4ab9cc2de851cb3
SHA512fe15bb0f3290339450b4be9455ee2b2521ae4a71650997e78ec71471f83485941d30c12735afd5ae14d155bf011724cc26271a0cd286edde0028bd7668f364fe
-
Filesize
202KB
MD5a7972f4c09af7356641faa69f97c85b0
SHA1876aab27555c4ad64a81be490f7e96bcb95842d1
SHA256b80e6c783dda5433aeb494c94966f86dd4360c5c1f73648fa8a3d060e89d1a0a
SHA512b4b59bb10a65a31f4f1b3ecc644d565def83ba7bcd95131427875be1b3f8d2b7b48142ea2ba18b38a45ca10d42493780d1ab190dbf3d9c5ba639cd4532d078de
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2