Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 11:16
Static task
static1
Behavioral task
behavioral1
Sample
27e18e3de04eb8716bed51e9d543605aac1013525375332baf8c56209559d05e.exe
Resource
win10v2004-20241007-en
General
-
Target
27e18e3de04eb8716bed51e9d543605aac1013525375332baf8c56209559d05e.exe
-
Size
724KB
-
MD5
7184a2b8e501b053f7de2927510e466c
-
SHA1
904d5e13e5bc8a81b83d9aeaea78185e12236701
-
SHA256
27e18e3de04eb8716bed51e9d543605aac1013525375332baf8c56209559d05e
-
SHA512
88a9927563b4125ce39a9e2868b436bb470892956697a188503dfe70194759d835bed959d229640e3df617eb298b2533cb663a5aaa8aaf8efdfb68ca4fbfd93f
-
SSDEEP
12288:7Mrpy90I2Fz52fzd2lqoKqAYvx+k9AYgPiZl+kOkZ5tQyTZ:WyF2Vc2VPAYvsk6tSUC/DZ
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b6b-19.dat healer behavioral1/memory/1620-22-0x0000000000D90000-0x0000000000D9A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ihv33sg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection ihv33sg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ihv33sg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ihv33sg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ihv33sg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ihv33sg.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b6c-25.dat family_redline behavioral1/memory/4828-27-0x0000000000F90000-0x0000000000FC2000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4544 sHD93Ne.exe 4528 sBE46Km.exe 1620 ihv33sg.exe 4828 kRC78iz.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" ihv33sg.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sBE46Km.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 27e18e3de04eb8716bed51e9d543605aac1013525375332baf8c56209559d05e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sHD93Ne.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sBE46Km.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kRC78iz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27e18e3de04eb8716bed51e9d543605aac1013525375332baf8c56209559d05e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sHD93Ne.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1620 ihv33sg.exe 1620 ihv33sg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1620 ihv33sg.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1444 wrote to memory of 4544 1444 27e18e3de04eb8716bed51e9d543605aac1013525375332baf8c56209559d05e.exe 83 PID 1444 wrote to memory of 4544 1444 27e18e3de04eb8716bed51e9d543605aac1013525375332baf8c56209559d05e.exe 83 PID 1444 wrote to memory of 4544 1444 27e18e3de04eb8716bed51e9d543605aac1013525375332baf8c56209559d05e.exe 83 PID 4544 wrote to memory of 4528 4544 sHD93Ne.exe 85 PID 4544 wrote to memory of 4528 4544 sHD93Ne.exe 85 PID 4544 wrote to memory of 4528 4544 sHD93Ne.exe 85 PID 4528 wrote to memory of 1620 4528 sBE46Km.exe 86 PID 4528 wrote to memory of 1620 4528 sBE46Km.exe 86 PID 4528 wrote to memory of 4828 4528 sBE46Km.exe 93 PID 4528 wrote to memory of 4828 4528 sBE46Km.exe 93 PID 4528 wrote to memory of 4828 4528 sBE46Km.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\27e18e3de04eb8716bed51e9d543605aac1013525375332baf8c56209559d05e.exe"C:\Users\Admin\AppData\Local\Temp\27e18e3de04eb8716bed51e9d543605aac1013525375332baf8c56209559d05e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sHD93Ne.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sHD93Ne.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sBE46Km.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sBE46Km.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ihv33sg.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ihv33sg.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kRC78iz.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kRC78iz.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4828
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538KB
MD5105f5510f1bb396cb0ca2adf600cf51c
SHA1bf7d7710d8358953641f19b282bdd0c31128ae78
SHA2561e0983af000c13d15632955d93785d22790629c6a6eda971fa5a57629c1d66a2
SHA51239fc9f4c8cd9d97923ca74a2dfc678573641e91ce4485d77eb3bda8badf42f35dc9340df8d3b04880899f9c7dacbbd48e5ab4d88f6bf6d0c2a21ec225b47adae
-
Filesize
202KB
MD5455e93a10d8f7f8791b0f0851b4a5031
SHA1a87d8899c44448d732fe66556fcb10d7ed96cd7a
SHA2569d86d062dd0f530ce5d81d317af20e8edffafe6389c32e3a953b20e2c41a7803
SHA512a981a1db740dba81ce0f96df253b16d849042f91f840de7d82c2cee99411848840230de69ccd211144662ead1dc570fe4b7bbaee857e3b035b80a802cdd105dd
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2