Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 07:00
Static task
static1
Behavioral task
behavioral1
Sample
14954d7913fbbc93d23ad4d69e2db764f80a9fec6583ce5e2636e7598e989517.exe
Resource
win10v2004-20241007-en
General
-
Target
14954d7913fbbc93d23ad4d69e2db764f80a9fec6583ce5e2636e7598e989517.exe
-
Size
717KB
-
MD5
38a149ae6fe35ca4eb601acadcaa07b2
-
SHA1
892438daa31ea7a3765d0270216d088bc33cdde1
-
SHA256
14954d7913fbbc93d23ad4d69e2db764f80a9fec6583ce5e2636e7598e989517
-
SHA512
6ee485ffbcd9139eedbc007b02a95edd3b1c66a6615d3065af73fb8745a4004e381e3bac8001af418bc97e8e15b0a1d64ad6bb3fb4deb383c3e11d0771a1952c
-
SSDEEP
12288:ZMrYy90Fqgm065GKVMcWbRZvIGziENb1xaeZOJ4TY4mT1tl5sFK3wNoAGr:5yFgm065ob6GziEVaeZO+TVIluI3wNoN
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cc7-19.dat healer behavioral1/memory/1956-22-0x0000000000060000-0x000000000006A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iUS24Cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iUS24Cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iUS24Cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iUS24Cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iUS24Cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iUS24Cf.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cc8-25.dat family_redline behavioral1/memory/4932-27-0x0000000000660000-0x0000000000692000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 1964 sgC67Om.exe 4144 sTB40aJ.exe 1956 iUS24Cf.exe 4932 kXK41XP.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iUS24Cf.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14954d7913fbbc93d23ad4d69e2db764f80a9fec6583ce5e2636e7598e989517.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sgC67Om.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sTB40aJ.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14954d7913fbbc93d23ad4d69e2db764f80a9fec6583ce5e2636e7598e989517.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sgC67Om.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sTB40aJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kXK41XP.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1956 iUS24Cf.exe 1956 iUS24Cf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1956 iUS24Cf.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3528 wrote to memory of 1964 3528 14954d7913fbbc93d23ad4d69e2db764f80a9fec6583ce5e2636e7598e989517.exe 85 PID 3528 wrote to memory of 1964 3528 14954d7913fbbc93d23ad4d69e2db764f80a9fec6583ce5e2636e7598e989517.exe 85 PID 3528 wrote to memory of 1964 3528 14954d7913fbbc93d23ad4d69e2db764f80a9fec6583ce5e2636e7598e989517.exe 85 PID 1964 wrote to memory of 4144 1964 sgC67Om.exe 86 PID 1964 wrote to memory of 4144 1964 sgC67Om.exe 86 PID 1964 wrote to memory of 4144 1964 sgC67Om.exe 86 PID 4144 wrote to memory of 1956 4144 sTB40aJ.exe 87 PID 4144 wrote to memory of 1956 4144 sTB40aJ.exe 87 PID 4144 wrote to memory of 4932 4144 sTB40aJ.exe 97 PID 4144 wrote to memory of 4932 4144 sTB40aJ.exe 97 PID 4144 wrote to memory of 4932 4144 sTB40aJ.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\14954d7913fbbc93d23ad4d69e2db764f80a9fec6583ce5e2636e7598e989517.exe"C:\Users\Admin\AppData\Local\Temp\14954d7913fbbc93d23ad4d69e2db764f80a9fec6583ce5e2636e7598e989517.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sgC67Om.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sgC67Om.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sTB40aJ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sTB40aJ.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iUS24Cf.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\iUS24Cf.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kXK41XP.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kXK41XP.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4932
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
530KB
MD5ab82dfd96ce6b5276cf26bb178a194dc
SHA16d4d7c756ca0a38e2c5a913139ca4d1c150251a3
SHA25681b6ea91e3b8247c649b677fbd6280fb218b82809720c680be3550570b1a69ec
SHA512ab2e54c9a583d1d5c9af4925cc188de648c7d5af9c686ce7ba2455d0da281802157fa5b5b8a27029254ef955cde9a3459a8e8ec99891a9fc4eb1c0be6a97ed7e
-
Filesize
202KB
MD5f7580079f31fc8bdf06085992c11ea2b
SHA1e4156977975a38ab7b13fa4f42cc46d90a546998
SHA256ef38d0a577851c0f510d141c3ef40d3d34243b5da81bebf9f45dc969f2fda637
SHA5127f742eeee9b1d26fa651e9f5272df67013616dd2e3bf8cb1eb0e47208c3aa3108e6384d5d451f062c4ec1cb1e4828d653693f05ad8da264e6260133517faf1ed
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2