Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564.exe
Resource
win10v2004-20241007-en
General
-
Target
3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564.exe
-
Size
958KB
-
MD5
babc1ebde733835165ecf4cb6809620a
-
SHA1
c82aab97d369320b9f441d73221da0d645dbd84d
-
SHA256
3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564
-
SHA512
856ff460db30a6e72a444d584a175dfa4a3884209d7406352bdf7ec66e52c7d5e3adac321cb521edf65538b76a687570bf8ec7f785f758d7408773e57d999481
-
SSDEEP
24576:ZylPvUkr6Awm98vUUZ9MF4xZaLEuSsbkHJW9:MlPsawm98vtZS4xZaxVbAJW
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/4304-2151-0x0000000005860000-0x000000000586A000-memory.dmp healer behavioral1/files/0x000c000000023b9e-2156.dat healer behavioral1/memory/6388-2164-0x00000000008C0000-0x00000000008CA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/6744-4321-0x0000000005760000-0x0000000005792000-memory.dmp family_redline behavioral1/files/0x000e000000023bae-4326.dat family_redline behavioral1/memory/3316-4328-0x0000000000D70000-0x0000000000DA0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 96220809.exe -
Executes dropped EXE 5 IoCs
pid Process 3320 un286883.exe 4304 96220809.exe 6388 1.exe 6744 rk753461.exe 3316 si994612.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un286883.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 6616 4304 WerFault.exe 84 3736 6744 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un286883.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96220809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk753461.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si994612.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 6388 1.exe 6388 1.exe 6388 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4304 96220809.exe Token: SeDebugPrivilege 6744 rk753461.exe Token: SeDebugPrivilege 6388 1.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2308 wrote to memory of 3320 2308 3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564.exe 83 PID 2308 wrote to memory of 3320 2308 3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564.exe 83 PID 2308 wrote to memory of 3320 2308 3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564.exe 83 PID 3320 wrote to memory of 4304 3320 un286883.exe 84 PID 3320 wrote to memory of 4304 3320 un286883.exe 84 PID 3320 wrote to memory of 4304 3320 un286883.exe 84 PID 4304 wrote to memory of 6388 4304 96220809.exe 88 PID 4304 wrote to memory of 6388 4304 96220809.exe 88 PID 3320 wrote to memory of 6744 3320 un286883.exe 92 PID 3320 wrote to memory of 6744 3320 un286883.exe 92 PID 3320 wrote to memory of 6744 3320 un286883.exe 92 PID 2308 wrote to memory of 3316 2308 3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564.exe 99 PID 2308 wrote to memory of 3316 2308 3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564.exe 99 PID 2308 wrote to memory of 3316 2308 3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564.exe"C:\Users\Admin\AppData\Local\Temp\3ec64d23df85a929a4dbc5aac12d106faa616f05bf0c101d55b847dde1bbb564.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un286883.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un286883.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\96220809.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\96220809.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 13764⤵
- Program crash
PID:6616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk753461.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk753461.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6744 -s 12604⤵
- Program crash
PID:3736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si994612.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si994612.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4304 -ip 43041⤵PID:6568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 6744 -ip 67441⤵PID:1656
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD589553294445096f7753810e4731c7872
SHA19e69f0232fab5a79bf5d3532134b2f8c12155157
SHA2566d4d8155891813d11c89f7c7197e9e8a5c1738ce097dbbe6277b274ff49815a8
SHA51252cf755a404b846c377751ed6942818f1bf940f31d1f268e77b647a9b6e2de6ef503b37f7ef6d4aab160186ea7478c95722676170ebf964ecae6834ef7cfa068
-
Filesize
805KB
MD5f6120b6feec5459ac190c8857bfe5224
SHA11955f2ba7cb7fb08dd5570594ddfdb105e1384f0
SHA2563994ac096cfae3d29efdbab0eb0871d0ade583eee2f4cde97599f8db33cbae48
SHA512da7d15cc67908d3f1250b35795356d3e163339dfced9da70247ee0069b6f60a9175b9f1bc2f5437ede5ba48d52b3e93a72f1bc580f894bd892626d33ee573383
-
Filesize
479KB
MD5e2942ac47305d10ab306f10196e8a602
SHA1affb8533d27d6df79a846cc11559feac809e59a9
SHA25608b14ac4350cb12db468bdbe1654306466205573d8fc54f2bb1c3fd6a23322ec
SHA512769f1c8a4ae999449f7c70212d21974b5a5ed1d7920ac306eb0fa5f6d18f5aea8efeb0f76d50bf40367cb440e6b90b8a65222f204ac0fc265d0f2cd4f9e067d0
-
Filesize
539KB
MD573bcf48aad849659ce3ed63ad2257f3a
SHA197af0cdaa3812786439f028ef0585d1d2f7df741
SHA256deaec4f582369bae16dda0e8e1dec2cabeff916cad8e04f4be7acc3a56c50b07
SHA5122c5b5668f622d249c7a6af35767c7192581d183977670c0c56d658fedf5dc8d1c3b03e14df83dc09ead74cceb36a91b145e69654e9a6778a050b0222a233c899
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91