Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
2dc6400630c791ee703f29bc4d9f911c3bb8129478e23f36a299e876a38c8ba2.exe
Resource
win10v2004-20241007-en
General
-
Target
2dc6400630c791ee703f29bc4d9f911c3bb8129478e23f36a299e876a38c8ba2.exe
-
Size
480KB
-
MD5
d1d4a5828cf450e8ed46fa95843247e3
-
SHA1
2989a4c21ddf12f4f14833f96bad28e419c0bf92
-
SHA256
2dc6400630c791ee703f29bc4d9f911c3bb8129478e23f36a299e876a38c8ba2
-
SHA512
3f3f5cfa10b596a2db6add31593ffbcaa5a959bf7a3a154d9b0b742f4a38f4aa25e62817b05da3bcecda3f535b5d6636d84573d369ba15628176320a7196c81f
-
SSDEEP
12288:jMrAy90WhY7sD/lGhwcB8AUhYM7UgHbrj+A3:zylK7qwhdB8DXog7d3
Malware Config
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3468-15-0x00000000008F0000-0x000000000090A000-memory.dmp healer behavioral1/memory/3468-18-0x00000000023A0000-0x00000000023B8000-memory.dmp healer behavioral1/memory/3468-43-0x00000000023A0000-0x00000000023B2000-memory.dmp healer behavioral1/memory/3468-47-0x00000000023A0000-0x00000000023B2000-memory.dmp healer behavioral1/memory/3468-45-0x00000000023A0000-0x00000000023B2000-memory.dmp healer behavioral1/memory/3468-41-0x00000000023A0000-0x00000000023B2000-memory.dmp healer behavioral1/memory/3468-39-0x00000000023A0000-0x00000000023B2000-memory.dmp healer behavioral1/memory/3468-37-0x00000000023A0000-0x00000000023B2000-memory.dmp healer behavioral1/memory/3468-33-0x00000000023A0000-0x00000000023B2000-memory.dmp healer behavioral1/memory/3468-31-0x00000000023A0000-0x00000000023B2000-memory.dmp healer behavioral1/memory/3468-29-0x00000000023A0000-0x00000000023B2000-memory.dmp healer behavioral1/memory/3468-27-0x00000000023A0000-0x00000000023B2000-memory.dmp healer behavioral1/memory/3468-25-0x00000000023A0000-0x00000000023B2000-memory.dmp healer behavioral1/memory/3468-23-0x00000000023A0000-0x00000000023B2000-memory.dmp healer behavioral1/memory/3468-21-0x00000000023A0000-0x00000000023B2000-memory.dmp healer behavioral1/memory/3468-20-0x00000000023A0000-0x00000000023B2000-memory.dmp healer behavioral1/memory/3468-35-0x00000000023A0000-0x00000000023B2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9722668.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9722668.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9722668.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9722668.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9722668.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a9722668.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c9b-53.dat family_redline behavioral1/memory/1064-55-0x0000000000E20000-0x0000000000E50000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 688 v1638208.exe 3468 a9722668.exe 1064 b4168969.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9722668.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9722668.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2dc6400630c791ee703f29bc4d9f911c3bb8129478e23f36a299e876a38c8ba2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1638208.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2dc6400630c791ee703f29bc4d9f911c3bb8129478e23f36a299e876a38c8ba2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v1638208.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9722668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4168969.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3468 a9722668.exe 3468 a9722668.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3468 a9722668.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 408 wrote to memory of 688 408 2dc6400630c791ee703f29bc4d9f911c3bb8129478e23f36a299e876a38c8ba2.exe 83 PID 408 wrote to memory of 688 408 2dc6400630c791ee703f29bc4d9f911c3bb8129478e23f36a299e876a38c8ba2.exe 83 PID 408 wrote to memory of 688 408 2dc6400630c791ee703f29bc4d9f911c3bb8129478e23f36a299e876a38c8ba2.exe 83 PID 688 wrote to memory of 3468 688 v1638208.exe 84 PID 688 wrote to memory of 3468 688 v1638208.exe 84 PID 688 wrote to memory of 3468 688 v1638208.exe 84 PID 688 wrote to memory of 1064 688 v1638208.exe 95 PID 688 wrote to memory of 1064 688 v1638208.exe 95 PID 688 wrote to memory of 1064 688 v1638208.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dc6400630c791ee703f29bc4d9f911c3bb8129478e23f36a299e876a38c8ba2.exe"C:\Users\Admin\AppData\Local\Temp\2dc6400630c791ee703f29bc4d9f911c3bb8129478e23f36a299e876a38c8ba2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1638208.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1638208.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9722668.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9722668.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4168969.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4168969.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1064
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD54ef661651bd662e84b6090a61cf5c25e
SHA12a90186163178e63eb5db7fdc660147c0ece56e3
SHA25681b586a7aba73b9be34a8715be7c213029d3d2ba88deb62e24dc9c20142567e7
SHA512002a42521c7d7a799578f95be099814e4468c3698ec584b2f1ca797b1cc7d7141caa22c69c87c18145c1afc3eb4a96d3aa630d93a13982b0c9ab2a96167ba43e
-
Filesize
180KB
MD5d145b86fa1b2be5b7e20492a7895f66d
SHA103419eb46feec6b2977b11142fe5cd1091b5f0ad
SHA25667b9bbd228342e588951b6a6fb3e86974fb9bbb5248b2f0f1e23c829f698f750
SHA51246da6dda722ee97cac92f4386d15ba4ba6eb7e970e6440a21f92ad34ae0b7419141572700892b4fca00faa72bd563d18edddf0665e7f597e25cd8de984a15798
-
Filesize
168KB
MD53b31780b627c8671cf63cfb8647d51ec
SHA1986376db2308926aa6fb725bd8d8f4fb4f58ed0e
SHA2568c71b74c11e5a297ed048305f8f61e773712c8466cefcc649f3b7858f26a98a3
SHA5125d2395be686f681efc1ad324960002a587d1aaf510e5545aca1e72a63ebeef0a56ffbbd88be3ed54d055cbadf8fd524006be278ba4a55795b4866ac3a158a214