Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a.exe
Resource
win10v2004-20241007-en
General
-
Target
88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a.exe
-
Size
725KB
-
MD5
67da56205d0a8e12f51be225976acded
-
SHA1
45ba6c4747743711d887fcaa27c6db1a1b6382bd
-
SHA256
88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a
-
SHA512
35086ec73d4b85049813c730609502605585b2244619bc26fde5b9afedd566e416bfe24f9c272a451652df030abedb6634fae2c1715bbd4b85e8357f31c79415
-
SSDEEP
12288:HMroy90kpRDsEPU2P6dY6Ijz6bNcaaYlMvplrd65mN06XYQRWHqyRhqlPblu:PybpRDJPKdvAycLpl0h6XYQ4KyRIXu
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/784-17-0x0000000004980000-0x000000000499A000-memory.dmp healer behavioral1/memory/784-19-0x00000000072A0000-0x00000000072B8000-memory.dmp healer behavioral1/memory/784-28-0x00000000072A0000-0x00000000072B2000-memory.dmp healer behavioral1/memory/784-48-0x00000000072A0000-0x00000000072B2000-memory.dmp healer behavioral1/memory/784-46-0x00000000072A0000-0x00000000072B2000-memory.dmp healer behavioral1/memory/784-44-0x00000000072A0000-0x00000000072B2000-memory.dmp healer behavioral1/memory/784-43-0x00000000072A0000-0x00000000072B2000-memory.dmp healer behavioral1/memory/784-41-0x00000000072A0000-0x00000000072B2000-memory.dmp healer behavioral1/memory/784-38-0x00000000072A0000-0x00000000072B2000-memory.dmp healer behavioral1/memory/784-36-0x00000000072A0000-0x00000000072B2000-memory.dmp healer behavioral1/memory/784-34-0x00000000072A0000-0x00000000072B2000-memory.dmp healer behavioral1/memory/784-32-0x00000000072A0000-0x00000000072B2000-memory.dmp healer behavioral1/memory/784-30-0x00000000072A0000-0x00000000072B2000-memory.dmp healer behavioral1/memory/784-26-0x00000000072A0000-0x00000000072B2000-memory.dmp healer behavioral1/memory/784-24-0x00000000072A0000-0x00000000072B2000-memory.dmp healer behavioral1/memory/784-22-0x00000000072A0000-0x00000000072B2000-memory.dmp healer behavioral1/memory/784-21-0x00000000072A0000-0x00000000072B2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" r2639or.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" r2639or.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" r2639or.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" r2639or.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection r2639or.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" r2639or.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4688-60-0x0000000004AC0000-0x0000000004B04000-memory.dmp family_redline behavioral1/memory/4688-59-0x0000000004A40000-0x0000000004A86000-memory.dmp family_redline behavioral1/memory/4688-61-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-72-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-94-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-92-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-90-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-88-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-86-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-84-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-82-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-80-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-78-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-76-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-70-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-68-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-66-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-64-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-62-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral1/memory/4688-74-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4192 ycKD2869BT.exe 784 r2639or.exe 4688 w49ax49.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features r2639or.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" r2639or.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycKD2869BT.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1736 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2444 784 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ycKD2869BT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r2639or.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w49ax49.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 784 r2639or.exe 784 r2639or.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 784 r2639or.exe Token: SeDebugPrivilege 4688 w49ax49.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4048 wrote to memory of 4192 4048 88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a.exe 83 PID 4048 wrote to memory of 4192 4048 88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a.exe 83 PID 4048 wrote to memory of 4192 4048 88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a.exe 83 PID 4192 wrote to memory of 784 4192 ycKD2869BT.exe 84 PID 4192 wrote to memory of 784 4192 ycKD2869BT.exe 84 PID 4192 wrote to memory of 784 4192 ycKD2869BT.exe 84 PID 4192 wrote to memory of 4688 4192 ycKD2869BT.exe 97 PID 4192 wrote to memory of 4688 4192 ycKD2869BT.exe 97 PID 4192 wrote to memory of 4688 4192 ycKD2869BT.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a.exe"C:\Users\Admin\AppData\Local\Temp\88ce03a3cf62b339e8c4afa5eaa18a6b39259d5c9ad1b61a8be3635684ffd60a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycKD2869BT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycKD2869BT.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2639or.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2639or.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 784 -s 10844⤵
- Program crash
PID:2444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w49ax49.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w49ax49.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 784 -ip 7841⤵PID:4448
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1736
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
581KB
MD5f5daf46a85a1fe38bad80017b3ad6cdc
SHA19bda1bd86fb656bb687cd71a13d4b060d48af892
SHA256fc82c05c7dccdf647f19db1345cff46de885991e2bb5434288e734cf55f8a673
SHA51265a896542789bd492384a97399ee212c664e7f4c85a8fa254739f4049856be2340666828843a5a4860ae5a8bcd103839e3166a5d38f5a1c836b6a310165222f8
-
Filesize
363KB
MD55f9106c1a4ae0150887ac3eadc521f31
SHA1b7c59f033e09829e70ebf380ef9c33aff98d2bf4
SHA256ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411
SHA51280ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3
-
Filesize
391KB
MD5f4a3e231a550fb23f6ae4ca3b665867e
SHA195385ee65c82259f32afa57e615cbd5b6765814c
SHA256b0ee82f1c87220f31eff4098076aad767fd602006b8c661e53a5dc867152a5d0
SHA5126cf614308a733d14fff859a46b5d8d7f082f2c6f7a0314e78be8b0b413efda3a36aa3772514f837192d9a147466197f2f669718341e8fe998840d6f1724ba183