Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
9f266ad7c7e41c242f0dd7b3b8cfb62762fc613848ad52a18c3585b1804f65c8.exe
Resource
win10v2004-20241007-en
General
-
Target
9f266ad7c7e41c242f0dd7b3b8cfb62762fc613848ad52a18c3585b1804f65c8.exe
-
Size
480KB
-
MD5
6fd3bd1d340b98eeff41385a25b70b32
-
SHA1
ce2975ea6e4e0d4d1fe42f41d5aa0acd07abd50e
-
SHA256
9f266ad7c7e41c242f0dd7b3b8cfb62762fc613848ad52a18c3585b1804f65c8
-
SHA512
b0a35bf8763c44fbe26b3539012f3c7284320ab46a5e5c67a10a95176bd8b6b84955d9be4a1b6740bc396e8eb741c93aebfae51f4379a82632e5c2704b2b9c68
-
SSDEEP
6144:KVy+bnr+tp0yN90QEsynlvG69tahkE48At0W850yPn39AYf+rZpa6PC3wBZKe4Ud:HMr9y90vnhfPj50n39A+wOABZKe3d
Malware Config
Extracted
redline
maxud
217.196.96.101:4132
-
auth_value
f1403d964c52b6641ba1ef14803e6e74
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/344-15-0x0000000002150000-0x000000000216A000-memory.dmp healer behavioral1/memory/344-18-0x0000000004F70000-0x0000000004F88000-memory.dmp healer behavioral1/memory/344-24-0x0000000004F70000-0x0000000004F82000-memory.dmp healer behavioral1/memory/344-22-0x0000000004F70000-0x0000000004F82000-memory.dmp healer behavioral1/memory/344-20-0x0000000004F70000-0x0000000004F82000-memory.dmp healer behavioral1/memory/344-19-0x0000000004F70000-0x0000000004F82000-memory.dmp healer behavioral1/memory/344-36-0x0000000004F70000-0x0000000004F82000-memory.dmp healer behavioral1/memory/344-46-0x0000000004F70000-0x0000000004F82000-memory.dmp healer behavioral1/memory/344-44-0x0000000004F70000-0x0000000004F82000-memory.dmp healer behavioral1/memory/344-42-0x0000000004F70000-0x0000000004F82000-memory.dmp healer behavioral1/memory/344-40-0x0000000004F70000-0x0000000004F82000-memory.dmp healer behavioral1/memory/344-38-0x0000000004F70000-0x0000000004F82000-memory.dmp healer behavioral1/memory/344-34-0x0000000004F70000-0x0000000004F82000-memory.dmp healer behavioral1/memory/344-32-0x0000000004F70000-0x0000000004F82000-memory.dmp healer behavioral1/memory/344-30-0x0000000004F70000-0x0000000004F82000-memory.dmp healer behavioral1/memory/344-28-0x0000000004F70000-0x0000000004F82000-memory.dmp healer behavioral1/memory/344-26-0x0000000004F70000-0x0000000004F82000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9096337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9096337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9096337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9096337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9096337.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a9096337.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cb3-54.dat family_redline behavioral1/memory/3936-56-0x0000000000BC0000-0x0000000000BEE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3096 v4683199.exe 344 a9096337.exe 3936 b2028800.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9096337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9096337.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9f266ad7c7e41c242f0dd7b3b8cfb62762fc613848ad52a18c3585b1804f65c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4683199.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2812 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4683199.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9096337.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2028800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f266ad7c7e41c242f0dd7b3b8cfb62762fc613848ad52a18c3585b1804f65c8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 344 a9096337.exe 344 a9096337.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 344 a9096337.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4716 wrote to memory of 3096 4716 9f266ad7c7e41c242f0dd7b3b8cfb62762fc613848ad52a18c3585b1804f65c8.exe 84 PID 4716 wrote to memory of 3096 4716 9f266ad7c7e41c242f0dd7b3b8cfb62762fc613848ad52a18c3585b1804f65c8.exe 84 PID 4716 wrote to memory of 3096 4716 9f266ad7c7e41c242f0dd7b3b8cfb62762fc613848ad52a18c3585b1804f65c8.exe 84 PID 3096 wrote to memory of 344 3096 v4683199.exe 86 PID 3096 wrote to memory of 344 3096 v4683199.exe 86 PID 3096 wrote to memory of 344 3096 v4683199.exe 86 PID 3096 wrote to memory of 3936 3096 v4683199.exe 92 PID 3096 wrote to memory of 3936 3096 v4683199.exe 92 PID 3096 wrote to memory of 3936 3096 v4683199.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f266ad7c7e41c242f0dd7b3b8cfb62762fc613848ad52a18c3585b1804f65c8.exe"C:\Users\Admin\AppData\Local\Temp\9f266ad7c7e41c242f0dd7b3b8cfb62762fc613848ad52a18c3585b1804f65c8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4683199.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4683199.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9096337.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9096337.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:344
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2028800.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2028800.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3936
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2812
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD562c16af8acead219cb2a5ac17f1994fc
SHA1bbf6ba483651ff9b085df5f88dfdccd471e314c2
SHA25684d62a0686b2dd543f88677d0e084e78bfa28f7d21a5fa342999a2120a712dce
SHA51208fc6d16e93cad2c13c599713c43fe0c9798c787d9a487108d8823fb723d8bdbafb7d5ea0ffad1c9a783826c6cefa078b008baa150521ef5b361b5b8ef3351ea
-
Filesize
176KB
MD5b8422267a3c9d33608701e95137fcd18
SHA1ce525c8090f3a9f6b0964095f8b4173d8b39d2d7
SHA256a94be2a5fba382dbd9d8b2302475a62661dcf2193a3c8391fb9c86f36619ae2a
SHA512c3fd4cfab45225003c40a83579a3952f7b4d3fbe138610c87ef251c4708e89c3feb5a78ed1c86842b0309f98851c7ce4644454de0e3af2dcc512cb06fc5e3d44
-
Filesize
168KB
MD5b1210fb13d8046c0e6fc747f5a22ba9e
SHA1ba16138a3fbce473cd8201098963ac5446d7f442
SHA256e15ee440c72e2e0844dc9399884fc7e07740b905b812e3708c71cbbefa4fe761
SHA512afb9e1f4ffebd7787ab5ff516658bc2df6069c062169ed7f5fe9612e13da5dc17d1409bea8d6b6246c8c2258352ef63339f151b85b5cb9c88859206cd71c93dc