Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
2dd90e0d6050f73f9c95ea8236a9d4d83ce71108964c260e3a1195e8db2a54c6.exe
Resource
win10v2004-20241007-en
General
-
Target
2dd90e0d6050f73f9c95ea8236a9d4d83ce71108964c260e3a1195e8db2a54c6.exe
-
Size
346KB
-
MD5
6f0085115ccf4fda77f4ba227986556c
-
SHA1
54374b9f9a8273fe0c41d8872da00bc9d4912bb9
-
SHA256
2dd90e0d6050f73f9c95ea8236a9d4d83ce71108964c260e3a1195e8db2a54c6
-
SHA512
ecf1851fa72e4f5fd760696a66f2a45981e60ce09f9125955e2fe1d50a38c9a26e26cc2d8c048a69869fe1ba63ff4c80e62ab049790da7c8d34f930655084e9c
-
SSDEEP
6144:KQy+bnr+jp0yN90QE1MGVZ8F/1XUkajrUJeioGIIWDUIKLw7NePX:oMrLy90wGg/mkdn7IIuUIK07Y
Malware Config
Extracted
redline
dubla
193.233.20.17:4139
-
auth_value
c947a644b3fc57a1b3a1de810d9d8239
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca8-12.dat healer behavioral1/memory/2792-15-0x0000000000D40000-0x0000000000D4A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection kJV07uA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" kJV07uA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" kJV07uA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" kJV07uA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" kJV07uA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" kJV07uA.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023ca9-19.dat family_redline behavioral1/memory/3400-21-0x0000000000410000-0x0000000000442000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1696 dIx1811.exe 2792 kJV07uA.exe 3400 nxC26YW.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" kJV07uA.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dIx1811.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2dd90e0d6050f73f9c95ea8236a9d4d83ce71108964c260e3a1195e8db2a54c6.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2dd90e0d6050f73f9c95ea8236a9d4d83ce71108964c260e3a1195e8db2a54c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dIx1811.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxC26YW.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2792 kJV07uA.exe 2792 kJV07uA.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2792 kJV07uA.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1696 2332 2dd90e0d6050f73f9c95ea8236a9d4d83ce71108964c260e3a1195e8db2a54c6.exe 83 PID 2332 wrote to memory of 1696 2332 2dd90e0d6050f73f9c95ea8236a9d4d83ce71108964c260e3a1195e8db2a54c6.exe 83 PID 2332 wrote to memory of 1696 2332 2dd90e0d6050f73f9c95ea8236a9d4d83ce71108964c260e3a1195e8db2a54c6.exe 83 PID 1696 wrote to memory of 2792 1696 dIx1811.exe 84 PID 1696 wrote to memory of 2792 1696 dIx1811.exe 84 PID 1696 wrote to memory of 3400 1696 dIx1811.exe 96 PID 1696 wrote to memory of 3400 1696 dIx1811.exe 96 PID 1696 wrote to memory of 3400 1696 dIx1811.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dd90e0d6050f73f9c95ea8236a9d4d83ce71108964c260e3a1195e8db2a54c6.exe"C:\Users\Admin\AppData\Local\Temp\2dd90e0d6050f73f9c95ea8236a9d4d83ce71108964c260e3a1195e8db2a54c6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dIx1811.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dIx1811.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kJV07uA.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kJV07uA.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nxC26YW.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nxC26YW.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3400
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD55f1886dd02b5af6d88294e6129d10be2
SHA193fb0e537b924a62d523404bcc940c3171a7cb90
SHA256c76ffcb9d23091a7ca8ca6e867555c1a824a8f44fde15e57fabe06733e5272d8
SHA51212e9e94f356fefbe371c41aede0d35e4024c7f8b6bc975c30996c1099467124f095ab0664d816e78543edf76232488d27206746b061a7bebba41e14bd2c9de02
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD53e279746c7e9f38cf3ed1080d1fb6351
SHA1a28d5f4e362051fff61448725088ed0ef2664c4a
SHA256f39bdc423133d37186ba4eaf1f6da21c375a2b84ae1da4f9e91afc3dd0b04683
SHA51227d1dc4d57320115f440025715f3901ae1d7050569e6ac37f2e06c1c21472407426e3ec5f425ae588862f2de947932caa8c41c658114fafc9e0ef830392ce9de