Analysis
-
max time kernel
115s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:23
Static task
static1
Behavioral task
behavioral1
Sample
98f9a4c64ef1b7a01855e70e78e33359219ec03684aecb52a662e2b418fb4b5f.exe
Resource
win10v2004-20241007-en
General
-
Target
98f9a4c64ef1b7a01855e70e78e33359219ec03684aecb52a662e2b418fb4b5f.exe
-
Size
703KB
-
MD5
0158ba0b74ad14081499f0c20c5746cd
-
SHA1
ebd2e7c9d00f3e5e67300a96e6632d319a4fed74
-
SHA256
98f9a4c64ef1b7a01855e70e78e33359219ec03684aecb52a662e2b418fb4b5f
-
SHA512
d7bb8d3f2d5536b0cad576bf41a5aff819ce11bea10ab633597933a534b3d4db380d9225c3ed9a1ff7205d6c5d85997f018fd8c08ddf503617dd3eaf073e8649
-
SSDEEP
12288:gMrty909eyMoL3NsGPXgUll2/mg/28HWI165b5WpJ5lweMjwM37:9ykeyMoL24RlluO8VIWpXlwbw+7
Malware Config
Extracted
redline
fuma
193.233.20.17:4139
-
auth_value
116ab7335d0316d186d563bd6d41b9dd
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0032000000023b89-19.dat healer behavioral1/memory/3608-22-0x00000000004F0000-0x00000000004FA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection dqb85Zp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dqb85Zp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dqb85Zp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dqb85Zp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dqb85Zp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dqb85Zp.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0031000000023b8a-26.dat family_redline behavioral1/memory/1080-28-0x00000000009F0000-0x0000000000A22000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 2012 nny95VM22.exe 4064 nOU38SQ30.exe 3608 dqb85Zp.exe 1080 eUc47DU.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" dqb85Zp.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nny95VM22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nOU38SQ30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 98f9a4c64ef1b7a01855e70e78e33359219ec03684aecb52a662e2b418fb4b5f.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eUc47DU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98f9a4c64ef1b7a01855e70e78e33359219ec03684aecb52a662e2b418fb4b5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nny95VM22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nOU38SQ30.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3608 dqb85Zp.exe 3608 dqb85Zp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3608 dqb85Zp.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4496 wrote to memory of 2012 4496 98f9a4c64ef1b7a01855e70e78e33359219ec03684aecb52a662e2b418fb4b5f.exe 83 PID 4496 wrote to memory of 2012 4496 98f9a4c64ef1b7a01855e70e78e33359219ec03684aecb52a662e2b418fb4b5f.exe 83 PID 4496 wrote to memory of 2012 4496 98f9a4c64ef1b7a01855e70e78e33359219ec03684aecb52a662e2b418fb4b5f.exe 83 PID 2012 wrote to memory of 4064 2012 nny95VM22.exe 84 PID 2012 wrote to memory of 4064 2012 nny95VM22.exe 84 PID 2012 wrote to memory of 4064 2012 nny95VM22.exe 84 PID 4064 wrote to memory of 3608 4064 nOU38SQ30.exe 86 PID 4064 wrote to memory of 3608 4064 nOU38SQ30.exe 86 PID 4064 wrote to memory of 1080 4064 nOU38SQ30.exe 94 PID 4064 wrote to memory of 1080 4064 nOU38SQ30.exe 94 PID 4064 wrote to memory of 1080 4064 nOU38SQ30.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\98f9a4c64ef1b7a01855e70e78e33359219ec03684aecb52a662e2b418fb4b5f.exe"C:\Users\Admin\AppData\Local\Temp\98f9a4c64ef1b7a01855e70e78e33359219ec03684aecb52a662e2b418fb4b5f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nny95VM22.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nny95VM22.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nOU38SQ30.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nOU38SQ30.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dqb85Zp.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dqb85Zp.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eUc47DU.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eUc47DU.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1080
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346KB
MD5831bad8efcdc3afcb84e614648d4cc7f
SHA192411cc5faca2ebf833a91403c1928badca4f1bf
SHA256c61155d8c81d5e0c47f318ac46c39c4fa9316214b831a6167adb6944e8ca8843
SHA51286b1e9056b752ca045a7b101145fd24bd01e57fe341bf8f192fbe5f210ebb555dfdd231105bf25626855a3a8502b818894eeb3c68515c9fe2dee97439a3a5086
-
Filesize
202KB
MD53f97f148eebd21b677e53d616a26eee8
SHA1452a2966bbdbe4242c36dca07dd15d5100614f6e
SHA256e6bf68a8f678738a0c0aeab56bf3d36a1063b5b2b676340498a842e0ee1171c6
SHA51279a35034311da9e94366bbbbe6b9ca8e59202799d8dbc1e1d29ec53b1d6df6273122dbddcebf10f47dac5f12dfb4fe7a3ccbc7da8732950fe05e81f79f852e8d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
175KB
MD549bcfcdf691f7f064efe833bb548f3ee
SHA15cd584332d71af58865bb1c1b0acd127e8ced7fc
SHA2569c7a3fcd95e07c795991d968f023e251e1b19033acbdeff99a2534ed804b283b
SHA51275f6191c5c4422fee685747c2636b8f38db26e2e3fbb54da78c2b5b16075b9f08bd5a74bac06cd97c32ae3d3ec81f39894a0b51f13f7a7a1b8369125ff007d3c