Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
b3fd93cdbb22498647bba224764a189c19d0d3226b63347e2fc10f7f8994facc.exe
Resource
win10v2004-20241007-en
General
-
Target
b3fd93cdbb22498647bba224764a189c19d0d3226b63347e2fc10f7f8994facc.exe
-
Size
992KB
-
MD5
cedd2a204e4f2b1d19882d8800bad11b
-
SHA1
215e0d5275d567f4c1599364f6e5f5ab0e726cc8
-
SHA256
b3fd93cdbb22498647bba224764a189c19d0d3226b63347e2fc10f7f8994facc
-
SHA512
383374e1864e6008a0945afb5ba1c2b45240efd0f3e476416ad7a7fef8cac2eccf8d1017cff94aeb44b38fb365231b2e979cb3d59612c37b91f3be7d74b055dc
-
SSDEEP
24576:9yUtvrjcPD0GbgWSAg+Feg7Q+Yu2KsxUnWht0l:YUtTjcPDyWSAgKegbvLPWha
Malware Config
Extracted
redline
mixer
185.161.248.75:4132
-
auth_value
3668eba4f0cb1021a9e9ed55e76ed85e
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/2900-22-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c7e-26.dat family_redline behavioral1/memory/4128-29-0x00000000001C0000-0x00000000001EA000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 2896 v3148335.exe 4912 v6825576.exe 3132 a9265009.exe 2900 a9265009.exe 4128 b8900180.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b3fd93cdbb22498647bba224764a189c19d0d3226b63347e2fc10f7f8994facc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3148335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6825576.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3132 set thread context of 2900 3132 a9265009.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3fd93cdbb22498647bba224764a189c19d0d3226b63347e2fc10f7f8994facc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3148335.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6825576.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9265009.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9265009.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8900180.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2900 a9265009.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3132 a9265009.exe Token: SeDebugPrivilege 2900 a9265009.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3812 wrote to memory of 2896 3812 b3fd93cdbb22498647bba224764a189c19d0d3226b63347e2fc10f7f8994facc.exe 83 PID 3812 wrote to memory of 2896 3812 b3fd93cdbb22498647bba224764a189c19d0d3226b63347e2fc10f7f8994facc.exe 83 PID 3812 wrote to memory of 2896 3812 b3fd93cdbb22498647bba224764a189c19d0d3226b63347e2fc10f7f8994facc.exe 83 PID 2896 wrote to memory of 4912 2896 v3148335.exe 84 PID 2896 wrote to memory of 4912 2896 v3148335.exe 84 PID 2896 wrote to memory of 4912 2896 v3148335.exe 84 PID 4912 wrote to memory of 3132 4912 v6825576.exe 86 PID 4912 wrote to memory of 3132 4912 v6825576.exe 86 PID 4912 wrote to memory of 3132 4912 v6825576.exe 86 PID 3132 wrote to memory of 2900 3132 a9265009.exe 89 PID 3132 wrote to memory of 2900 3132 a9265009.exe 89 PID 3132 wrote to memory of 2900 3132 a9265009.exe 89 PID 3132 wrote to memory of 2900 3132 a9265009.exe 89 PID 3132 wrote to memory of 2900 3132 a9265009.exe 89 PID 3132 wrote to memory of 2900 3132 a9265009.exe 89 PID 3132 wrote to memory of 2900 3132 a9265009.exe 89 PID 3132 wrote to memory of 2900 3132 a9265009.exe 89 PID 4912 wrote to memory of 4128 4912 v6825576.exe 91 PID 4912 wrote to memory of 4128 4912 v6825576.exe 91 PID 4912 wrote to memory of 4128 4912 v6825576.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3fd93cdbb22498647bba224764a189c19d0d3226b63347e2fc10f7f8994facc.exe"C:\Users\Admin\AppData\Local\Temp\b3fd93cdbb22498647bba224764a189c19d0d3226b63347e2fc10f7f8994facc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3148335.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3148335.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6825576.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6825576.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9265009.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9265009.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9265009.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9265009.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8900180.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8900180.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4128
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
595KB
MD5332efb31b4dda22e8c2b788da9a39983
SHA1bdaa47ef3e8afbc1f4bfd0b2b67dd17d9a751552
SHA2563b524c101dfd6cb9b0c0e11b4a580d6b9591806b28b7f100ea0642bbb14aa1d8
SHA5120b0c3e16ab5a9fb8b6cd505985e597da41bc0cf18a053e6f4e1aa2b53b1dfbb231ece363a88e3bfa3af3f3ca39283ba5070da5f7c3f4554d260503b39da1edd3
-
Filesize
424KB
MD5f12f4dbd69d03fe68b8df52f616ff5fd
SHA16f9727f6f0d3fb90d55a69f7aa446c8373720fe3
SHA256437c3eb5372e15b3cfbdd677cc83f3cf855974b531486db7070c005adf80eac0
SHA5120dbe8016dd696464efdd924fe163ae118bf996a8509e124770e298fd9a4e96d0a0581afda51f424d065524402ee1b9ebbc16e1bb849c3dd37e4e53fd0195bcdc
-
Filesize
769KB
MD5a363ae17ecfeb7945f5e02e2ce05035f
SHA150cb18976135aaa05d30229f6ad8f3a931a351aa
SHA256118af2345d42c51b477cb4c5a359cda3c547ec08a8907204ec13ac47e59033ba
SHA512533aa7ca169bca67d6f40b7388c99318cc403a1f6e966ebde770c2a7e2c9d5272a9786f5064252358aea787396dfe0deea469399acfaed81672b20bd97b0fd3f
-
Filesize
145KB
MD5abe63bd0857d5838286f9b65e71ac072
SHA12db9f71c6e2d17c4ad202d074e825c7db6902efa
SHA2562315963f313588ab5b74471ee8448478005a68083614320cfe4c12632c5ff9fc
SHA51264561f906cdd7758c777130080d57607e964649ad721bea9aa93e2dbbf8e150f3fd4e2bcbdd1da27ff64415acb838e967c9f64edb1b3aaa087d63378a483a2c6