Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 02:36
Static task
static1
Behavioral task
behavioral1
Sample
8f79c16f1de3e05ee0c368cc72bed63f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f79c16f1de3e05ee0c368cc72bed63f.exe
Resource
win10v2004-20231215-en
General
-
Target
8f79c16f1de3e05ee0c368cc72bed63f.exe
-
Size
1.3MB
-
MD5
8f79c16f1de3e05ee0c368cc72bed63f
-
SHA1
f3698f5230e09c093044e73b655fd69e25b9c3cb
-
SHA256
70d8c9b6b1ca04dfb10ea4cb4a723d0667023cb50f25b9eb1ca9f06bdaad4a07
-
SHA512
7d9053ae99a64fa974a80e7c0652faed3882d4a603aa45c1126cb51d5752c24748aaea67de66075b00c2a71720f18618316065a119a64fa1411109e2acad0bb3
-
SSDEEP
24576:2yrEsfi12+2waRpCZdVyNlQYRbtXcjqlfi1JoCq:FdY2hpCZdJ6bGGfi1
Malware Config
Extracted
redline
maza
185.161.248.73:4164
-
auth_value
474d54c1c2f5291290c53f8378acd684
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral2/memory/5100-38-0x00000000028F0000-0x0000000002908000-memory.dmp healer behavioral2/memory/5100-32-0x0000000002830000-0x000000000284A000-memory.dmp healer behavioral2/memory/5100-40-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral2/memory/5100-56-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral2/memory/5100-66-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral2/memory/5100-64-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral2/memory/5100-62-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral2/memory/5100-60-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral2/memory/5100-58-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral2/memory/5100-54-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral2/memory/5100-52-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral2/memory/5100-50-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral2/memory/5100-48-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral2/memory/5100-46-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral2/memory/5100-44-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral2/memory/5100-42-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral2/memory/5100-39-0x00000000028F0000-0x0000000002902000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a96780884.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a96780884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a96780884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a96780884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a96780884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a96780884.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 4296 i30920317.exe 2032 i14658364.exe 4900 i30992395.exe 5100 a96780884.exe 4404 b98853343.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a96780884.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a96780884.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8f79c16f1de3e05ee0c368cc72bed63f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i30920317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i14658364.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i30992395.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4208 5100 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5100 a96780884.exe 5100 a96780884.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5100 a96780884.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 648 wrote to memory of 4296 648 8f79c16f1de3e05ee0c368cc72bed63f.exe 23 PID 648 wrote to memory of 4296 648 8f79c16f1de3e05ee0c368cc72bed63f.exe 23 PID 648 wrote to memory of 4296 648 8f79c16f1de3e05ee0c368cc72bed63f.exe 23 PID 4296 wrote to memory of 2032 4296 i30920317.exe 25 PID 4296 wrote to memory of 2032 4296 i30920317.exe 25 PID 4296 wrote to memory of 2032 4296 i30920317.exe 25 PID 2032 wrote to memory of 4900 2032 i14658364.exe 30 PID 2032 wrote to memory of 4900 2032 i14658364.exe 30 PID 2032 wrote to memory of 4900 2032 i14658364.exe 30 PID 4900 wrote to memory of 5100 4900 i30992395.exe 29 PID 4900 wrote to memory of 5100 4900 i30992395.exe 29 PID 4900 wrote to memory of 5100 4900 i30992395.exe 29 PID 4900 wrote to memory of 4404 4900 i30992395.exe 106 PID 4900 wrote to memory of 4404 4900 i30992395.exe 106 PID 4900 wrote to memory of 4404 4900 i30992395.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f79c16f1de3e05ee0c368cc72bed63f.exe"C:\Users\Admin\AppData\Local\Temp\8f79c16f1de3e05ee0c368cc72bed63f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i30920317.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i30920317.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i14658364.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i14658364.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i30992395.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i30992395.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b98853343.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b98853343.exe5⤵
- Executes dropped EXE
PID:4404
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a96780884.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a96780884.exe1⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 10602⤵
- Program crash
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5100 -ip 51001⤵PID:4912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD5315e7c8166bfe52d47b6ebb648e98708
SHA1751805988160a3ab01640f37b1e35f9f758c07dd
SHA256d7ebd9920dc2d7b1a2b3998ad6326ae2490c6704398bb3ea547b8e17ceef615b
SHA512b94c13cbc43f7b557febde04639f4076ff5bea91cb6f15b69ef5e631240d2e843ec9220fad7c4d155cf5308543a1004028f9488a260feee12a1539007ed78f6d
-
Filesize
1.1MB
MD5b3017125cdff09570998ce23a096de2f
SHA187139741426fe86f434d8459ed6062839dfe633a
SHA2561c0234c3c003072b88a2593c79930b683a7174b38ad4e50d8a4f37aaa278335f
SHA512d1c81de9ee8122c65e0e23fcf2fd968906cd0a3ef735671045e29ee543606b56491ad44ddbab369e9674531923b6ff4c5eebe997e41839d28e6554c8720d1873
-
Filesize
690KB
MD511915d9f4ef58e565f70a6bbdc67db99
SHA15b2decafa33f6f5092546c0c1a94fa9b9e3a4690
SHA256b261d94a439f483d0e90807d4aa6b5b3f4c2fcf913426a6af533608dcea2a0b2
SHA51274ec465cf459c02d46525d8f4c76f425375e78351fe064657572a53897278960ca2b97d511eb34e4c1797d4cb0d9f2ad65d9e6e52df7cf4a0fa66336fe5c1fd3
-
Filesize
404KB
MD5d5684112dfbf7a1b97594a67920d84b7
SHA101e99d2f789b4b4aeffaa032e00320d1188f61ae
SHA256f9e8ee89546b066488a52354ac63e56fd213bec5ce9837c61a09d7541443ecfa
SHA51210a5c929376fb3754b80a83d106e55830f9f34edaea62258429afd2cf65c2a3892e133a8d3628a103349153ea3f9e278d8cc0571eaf985f56ec4f9afdeb1d694
-
Filesize
344KB
MD5109069a75d958282e002ae6a98dea4b6
SHA1b22f8d8d82df6914e4084ae4670f6fab92079fb6
SHA2567170a3c968b874fd59e2ab44640788c706b5594052113a778cab81faea1ab3bb
SHA5127631179b06e65932a38fe49003d0ed81f7b724078ab9374497e79e2047e3babb2f6b06e0b73ecf698d8a3430a7a301a51d3ecd4e29872ce5d910645323354744
-
Filesize
168KB
MD54deb4613e5d4be8515f2bccf2e7cd9b0
SHA14f1add325f65c821df49b575481f590b4d145848
SHA256bfdbece7dfe1b422723d209274ba5129ac46e45d85fb1b22e9f92764f0ee1e76
SHA5126916b3d22e6ed8132050fc70144f89cdba1d4dba913a14d8370fc66c5e808e199c42f35352ba60c917690d12a0109d6593d290f3f2e1a45933d73c7f7036554b