Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
544cac447bcbfb99ea5db2311460a6122c3bbec6ad8d72d7ad924dda784e883a.exe
Resource
win10v2004-20241007-en
General
-
Target
544cac447bcbfb99ea5db2311460a6122c3bbec6ad8d72d7ad924dda784e883a.exe
-
Size
562KB
-
MD5
b81a4d6e8d457700a369c975f3b20dc5
-
SHA1
c9d469089a8a1822896ff5fe0001248f855bcf59
-
SHA256
544cac447bcbfb99ea5db2311460a6122c3bbec6ad8d72d7ad924dda784e883a
-
SHA512
b27551f8bb4d2ed0176b2d77dd432037988dea6727de35297f0209569e3960a65d267917b3172a451af9e48c9a7580f22fa42f83fb10c97a736959d19ab5ed71
-
SSDEEP
12288:6y90aCYWaFtJc75dgIikjLousMxzb/EhIiK5dx+ATqmK0Q:6ylCYWa7J2jgIik3oe6FK5P+Aw0Q
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b8a-12.dat healer behavioral1/memory/4388-15-0x0000000000070000-0x000000000007A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it799404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it799404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it799404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it799404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it799404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it799404.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/372-22-0x00000000049D0000-0x0000000004A0C000-memory.dmp family_redline behavioral1/memory/372-24-0x0000000004C70000-0x0000000004CAA000-memory.dmp family_redline behavioral1/memory/372-30-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-34-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-32-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-28-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-88-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-74-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-62-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-39-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-26-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-25-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-86-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-84-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-82-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-80-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-78-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-76-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-72-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-70-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-68-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-66-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-64-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-60-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-58-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-56-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-54-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-52-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-50-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-48-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-46-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-44-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-42-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-40-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline behavioral1/memory/372-36-0x0000000004C70000-0x0000000004CA5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3264 zieF7587.exe 4388 it799404.exe 372 kp532905.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it799404.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 544cac447bcbfb99ea5db2311460a6122c3bbec6ad8d72d7ad924dda784e883a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zieF7587.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 544cac447bcbfb99ea5db2311460a6122c3bbec6ad8d72d7ad924dda784e883a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zieF7587.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp532905.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4388 it799404.exe 4388 it799404.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4388 it799404.exe Token: SeDebugPrivilege 372 kp532905.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5080 wrote to memory of 3264 5080 544cac447bcbfb99ea5db2311460a6122c3bbec6ad8d72d7ad924dda784e883a.exe 84 PID 5080 wrote to memory of 3264 5080 544cac447bcbfb99ea5db2311460a6122c3bbec6ad8d72d7ad924dda784e883a.exe 84 PID 5080 wrote to memory of 3264 5080 544cac447bcbfb99ea5db2311460a6122c3bbec6ad8d72d7ad924dda784e883a.exe 84 PID 3264 wrote to memory of 4388 3264 zieF7587.exe 85 PID 3264 wrote to memory of 4388 3264 zieF7587.exe 85 PID 3264 wrote to memory of 372 3264 zieF7587.exe 94 PID 3264 wrote to memory of 372 3264 zieF7587.exe 94 PID 3264 wrote to memory of 372 3264 zieF7587.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\544cac447bcbfb99ea5db2311460a6122c3bbec6ad8d72d7ad924dda784e883a.exe"C:\Users\Admin\AppData\Local\Temp\544cac447bcbfb99ea5db2311460a6122c3bbec6ad8d72d7ad924dda784e883a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieF7587.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieF7587.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it799404.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it799404.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp532905.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp532905.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:372
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD5bbcfd01e822ec0ca1c06107409f67f69
SHA1d8fb301531adaeca87829edffc2f4b4f6d166f2e
SHA256889d8e581297233ec8f85349c422b568ba44d4d6eb82c5eb921941bffbcb6964
SHA512d83917bc65e96662dbb5ab710ed0319370cd5ffb6405428e354139c581d15bffbf52c06944699ef87194e16e44c43269a7e611263252795eecf19119b354c81f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
359KB
MD5443c8dbeb360802be5f4cebed05d21d5
SHA1a7d0dd2446b5d5027c368998efcaf914c42c4d03
SHA2569fa5c424738e15f7e70f06e571313ba5e367f8b4992c62914f8e54dff98fcff9
SHA512ed6591c9ea55e45eb356c8304c446ae1653cd0066e78371266efd0af119a1c6ad33b2ebc5c92ae6d25a9bca454df1de72f061a4112b11f4c49f6f679ff459167