Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:45
Static task
static1
Behavioral task
behavioral1
Sample
193bdfb29651c422001874361873461eb44469ed4096b650145c2d7944ee323a.exe
Resource
win10v2004-20241007-en
General
-
Target
193bdfb29651c422001874361873461eb44469ed4096b650145c2d7944ee323a.exe
-
Size
480KB
-
MD5
9c569a0933c4e43a899352d5db45a512
-
SHA1
1b0036fc8c4ad7bc14f28a09fd3677d94d2ca93c
-
SHA256
193bdfb29651c422001874361873461eb44469ed4096b650145c2d7944ee323a
-
SHA512
bc374c3438c9488fc2e686000f5c07e8164da38cd02820154ae5c3559664c8ef80bcfe328621f732bf2403f80ff8c34032e5f261e08765e0bf86c32d5bb062ee
-
SSDEEP
12288:cMrvy90oMyNml7kSNuqS+HBmO8M/ENpInWOIFShK+RUFgeljT1:zyel9IbCBmOb8jgMN1
Malware Config
Extracted
redline
dease
217.196.96.101:4132
-
auth_value
82e4d5f9abc21848e0345118814a4e6c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1420-15-0x0000000002130000-0x000000000214A000-memory.dmp healer behavioral1/memory/1420-18-0x00000000023C0000-0x00000000023D8000-memory.dmp healer behavioral1/memory/1420-46-0x00000000023C0000-0x00000000023D2000-memory.dmp healer behavioral1/memory/1420-44-0x00000000023C0000-0x00000000023D2000-memory.dmp healer behavioral1/memory/1420-42-0x00000000023C0000-0x00000000023D2000-memory.dmp healer behavioral1/memory/1420-40-0x00000000023C0000-0x00000000023D2000-memory.dmp healer behavioral1/memory/1420-38-0x00000000023C0000-0x00000000023D2000-memory.dmp healer behavioral1/memory/1420-36-0x00000000023C0000-0x00000000023D2000-memory.dmp healer behavioral1/memory/1420-34-0x00000000023C0000-0x00000000023D2000-memory.dmp healer behavioral1/memory/1420-32-0x00000000023C0000-0x00000000023D2000-memory.dmp healer behavioral1/memory/1420-30-0x00000000023C0000-0x00000000023D2000-memory.dmp healer behavioral1/memory/1420-26-0x00000000023C0000-0x00000000023D2000-memory.dmp healer behavioral1/memory/1420-24-0x00000000023C0000-0x00000000023D2000-memory.dmp healer behavioral1/memory/1420-22-0x00000000023C0000-0x00000000023D2000-memory.dmp healer behavioral1/memory/1420-28-0x00000000023C0000-0x00000000023D2000-memory.dmp healer behavioral1/memory/1420-20-0x00000000023C0000-0x00000000023D2000-memory.dmp healer behavioral1/memory/1420-19-0x00000000023C0000-0x00000000023D2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0915541.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0915541.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0915541.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0915541.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k0915541.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0915541.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023ccf-54.dat family_redline behavioral1/memory/3996-56-0x00000000000E0000-0x000000000010E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 972 y2257738.exe 1420 k0915541.exe 3996 l2097613.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k0915541.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0915541.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 193bdfb29651c422001874361873461eb44469ed4096b650145c2d7944ee323a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2257738.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 193bdfb29651c422001874361873461eb44469ed4096b650145c2d7944ee323a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y2257738.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k0915541.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l2097613.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1420 k0915541.exe 1420 k0915541.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1420 k0915541.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4788 wrote to memory of 972 4788 193bdfb29651c422001874361873461eb44469ed4096b650145c2d7944ee323a.exe 86 PID 4788 wrote to memory of 972 4788 193bdfb29651c422001874361873461eb44469ed4096b650145c2d7944ee323a.exe 86 PID 4788 wrote to memory of 972 4788 193bdfb29651c422001874361873461eb44469ed4096b650145c2d7944ee323a.exe 86 PID 972 wrote to memory of 1420 972 y2257738.exe 87 PID 972 wrote to memory of 1420 972 y2257738.exe 87 PID 972 wrote to memory of 1420 972 y2257738.exe 87 PID 972 wrote to memory of 3996 972 y2257738.exe 98 PID 972 wrote to memory of 3996 972 y2257738.exe 98 PID 972 wrote to memory of 3996 972 y2257738.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\193bdfb29651c422001874361873461eb44469ed4096b650145c2d7944ee323a.exe"C:\Users\Admin\AppData\Local\Temp\193bdfb29651c422001874361873461eb44469ed4096b650145c2d7944ee323a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2257738.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2257738.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0915541.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0915541.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2097613.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2097613.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3996
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD58c1997797de982e8d2e65cce5e3e82e3
SHA1de61fbb959a5e48a6613b3ad8a3002ab9dab7dcf
SHA2562bcc49c3e9375203cd8b337d2ddd5f6478552457d57348ba7729d2ae07709010
SHA5121555af6966ba82ad104ec28d3bcf184f3ce4545363f8ba396b96c6acaf8869f3257e53f0f22f1d430ccfd7394e47cd045c3a37414e2ae8317df4aa1f0d993875
-
Filesize
181KB
MD5cda4b0b2e5ae62161d2388333d7a6be3
SHA17c72d5738dbbca734bea4d20cdd9d443eba38733
SHA256112cf473b57401859cd20571b5ec6aebd02fe4ed428463296bd1ffbccc6dae3b
SHA512702195661bba0c7f084f100e5654a4e649f83f4e13f15b4a100040396e632214a30b0486af3304c4adcec1ab55704806697d97b5f7b2ef6954a456a243f031e9
-
Filesize
168KB
MD5179d892cf8a7b9b9f2e2fbcda56d06e5
SHA181fb15c412aa0b902d9c843bd838a286c8660821
SHA256a0629367480bfad4e35f4afb4e4a45e9f32349ba348b64471c373d0b90bc1590
SHA51249ae20ca2de809953d06c038612aceef415957c9e9176e5c88ba30c6c9408414f615cd8d6efd8e52f8b4c1e7387d5bbff9bb9d6ab832d95dac8e8d6204dd1975