Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
5850c465b543b388ca8d5cb08c2c23d4327396f092efc0d1a23eccf241612e5c.exe
Resource
win10v2004-20241007-en
General
-
Target
5850c465b543b388ca8d5cb08c2c23d4327396f092efc0d1a23eccf241612e5c.exe
-
Size
787KB
-
MD5
22283c7ffe04ff5f19128d697ebf263d
-
SHA1
e3d3eb7cbf98e04596eb30cb8e86eec65d98fbd3
-
SHA256
5850c465b543b388ca8d5cb08c2c23d4327396f092efc0d1a23eccf241612e5c
-
SHA512
cf3ffb5e7b367139a47818fb045d64ce0efdb90ad79076020bc23331185646f72dc8994d07c4c880e121245feb1ab8204f8c1e9871b8c24107cb715c5aa190d3
-
SSDEEP
12288:py906cOjpO7M+oqf2Eg4mZ7Az9QGpaqNaNj3e2ckVxjMzo5sVH5AMjrn9Dz9Y:pyWNoz7Aza8kVxjMEGzjrn/Y
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023bd5-19.dat healer behavioral1/memory/852-22-0x0000000000850000-0x000000000085A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it983373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it983373.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it983373.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it983373.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it983373.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it983373.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4120-29-0x0000000004D50000-0x0000000004D8C000-memory.dmp family_redline behavioral1/memory/4120-31-0x0000000004E10000-0x0000000004E4A000-memory.dmp family_redline behavioral1/memory/4120-69-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-96-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-93-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-91-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-90-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-87-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-85-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-83-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-81-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-79-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-77-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-75-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-73-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-71-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-67-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-66-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-63-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-61-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-60-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-57-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-55-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-54-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-51-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-49-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-48-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-45-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-43-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-41-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-39-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-37-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-35-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-33-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4120-32-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 1440 ziyy9959.exe 1460 ziHP5922.exe 852 it983373.exe 4120 jr877291.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it983373.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziyy9959.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziHP5922.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5850c465b543b388ca8d5cb08c2c23d4327396f092efc0d1a23eccf241612e5c.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5850c465b543b388ca8d5cb08c2c23d4327396f092efc0d1a23eccf241612e5c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziyy9959.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziHP5922.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr877291.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 852 it983373.exe 852 it983373.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 852 it983373.exe Token: SeDebugPrivilege 4120 jr877291.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3672 wrote to memory of 1440 3672 5850c465b543b388ca8d5cb08c2c23d4327396f092efc0d1a23eccf241612e5c.exe 84 PID 3672 wrote to memory of 1440 3672 5850c465b543b388ca8d5cb08c2c23d4327396f092efc0d1a23eccf241612e5c.exe 84 PID 3672 wrote to memory of 1440 3672 5850c465b543b388ca8d5cb08c2c23d4327396f092efc0d1a23eccf241612e5c.exe 84 PID 1440 wrote to memory of 1460 1440 ziyy9959.exe 85 PID 1440 wrote to memory of 1460 1440 ziyy9959.exe 85 PID 1440 wrote to memory of 1460 1440 ziyy9959.exe 85 PID 1460 wrote to memory of 852 1460 ziHP5922.exe 86 PID 1460 wrote to memory of 852 1460 ziHP5922.exe 86 PID 1460 wrote to memory of 4120 1460 ziHP5922.exe 95 PID 1460 wrote to memory of 4120 1460 ziHP5922.exe 95 PID 1460 wrote to memory of 4120 1460 ziHP5922.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\5850c465b543b388ca8d5cb08c2c23d4327396f092efc0d1a23eccf241612e5c.exe"C:\Users\Admin\AppData\Local\Temp\5850c465b543b388ca8d5cb08c2c23d4327396f092efc0d1a23eccf241612e5c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyy9959.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyy9959.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHP5922.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHP5922.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it983373.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it983373.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr877291.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr877291.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
615KB
MD56f4f4a29105a00b118a64428110f6cd6
SHA1198d1bbf69c3854d321d23096e7a7f428cd3f156
SHA256ee3ad994094897be3da72152c43de9364b2a301b6410b2f449c8cdf9994dc9cd
SHA5121a916cee381f12110e58df8dc504b661998c40afc0f248e6d3e5a021212d8e7cbe3edc1ecb7226ad36e7a00f2e8911eb67c20f856ef7108e607ab94cd0acaa3a
-
Filesize
460KB
MD535623ee84bca2851ea3f2cfd56b91b73
SHA15f2ea1fff30868e13fa94c778d444d46b3527df0
SHA25600a48e2cac134689735d90345fe4366647ada835454535a9b76caa4fb9571ebf
SHA512d2dea70e6a1cf848e95197aec07bb79c45e8c89c088042bf8b942d52856443848ae5a2cc7e87757228ddd8f23dd52f884b800781aa74964542bce1db402180b1
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
472KB
MD51efe665c1958cdb88b62ae49473657fc
SHA1c130e5c4d764ba9a5b51c2fae90f57c27cfa4a06
SHA25677240b2b1cbb80bdfc1e1dbd56bf870f147971a4169a63d7bcef005c64fb9517
SHA51239010348ae42adbf8bf169695a17bacd675ffdea0c641e90aab3e8a793666bf90a1dd12b67862f7748e6419999d8b2ac5c7920c8dec6d4f647f5993fbea422c2