Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:54
Static task
static1
Behavioral task
behavioral1
Sample
657bd8865db52c1fc6209c1bdc61986f24081aee6d30d3d36396603ab856afb6.exe
Resource
win10v2004-20241007-en
General
-
Target
657bd8865db52c1fc6209c1bdc61986f24081aee6d30d3d36396603ab856afb6.exe
-
Size
563KB
-
MD5
baf21529603c01e900cee5ae3dd3ebc4
-
SHA1
6bd2f89ea18585d5a8d394b741a68bd9a69e659f
-
SHA256
657bd8865db52c1fc6209c1bdc61986f24081aee6d30d3d36396603ab856afb6
-
SHA512
c0515e4841df7b2b2068b84de4c49dacd8dd7d2ca4ed9ef2fc2cb37ecd4a12c2430f7e5c0873e295dd47888f90984b4423b4efdd3a25f0419e44210a5600b0bf
-
SSDEEP
12288:ay90LvvRgYszTkvmI6X4I2ajLyuDMSzbZIBDFl97mGCHP:ay2gc64I2a3yw8RXiGCHP
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b7c-13.dat healer behavioral1/memory/4244-15-0x0000000000FC0000-0x0000000000FCA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it804167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it804167.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it804167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it804167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it804167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it804167.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2156-22-0x00000000048E0000-0x000000000491C000-memory.dmp family_redline behavioral1/memory/2156-24-0x0000000004C50000-0x0000000004C8A000-memory.dmp family_redline behavioral1/memory/2156-28-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-42-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-88-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-86-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-85-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-82-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-80-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-79-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-76-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-74-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-70-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-68-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-66-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-64-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-62-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-58-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-57-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-54-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-52-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-50-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-48-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-46-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-44-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-40-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-38-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-36-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-34-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-32-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-30-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-72-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-60-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-26-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline behavioral1/memory/2156-25-0x0000000004C50000-0x0000000004C85000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 980 ziAL3178.exe 4244 it804167.exe 2156 kp758612.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it804167.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 657bd8865db52c1fc6209c1bdc61986f24081aee6d30d3d36396603ab856afb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziAL3178.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 657bd8865db52c1fc6209c1bdc61986f24081aee6d30d3d36396603ab856afb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziAL3178.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp758612.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4244 it804167.exe 4244 it804167.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4244 it804167.exe Token: SeDebugPrivilege 2156 kp758612.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1868 wrote to memory of 980 1868 657bd8865db52c1fc6209c1bdc61986f24081aee6d30d3d36396603ab856afb6.exe 84 PID 1868 wrote to memory of 980 1868 657bd8865db52c1fc6209c1bdc61986f24081aee6d30d3d36396603ab856afb6.exe 84 PID 1868 wrote to memory of 980 1868 657bd8865db52c1fc6209c1bdc61986f24081aee6d30d3d36396603ab856afb6.exe 84 PID 980 wrote to memory of 4244 980 ziAL3178.exe 85 PID 980 wrote to memory of 4244 980 ziAL3178.exe 85 PID 980 wrote to memory of 2156 980 ziAL3178.exe 94 PID 980 wrote to memory of 2156 980 ziAL3178.exe 94 PID 980 wrote to memory of 2156 980 ziAL3178.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\657bd8865db52c1fc6209c1bdc61986f24081aee6d30d3d36396603ab856afb6.exe"C:\Users\Admin\AppData\Local\Temp\657bd8865db52c1fc6209c1bdc61986f24081aee6d30d3d36396603ab856afb6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAL3178.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAL3178.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it804167.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it804167.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp758612.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp758612.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD5f491b393a818d6e4fcfbbfea8aee7852
SHA1e7108ced21d94d62cd021a67c31d03f20420627f
SHA2565fbef46b723e7929b0b82ff0c6c8210d28b448d879a8cc3a532185a2e3099c05
SHA512decad7825221fd230b40b143a71829f85e5f2939189413acc5fcce89aee187c16537b547a53281fa6218b084285f67d03d9a680da39f7316bc0bc9f0254c51d7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
359KB
MD57bf6f99e928e162f824d7742b653fba6
SHA19e6e2bb729741bd7dded3d0eb41091a8d0be9a28
SHA256bd500b6d2ce9d1478b9dea63c4dfe4dc2da7b0785ff2054387d9dc527afa67e4
SHA51244f577f981c45573d435b3c5565a43d525d00e14777c6257ce70239c08b67ead2acc6bde6b8bfb6fdbb17c0bd88f7f25928ebd610813c71df084499ec44f0e51