Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:08
Static task
static1
Behavioral task
behavioral1
Sample
d217ad05552fa63c0426bdb2730d76f2ab169718150eef7311be687eb2c012cb.exe
Resource
win10v2004-20241007-en
General
-
Target
d217ad05552fa63c0426bdb2730d76f2ab169718150eef7311be687eb2c012cb.exe
-
Size
936KB
-
MD5
83bf1fc580d01ff5ce45e37a12a4c4a8
-
SHA1
3dc413d38de8bb1e49e5431689df81496951d3d9
-
SHA256
d217ad05552fa63c0426bdb2730d76f2ab169718150eef7311be687eb2c012cb
-
SHA512
b3eeeb3f056d4a3dff38ee62ae5fc3b8a81b6033b80de5845cf3bc157c050f60c6a7acbab887f9bae47754638d0fed0297dd3baa043f22ed223b3dde65d1616d
-
SSDEEP
12288:yy90RIdR8RgQYOtrtjl6dORLYD4iPpEyMZn+fvPdhedUZrxZdAWluE0Atfl:yyyr6QpXjRc4iPirZihedUZrOuuEtd
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b6e-19.dat healer behavioral1/memory/3436-22-0x0000000000380000-0x000000000038A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it416317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it416317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it416317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it416317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it416317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it416317.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/892-29-0x0000000002730000-0x000000000276C000-memory.dmp family_redline behavioral1/memory/892-31-0x0000000005400000-0x000000000543A000-memory.dmp family_redline behavioral1/memory/892-33-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-43-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-95-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-93-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-91-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-89-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-87-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-85-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-83-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-81-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-79-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-75-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-73-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-71-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-69-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-67-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-65-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-63-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-61-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-59-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-57-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-55-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-53-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-51-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-47-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-45-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-41-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-39-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-37-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-35-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-77-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-49-0x0000000005400000-0x0000000005435000-memory.dmp family_redline behavioral1/memory/892-32-0x0000000005400000-0x0000000005435000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4756 zinb4426.exe 4156 zito7340.exe 3436 it416317.exe 892 jr155122.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it416317.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d217ad05552fa63c0426bdb2730d76f2ab169718150eef7311be687eb2c012cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zinb4426.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zito7340.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1504 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d217ad05552fa63c0426bdb2730d76f2ab169718150eef7311be687eb2c012cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zinb4426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zito7340.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr155122.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3436 it416317.exe 3436 it416317.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3436 it416317.exe Token: SeDebugPrivilege 892 jr155122.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1928 wrote to memory of 4756 1928 d217ad05552fa63c0426bdb2730d76f2ab169718150eef7311be687eb2c012cb.exe 84 PID 1928 wrote to memory of 4756 1928 d217ad05552fa63c0426bdb2730d76f2ab169718150eef7311be687eb2c012cb.exe 84 PID 1928 wrote to memory of 4756 1928 d217ad05552fa63c0426bdb2730d76f2ab169718150eef7311be687eb2c012cb.exe 84 PID 4756 wrote to memory of 4156 4756 zinb4426.exe 85 PID 4756 wrote to memory of 4156 4756 zinb4426.exe 85 PID 4756 wrote to memory of 4156 4756 zinb4426.exe 85 PID 4156 wrote to memory of 3436 4156 zito7340.exe 86 PID 4156 wrote to memory of 3436 4156 zito7340.exe 86 PID 4156 wrote to memory of 892 4156 zito7340.exe 97 PID 4156 wrote to memory of 892 4156 zito7340.exe 97 PID 4156 wrote to memory of 892 4156 zito7340.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\d217ad05552fa63c0426bdb2730d76f2ab169718150eef7311be687eb2c012cb.exe"C:\Users\Admin\AppData\Local\Temp\d217ad05552fa63c0426bdb2730d76f2ab169718150eef7311be687eb2c012cb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinb4426.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinb4426.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zito7340.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zito7340.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it416317.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it416317.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr155122.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr155122.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1504
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
623KB
MD526a49e879e54613e735c8bbacc8e26ac
SHA153a1b2bf6102a7ee48cb424f908ff85b514b319c
SHA256054f30583eda129358aa986f8fe9ba04fc6ec7e8564542e2640ab125f155ba25
SHA512fae831887860930fe9828ce3ff65fbf5dddfb0d2019c413203ba040d5cdc86e44933e5c968e20b207fe77eaf1ef605ad75441c057339421ebf83bbd793e1b63b
-
Filesize
469KB
MD5c6e75fad036d4933eb93aea3521a7a5a
SHA1a5a0a9ecd107e31c26e3d7393d094683fd4ad548
SHA25677ba477b88c01e3bb173023d3f6aed4e3edbf83fe6b9446712cdc29c351021c2
SHA512496c13ea544ff9924e9ffc3bad7d7d161de0ec9aa93b234e792ae0f286e0322bcbca6588ff7572668141a77d7a3a6fa1857ff1606e7ae911f295b0a40cb14fcd
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
488KB
MD5c5adee4ffc64d2a6eef47e4f09882c51
SHA101deef2a27e7093d2303eb69f0b64c851911a887
SHA2562fa6de052f50d1332ea1f69f7ba109f3b377e0e13ed7dd283039c2079dd74c20
SHA512f909a28f1cc4926e63bbccbf61e7e62ee684526cd31b974c1ae8c17d03a053e6788dfc2bc2b1350bc9bc040c64bc4a94d168bce2534b6ed61a1ff42f66e290e5