Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:22
Static task
static1
Behavioral task
behavioral1
Sample
2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a.exe
Resource
win10v2004-20241007-en
General
-
Target
2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a.exe
-
Size
479KB
-
MD5
2c9b514a415323ebf0606658b3528d87
-
SHA1
07c5ff681a7bb8db4a4917f3bda2c1fd7dfc808d
-
SHA256
2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a
-
SHA512
f509948843e7474c887da2c3096fbe35e8d046fd4fec63ed996bdac2a421920c2d3a9894f8f1dd75d000a8dda09d2e67fc2c712a1c2f649f9f06b27ed6280bed
-
SSDEEP
12288:eMriy90VCHpKCUlcuoWNjb4aouOEemWoDQxLaLVBxz:AyPH0jFQmdVTz
Malware Config
Extracted
redline
ditro
217.196.96.101:4132
-
auth_value
8f24ed370a9b24aa28d3d634ea57912e
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3232-15-0x00000000048C0000-0x00000000048DA000-memory.dmp healer behavioral1/memory/3232-18-0x0000000004F40000-0x0000000004F58000-memory.dmp healer behavioral1/memory/3232-44-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3232-48-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3232-46-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3232-42-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3232-40-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3232-38-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3232-36-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3232-34-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3232-32-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3232-30-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3232-28-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3232-26-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3232-24-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3232-22-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3232-21-0x0000000004F40000-0x0000000004F52000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5574886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5574886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5574886.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k5574886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5574886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5574886.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c64-54.dat family_redline behavioral1/memory/4300-56-0x0000000000430000-0x0000000000460000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3928 y3494477.exe 3232 k5574886.exe 4300 l1531877.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5574886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5574886.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3494477.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y3494477.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k5574886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l1531877.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3232 k5574886.exe 3232 k5574886.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3232 k5574886.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2252 wrote to memory of 3928 2252 2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a.exe 84 PID 2252 wrote to memory of 3928 2252 2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a.exe 84 PID 2252 wrote to memory of 3928 2252 2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a.exe 84 PID 3928 wrote to memory of 3232 3928 y3494477.exe 85 PID 3928 wrote to memory of 3232 3928 y3494477.exe 85 PID 3928 wrote to memory of 3232 3928 y3494477.exe 85 PID 3928 wrote to memory of 4300 3928 y3494477.exe 97 PID 3928 wrote to memory of 4300 3928 y3494477.exe 97 PID 3928 wrote to memory of 4300 3928 y3494477.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a.exe"C:\Users\Admin\AppData\Local\Temp\2baf4dd855bdaf0a52f7cb10329ac678058d37a7549508ee13fb2a8dd53c9b6a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3494477.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3494477.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5574886.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5574886.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1531877.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1531877.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4300
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5d57b16280072c65bdbc271c77beee159
SHA177b495d69c4354578a75dd3e9d135b1632456d1c
SHA256414a3b5b26b93806609a619a985c4a7d63ef7ff86c15b16dd2bab2f2f8816ca4
SHA512cec4dd0d9580ed485f18b8e5923b1e10f287108ae3c67d074cf639441ceb6ecfa8a39f5f37dfbd465d561468d2757edc46754961fc8d360d93259c570ba21548
-
Filesize
178KB
MD59fb068780303a662903f139f68c49047
SHA1e5bc0aeb94e3cca03d68caaac688aa192dc5f64c
SHA256d92471b757f5a2b9a301f13abee3f81fd7468b622f483127db60c04741c277b2
SHA51215ecfbd802d13c8424db0c6f4a191055622e583c7cd6368051ebf16a60a933a02898c9ae2cc9d63bb28bb8cd467e132ec8fa6b1b5398768957f01c6543ea4a44
-
Filesize
168KB
MD51906f066bdab6840b07b810440990fd3
SHA10b02e3199c20a1b0f174bf068cfdd217d3cd9cc7
SHA256770e35030d7cf3af72aff436497a1b346585bba261bc39bf4508bb96a6d1c889
SHA5128ba4127da5be878934b9e0e72de5cdf4bb3054afbc28afb31a0eb60b79ad5cb2463dd88f9027b82846260302ff93d05a7afae03236c01bf4dfbb46c90f453866