Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
a502ecbf0bffc729ffa0af1bcdb09b72042f889b94f0818415cadc655d347e5f.exe
Resource
win10v2004-20241007-en
General
-
Target
a502ecbf0bffc729ffa0af1bcdb09b72042f889b94f0818415cadc655d347e5f.exe
-
Size
1.5MB
-
MD5
fcfa0c88f2c3abb1d84c4623131f5eaa
-
SHA1
6b2031cc39fca2c15eac93fe65db39f6d9531cf8
-
SHA256
a502ecbf0bffc729ffa0af1bcdb09b72042f889b94f0818415cadc655d347e5f
-
SHA512
b52afa564ca4a8bb0d3ef998d16feee70a6e9b6bc9e882f5e82cd52e711b1c52eeb5a895e57988d72b09e7166d6c5f33e4d9e91d95597e7e5160e2d9cdd4f212
-
SSDEEP
24576:dy468ZXBZQpV3TfAbnmrQGljLEw/slTSuOfpWDaRBCssjKG:4/8ZwpdEi1lsMiTIBWORss
Malware Config
Extracted
redline
max
185.161.248.73:4164
-
auth_value
efb1499709a5d08ed1ddf71cff71211f
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4912-35-0x00000000024A0000-0x00000000024BA000-memory.dmp healer behavioral1/memory/4912-37-0x0000000004AC0000-0x0000000004AD8000-memory.dmp healer behavioral1/memory/4912-47-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/4912-65-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/4912-63-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/4912-62-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/4912-59-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/4912-57-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/4912-56-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/4912-53-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/4912-51-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/4912-49-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/4912-45-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/4912-43-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/4912-41-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/4912-39-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/4912-38-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a15985012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a15985012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a15985012.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a15985012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a15985012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a15985012.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b6c-68.dat family_redline behavioral1/memory/2752-70-0x0000000000160000-0x0000000000190000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 3216 i18336389.exe 4248 i80901322.exe 2588 i20701553.exe 2772 i06539550.exe 4912 a15985012.exe 2752 b55705710.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a15985012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a15985012.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a502ecbf0bffc729ffa0af1bcdb09b72042f889b94f0818415cadc655d347e5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i18336389.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i80901322.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i20701553.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i06539550.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2380 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a502ecbf0bffc729ffa0af1bcdb09b72042f889b94f0818415cadc655d347e5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i18336389.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i80901322.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i20701553.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i06539550.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a15985012.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b55705710.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4912 a15985012.exe 4912 a15985012.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4912 a15985012.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4708 wrote to memory of 3216 4708 a502ecbf0bffc729ffa0af1bcdb09b72042f889b94f0818415cadc655d347e5f.exe 84 PID 4708 wrote to memory of 3216 4708 a502ecbf0bffc729ffa0af1bcdb09b72042f889b94f0818415cadc655d347e5f.exe 84 PID 4708 wrote to memory of 3216 4708 a502ecbf0bffc729ffa0af1bcdb09b72042f889b94f0818415cadc655d347e5f.exe 84 PID 3216 wrote to memory of 4248 3216 i18336389.exe 85 PID 3216 wrote to memory of 4248 3216 i18336389.exe 85 PID 3216 wrote to memory of 4248 3216 i18336389.exe 85 PID 4248 wrote to memory of 2588 4248 i80901322.exe 86 PID 4248 wrote to memory of 2588 4248 i80901322.exe 86 PID 4248 wrote to memory of 2588 4248 i80901322.exe 86 PID 2588 wrote to memory of 2772 2588 i20701553.exe 87 PID 2588 wrote to memory of 2772 2588 i20701553.exe 87 PID 2588 wrote to memory of 2772 2588 i20701553.exe 87 PID 2772 wrote to memory of 4912 2772 i06539550.exe 88 PID 2772 wrote to memory of 4912 2772 i06539550.exe 88 PID 2772 wrote to memory of 4912 2772 i06539550.exe 88 PID 2772 wrote to memory of 2752 2772 i06539550.exe 97 PID 2772 wrote to memory of 2752 2772 i06539550.exe 97 PID 2772 wrote to memory of 2752 2772 i06539550.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\a502ecbf0bffc729ffa0af1bcdb09b72042f889b94f0818415cadc655d347e5f.exe"C:\Users\Admin\AppData\Local\Temp\a502ecbf0bffc729ffa0af1bcdb09b72042f889b94f0818415cadc655d347e5f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i18336389.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i18336389.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i80901322.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i80901322.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i20701553.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i20701553.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i06539550.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i06539550.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a15985012.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a15985012.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b55705710.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b55705710.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2380
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5a144689211dcc205e23011ce9a3b8579
SHA13a716bf2b44d8467a79f395fd66286a545d0c15c
SHA256ea0516dafbcc19c61bd59944d88e6472e72bf4399b089dd75faa88b35d88bb7d
SHA51295cf3c6d0ede997021661e3828ce1dc4a85556a0d9e94ff5f94a6fe62da9fd74898ceccd33fec208785629d62ff417efa501477b8d50e839b4e130256efc7e40
-
Filesize
1.0MB
MD51542b80b526071c9e856191e75c5cf91
SHA1f9b486600bc9b8a881ad5aba35fd0ec900fce13a
SHA2565ea9ec1dda13c7a4c8c3d3b535b750e4768dc4e89c8e14727b85da14d7e4b376
SHA5129f675eab2dc832d2ddffcf765d5acfb482273aa28c5deaf3a2fed39c01202ade07d78b8a303e221bff7b25d22d66304a6b5c62390c71a8cd02724c0e1ed15b99
-
Filesize
570KB
MD5492d235f928e71a04846d614ca6afd1b
SHA1ec9539c917232beccd34bd3b39f2e6796af60bb0
SHA2562f22af24697b54f964a25ec1b6c266ff9ca43a34e79bf358d6b5bc56722cbb75
SHA5124e9f299c48134d78c80d0580b6bcd0684c5e0860fee27c4908d5437b7ff5d15104cd46fd3a7f21ddfb26b9bfc0071b3f1b92310e764eef06fe760a5ff7d0fefb
-
Filesize
310KB
MD5685cc4749cf11159d7b5538f5bb60b77
SHA13a65aebc99caf46e777474579d9e272564f31bb0
SHA2560dc8b2427a9c864aa4d4400201df8bc53cfb9cfc3d839c220d4c13c48124f699
SHA512416c97b78d5eecd508c4587007550da404ed2d4ca4293c47e95d7e595e0a4cebd4d640fa13484a29a9b9d5c82dbf59b1df606fa6eab9133e779be8b65070aef3
-
Filesize
176KB
MD5f4e12fdcf1cb8ef289ae065eb0520158
SHA1abd0199683b22a18ffa4c2f3c1b57e36e9af82d6
SHA2568ffdfb58ed0d69b7d22a88062b18601c2720bf36969fd31699d6b7bd3bfad728
SHA512404021d3bd60d818a4d5e1c96a2a72997590db24a8f7fab7ca0c434ab19c583eb29c2539fb5beb19db9b9150f98dc0a7729e90c9f732d34dcf43c5c91c5212c5
-
Filesize
168KB
MD5a95fe9ed613ae8aab977c2f66ad8c0bd
SHA1766a6834b66100a7695bb83152291376c1558513
SHA256daab558accd31301793176c48e22c9badedbd77583c161285b03c9546cb2c863
SHA5129f51913d8e68b855d6e4c6903778d6312f6662363cf86c86c67d8b03e8d2770962cad06dd33345e535d1c8c08326397c384c7a0356537325b6c8273af364e7fc