Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:35
Static task
static1
Behavioral task
behavioral1
Sample
d5931f94a58dc446d4941217aa02b3b5ff5ac9d055662b2e4187d60779c45467.exe
Resource
win10v2004-20241007-en
General
-
Target
d5931f94a58dc446d4941217aa02b3b5ff5ac9d055662b2e4187d60779c45467.exe
-
Size
1.4MB
-
MD5
15e027424ec735a4b05b71d29014800b
-
SHA1
891c0a3e0a49fa890fae4e810879c46d1725f1b9
-
SHA256
d5931f94a58dc446d4941217aa02b3b5ff5ac9d055662b2e4187d60779c45467
-
SHA512
291ff0e3499a31efde07e00c1e223ad9d2b833b8f53789cd48fea7dc3940159ec795186c8f2aec68fad24319c6a40effbbda73f11680c73df1dc69289cc7ed00
-
SSDEEP
24576:Wy8IxxE3l94vZDycI8u5oKXpkfCkGKAl2mP8xmMsOVC2hPv99Q3NTJtb:l7vE1Sv9ycxokfCkGKwqmGk2i9T7
Malware Config
Extracted
redline
maxbi
185.161.248.73:4164
-
auth_value
6aa7dba884fe45693dfa04c91440daef
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4608-36-0x0000000002350000-0x000000000236A000-memory.dmp healer behavioral1/memory/4608-38-0x0000000002500000-0x0000000002518000-memory.dmp healer behavioral1/memory/4608-42-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4608-66-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4608-64-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4608-62-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4608-60-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4608-56-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4608-54-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4608-52-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4608-50-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4608-48-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4608-46-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4608-44-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4608-40-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4608-39-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4608-58-0x0000000002500000-0x0000000002512000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a15314648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a15314648.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a15314648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a15314648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a15314648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a15314648.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b79-71.dat family_redline behavioral1/memory/3296-73-0x0000000000470000-0x00000000004A0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 1072 i82467679.exe 3468 i14138326.exe 3648 i41418310.exe 3368 i79750025.exe 4608 a15314648.exe 3296 b91815198.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a15314648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a15314648.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i79750025.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d5931f94a58dc446d4941217aa02b3b5ff5ac9d055662b2e4187d60779c45467.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i82467679.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i14138326.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i41418310.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3320 4608 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a15314648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b91815198.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5931f94a58dc446d4941217aa02b3b5ff5ac9d055662b2e4187d60779c45467.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i82467679.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i14138326.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i41418310.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i79750025.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4608 a15314648.exe 4608 a15314648.exe 4608 a15314648.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4608 a15314648.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3564 wrote to memory of 1072 3564 d5931f94a58dc446d4941217aa02b3b5ff5ac9d055662b2e4187d60779c45467.exe 84 PID 3564 wrote to memory of 1072 3564 d5931f94a58dc446d4941217aa02b3b5ff5ac9d055662b2e4187d60779c45467.exe 84 PID 3564 wrote to memory of 1072 3564 d5931f94a58dc446d4941217aa02b3b5ff5ac9d055662b2e4187d60779c45467.exe 84 PID 1072 wrote to memory of 3468 1072 i82467679.exe 85 PID 1072 wrote to memory of 3468 1072 i82467679.exe 85 PID 1072 wrote to memory of 3468 1072 i82467679.exe 85 PID 3468 wrote to memory of 3648 3468 i14138326.exe 86 PID 3468 wrote to memory of 3648 3468 i14138326.exe 86 PID 3468 wrote to memory of 3648 3468 i14138326.exe 86 PID 3648 wrote to memory of 3368 3648 i41418310.exe 88 PID 3648 wrote to memory of 3368 3648 i41418310.exe 88 PID 3648 wrote to memory of 3368 3648 i41418310.exe 88 PID 3368 wrote to memory of 4608 3368 i79750025.exe 89 PID 3368 wrote to memory of 4608 3368 i79750025.exe 89 PID 3368 wrote to memory of 4608 3368 i79750025.exe 89 PID 3368 wrote to memory of 3296 3368 i79750025.exe 100 PID 3368 wrote to memory of 3296 3368 i79750025.exe 100 PID 3368 wrote to memory of 3296 3368 i79750025.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5931f94a58dc446d4941217aa02b3b5ff5ac9d055662b2e4187d60779c45467.exe"C:\Users\Admin\AppData\Local\Temp\d5931f94a58dc446d4941217aa02b3b5ff5ac9d055662b2e4187d60779c45467.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i82467679.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i82467679.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i14138326.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i14138326.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i41418310.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i41418310.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i79750025.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i79750025.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a15314648.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a15314648.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 10807⤵
- Program crash
PID:3320
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b91815198.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b91815198.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3296
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4608 -ip 46081⤵PID:1232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5d5e89f57c79af9419b89afb47cc83780
SHA16702857f3ad124f50f68d380826502c21e0e4089
SHA256d39e8441a2737963f500de19eb963165921e0cb8cab07187b67817b5648b87a7
SHA51209aa465c75b031f41cd4c449161b8f2336b546a62ca41e327c290c5674fd4c6f53dd8f36b1c17cf4337a3f2da5b5ab3d3a69b88ad37d1b14b77613cdfe45f914
-
Filesize
1.1MB
MD56b07f8d5ddf95a125ed2b8d3024c7536
SHA1966c078da6fb4bb96eb3d30d9be3312d46211fcd
SHA256026aded86d91bf0884e9cab17529e7218a6d051dd6fe04013a18883ade587db9
SHA51229eec2bc2ffbffed11f3131f945cb0d6330e654ddcaea282343ddb98a85af229d8471ee2efeee82b9eaca1d479cde0a61458a50870aad1856a2417c10832ad9d
-
Filesize
644KB
MD514dc2c60db619c573ed45b37c421adcf
SHA16f824110fabdb4f2fd65dad4650a114c2e1a2a5b
SHA2561afd2aaaab8ec7afb4202e3cb86e9a05fc13889679803bd787c746437607d4ba
SHA512ade79a7296a2498e3b0ec210942f52c7d5d5faeb96a3fa0ec002aa385c202035d9f13ea1694ce3fe69d7dd234a02a944d9161175f398206679538848aa162327
-
Filesize
386KB
MD5a9f17f5130a5c499c1b15df80e733372
SHA1893e523523ad0d9087c087f17bfaf7317d3b2665
SHA256bbea93e79eb37e0d45159c88dad8ea1041d3f760052871426ed8a67ac54e2683
SHA51206ae09a65b83cd175f23b5cd205d33e1e2ca7692ce0a7ea0345d658c239ddd91d45aecd98d111ba649d1992326dfa196c42aa75e1b814b5790b25aed725d14a3
-
Filesize
294KB
MD5cd12d8e193b5fab2922801f8724df09b
SHA176afdcd11bc3fb5a59c5381a9d08dac811b0ac44
SHA256b33a2f3587f633674c846089c73b80003f17110ef8f4729b64373597bb367a99
SHA512cf8c0a9e45e76f76bfc4478ece7e60d93d816c61ac1fff0fa02d8297863654cccce2659b321d1d49d1b2598201840f42f4e87907c0d98c318219fde175755bfb
-
Filesize
168KB
MD51706326846060dbcac297cb23026f352
SHA12d4cbedd4a82bd144a9ba9aa97e7084ba5ff8784
SHA2564f5bfa0da606184c2e69e1e4a6f5d466fd23f06f31450651a743fafaa2213214
SHA5129a46fd92a4f100602763bf2eca0ce8ffe3d5d531ead80a4538fcdf7d34fc4cb384176abbcbafa858f056fb8e5cec0402f28e710d67fe6773a2a9f150b7e44158