Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:39
Static task
static1
Behavioral task
behavioral1
Sample
b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48.exe
Resource
win10v2004-20241007-en
General
-
Target
b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48.exe
-
Size
1.5MB
-
MD5
ab3083bbcf97ff1458e0ac05561265b8
-
SHA1
0196d620f0bbaa0fc41727a9e8af84a6d76663c7
-
SHA256
b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48
-
SHA512
540d0780a3aa2071fc939992cdf6a6604a4f917edccbdca12115e221548efa7840a403357b103ee4ba177d650ffc8c96ea302298edf683c53395cd1ad61d2bda
-
SSDEEP
24576:yygZarBGTynGwT3egDGqod2Bgbp8qD1qUWJnOrAsp625QMxTbQtcRRjH17mbMPUT:ZgwrBGOGwjeQGSO9HQdOrAs/264cjrha
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3260-36-0x0000000002240000-0x000000000225A000-memory.dmp healer behavioral1/memory/3260-38-0x00000000025C0000-0x00000000025D8000-memory.dmp healer behavioral1/memory/3260-66-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/3260-64-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/3260-63-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/3260-60-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/3260-58-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/3260-56-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/3260-55-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/3260-52-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/3260-50-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/3260-48-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/3260-46-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/3260-44-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/3260-42-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/3260-40-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/3260-39-0x00000000025C0000-0x00000000025D2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8842377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8842377.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8842377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8842377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8842377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8842377.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cb0-71.dat family_redline behavioral1/memory/4800-73-0x00000000005C0000-0x00000000005F0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 388 v9891561.exe 1336 v6676259.exe 3020 v8421569.exe 4720 v4377293.exe 3260 a8842377.exe 4800 b9069175.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8842377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8842377.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9891561.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6676259.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8421569.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v4377293.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4888 3260 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6676259.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8421569.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4377293.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8842377.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9069175.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v9891561.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3260 a8842377.exe 3260 a8842377.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3260 a8842377.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3256 wrote to memory of 388 3256 b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48.exe 85 PID 3256 wrote to memory of 388 3256 b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48.exe 85 PID 3256 wrote to memory of 388 3256 b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48.exe 85 PID 388 wrote to memory of 1336 388 v9891561.exe 86 PID 388 wrote to memory of 1336 388 v9891561.exe 86 PID 388 wrote to memory of 1336 388 v9891561.exe 86 PID 1336 wrote to memory of 3020 1336 v6676259.exe 88 PID 1336 wrote to memory of 3020 1336 v6676259.exe 88 PID 1336 wrote to memory of 3020 1336 v6676259.exe 88 PID 3020 wrote to memory of 4720 3020 v8421569.exe 89 PID 3020 wrote to memory of 4720 3020 v8421569.exe 89 PID 3020 wrote to memory of 4720 3020 v8421569.exe 89 PID 4720 wrote to memory of 3260 4720 v4377293.exe 90 PID 4720 wrote to memory of 3260 4720 v4377293.exe 90 PID 4720 wrote to memory of 3260 4720 v4377293.exe 90 PID 4720 wrote to memory of 4800 4720 v4377293.exe 103 PID 4720 wrote to memory of 4800 4720 v4377293.exe 103 PID 4720 wrote to memory of 4800 4720 v4377293.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48.exe"C:\Users\Admin\AppData\Local\Temp\b9be943caa6ba1f04fbb3cf2e724da13373fb5519c4e179f799f2cb12d2bab48.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9891561.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9891561.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6676259.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6676259.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8421569.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8421569.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4377293.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4377293.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8842377.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8842377.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 10847⤵
- Program crash
PID:4888
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9069175.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9069175.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4800
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3260 -ip 32601⤵PID:1164
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5ca3cfe98402ed33a5b0ab45d5524f15b
SHA193b9c5cf123bc726ec545ae22ea938c12eb9bfa6
SHA256ab31728a7d53677bca94a9b61316ad45fa648430a1fff973335e3ecd97a3a1ad
SHA5128760f3824449ce0adfdbaf0041a73beba3adc06da962afad4ebbf575d2ca5826b86afc70e10a3a4059f91a52154227b9266c07ac1b07843a32837249f69816ce
-
Filesize
866KB
MD581f06603f341f69d4d925b28c3648a28
SHA1490ff52b1854847382d606616191955ae4e41fa5
SHA2566d3fc2ac9124726d812356381f8f8aaf74ac6780b423f3c82157a29f313533da
SHA512e55e8a2ea921254bf87f446154f36e550a1c63a934407f8177feff03ff93e088a329387015a82fcd7b9630fef3ad6f27e460762fbb2732f397ecacfebfdbb12a
-
Filesize
662KB
MD553ca6e24e945f4894d5668bc9e96f8e8
SHA1acdd7bd7fbf4715a4ac90dd5a73f462b8d4947f4
SHA2568c9be663872cea08f5aee92c8d6a88db90b3e8b4a7ab078d5107bbffa5efdeb7
SHA51244eba8ec9c1e0c0be161a0c5abecf3be502c02462da321f1c597618d15ccadf21ce2695b7de32bc07e8f2d1f4fbbd0867b70c2375c0edd684532cc9f325bb705
-
Filesize
393KB
MD5a8d37af984a75d9435e2a762e05e8b4c
SHA1d7afb9b739a353482b9f7301ccc22de2ee36746a
SHA25635aab35d8b725a76fa8255cc40f15d23cd99287654580ed3fb3ef15e6ac24415
SHA51228fbb391210d2c485ed9d4ae8541b197f9d9b2f16e12f1eabf67592da460301c6ccd48c937b7a99ce8950855231fdc83b1ffae04228f950c21dca21b22f5c0d9
-
Filesize
315KB
MD5e088e1c55d7d8f75c6706837b0b6e889
SHA1ac106450d1a55316182b38d624720662dc485c28
SHA2566540409a80f7d9048b7c64efac9969f5d8bd1b7c64c86718700d3a6f89d56608
SHA512bba55874c8cd77b25c9ec0fb80ffaa0c41fc9a5a63983e927548309274821490d61d4c5040853299a5958dbcdea937959780f25b69c8a9efb3a1047c5a21ebc8
-
Filesize
168KB
MD56936fbb48213bcb4d0fcd423a1c7a06e
SHA1127de6c2485ea27473559a7041a5d58838f40d89
SHA256cb295a2ce7fd4f0b8a53882708a421dcb1a564eae3837e9058e608d2e06d6aa8
SHA5124b484c1502335f8bcdf02efbb3f9c0ac4ca40d95139c7d83e4f053188bbfa52e39fde12fd30a192c977bf95ea4d83ceeefa97379bb10c818b7df6f5494b55ee0