Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:38
Static task
static1
Behavioral task
behavioral1
Sample
742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c.exe
Resource
win10v2004-20241007-en
General
-
Target
742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c.exe
-
Size
479KB
-
MD5
854393bc150bff711a2a25b356d03341
-
SHA1
d19170628a3535020a4d04ec9ab6c82a84a69656
-
SHA256
742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c
-
SHA512
262d9cd9e837f97879cc6530694ff1a72306ac4a9cd634d245035c2af7a6c01771b8ba9324f3133d763a2e83239746f5b469465c1f475c4c5cc84133a955dd97
-
SSDEEP
12288:PMrYy90796sP5c1u31/TL+uFILc3/XcobrbeUdT2pa:DyeRXBTHNPcwGo2a
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3240-15-0x0000000002150000-0x000000000216A000-memory.dmp healer behavioral1/memory/3240-18-0x0000000005070000-0x0000000005088000-memory.dmp healer behavioral1/memory/3240-47-0x0000000005070000-0x0000000005082000-memory.dmp healer behavioral1/memory/3240-45-0x0000000005070000-0x0000000005082000-memory.dmp healer behavioral1/memory/3240-43-0x0000000005070000-0x0000000005082000-memory.dmp healer behavioral1/memory/3240-42-0x0000000005070000-0x0000000005082000-memory.dmp healer behavioral1/memory/3240-40-0x0000000005070000-0x0000000005082000-memory.dmp healer behavioral1/memory/3240-37-0x0000000005070000-0x0000000005082000-memory.dmp healer behavioral1/memory/3240-35-0x0000000005070000-0x0000000005082000-memory.dmp healer behavioral1/memory/3240-33-0x0000000005070000-0x0000000005082000-memory.dmp healer behavioral1/memory/3240-31-0x0000000005070000-0x0000000005082000-memory.dmp healer behavioral1/memory/3240-29-0x0000000005070000-0x0000000005082000-memory.dmp healer behavioral1/memory/3240-27-0x0000000005070000-0x0000000005082000-memory.dmp healer behavioral1/memory/3240-25-0x0000000005070000-0x0000000005082000-memory.dmp healer behavioral1/memory/3240-23-0x0000000005070000-0x0000000005082000-memory.dmp healer behavioral1/memory/3240-21-0x0000000005070000-0x0000000005082000-memory.dmp healer behavioral1/memory/3240-20-0x0000000005070000-0x0000000005082000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k3639494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3639494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3639494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3639494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3639494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3639494.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c9c-53.dat family_redline behavioral1/memory/2972-55-0x00000000002F0000-0x0000000000320000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4908 y9322376.exe 3240 k3639494.exe 2972 l4540662.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k3639494.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3639494.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9322376.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4112 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y9322376.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k3639494.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l4540662.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3240 k3639494.exe 3240 k3639494.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3240 k3639494.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3412 wrote to memory of 4908 3412 742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c.exe 84 PID 3412 wrote to memory of 4908 3412 742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c.exe 84 PID 3412 wrote to memory of 4908 3412 742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c.exe 84 PID 4908 wrote to memory of 3240 4908 y9322376.exe 85 PID 4908 wrote to memory of 3240 4908 y9322376.exe 85 PID 4908 wrote to memory of 3240 4908 y9322376.exe 85 PID 4908 wrote to memory of 2972 4908 y9322376.exe 94 PID 4908 wrote to memory of 2972 4908 y9322376.exe 94 PID 4908 wrote to memory of 2972 4908 y9322376.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c.exe"C:\Users\Admin\AppData\Local\Temp\742b0779071d64d87194ebcfc244fac268a3aee4bed70cb0ebcaf60177fbd78c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9322376.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9322376.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3639494.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3639494.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4540662.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4540662.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD58a05c7b667ea561e7650f922f9b5fcae
SHA15a14336a73533489f2c75c404fa6448722751a1b
SHA256510b6bd359dcd3170781f3aa51c9741a6a468a1cbefbfd2dd614c84b013bdbe4
SHA512f04fecd16417f5ce6ac95cb06163d8fbad7d0bfa83f7450e0afecfda45739cc02e7f05f87c1b47f3ed6c14b257540801327475200d5bad6a5a5f383278e01a4e
-
Filesize
180KB
MD537f05f92f16ce7fb410f5434a16d3cc9
SHA1d405575d5bb2f88fac74770cfcb6e62273ac1a8d
SHA256ccb11fe12d381766de03fb97f232f79103f77979185ff92fd4323b4bd5f8f5f5
SHA5127f55e30c363e6f99ec5256fc53faea90a2f4265f2e255227c2f8c569b46e139668ecff90a47f9c2ea1477d13604618e63255b845f90b4a7f1effe32f792642fd
-
Filesize
168KB
MD5dbdb7d324faa3d4954981c3b08a25d89
SHA194f7ea11274db786d1b3218819ed2f696a4054aa
SHA256adb8d9f2624f8c53f71eef39e85f0c881614c0759c4bde8e19ca256cb44f88ba
SHA51210b9d846a90e9f0f592a77be39c3754b30ac0746510f76ed8f04713443f3d8956dc32b1ada0ce3cd490acf6c6b8fa5c4b780b415ba62e86177da96c1c9036390