Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:08
Static task
static1
Behavioral task
behavioral1
Sample
70812e99bee3b7e2274ae42f1c757d4451d59ddd068f38f605bda7550ad6359d.exe
Resource
win10v2004-20241007-en
General
-
Target
70812e99bee3b7e2274ae42f1c757d4451d59ddd068f38f605bda7550ad6359d.exe
-
Size
852KB
-
MD5
dbcf0750ca1c04a4992e3125d69c86c7
-
SHA1
1fca865bddd27c6e033852aa09ea05ef5a82db21
-
SHA256
70812e99bee3b7e2274ae42f1c757d4451d59ddd068f38f605bda7550ad6359d
-
SHA512
2f9f40631d72a8b80178dd525da71742b92c893b1e671458f69aad98020e886c473ce01f7148292daa40f9508f8ddccbead145eaf927730d2ff4577fec247766
-
SSDEEP
12288:yMrmy90myNOtax/0R8jDYO3UrQ4GUBignQJddcTdNwQ2yz4WbxVU31GdbhCJG+g:4y0EsnoEUxGUpnQKTdSixxVU3GI0+g
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000c000000023ba3-19.dat healer behavioral1/memory/756-22-0x00000000005D0000-0x00000000005DA000-memory.dmp healer behavioral1/memory/400-29-0x0000000004820000-0x000000000483A000-memory.dmp healer behavioral1/memory/400-31-0x0000000004A50000-0x0000000004A68000-memory.dmp healer behavioral1/memory/400-32-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/400-37-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/400-59-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/400-57-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/400-55-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/400-54-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/400-52-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/400-49-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/400-47-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/400-45-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/400-43-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/400-41-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/400-39-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/400-35-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/400-33-0x0000000004A50000-0x0000000004A62000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c63tl80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b5952Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c63tl80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c63tl80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b5952Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b5952Ye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c63tl80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c63tl80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c63tl80.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b5952Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b5952Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b5952Ye.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1384-67-0x0000000004AC0000-0x0000000004B06000-memory.dmp family_redline behavioral1/memory/1384-68-0x00000000076E0000-0x0000000007724000-memory.dmp family_redline behavioral1/memory/1384-100-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-102-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-98-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-96-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-94-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-92-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-90-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-88-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-86-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-84-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-82-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-80-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-78-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-76-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-74-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-72-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-70-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline behavioral1/memory/1384-69-0x00000000076E0000-0x000000000771E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 4160 tice2946.exe 2212 tice1270.exe 756 b5952Ye.exe 400 c63tl80.exe 1384 dtxyE09.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b5952Ye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c63tl80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c63tl80.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice2946.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice1270.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 70812e99bee3b7e2274ae42f1c757d4451d59ddd068f38f605bda7550ad6359d.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2600 400 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70812e99bee3b7e2274ae42f1c757d4451d59ddd068f38f605bda7550ad6359d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice2946.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice1270.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c63tl80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtxyE09.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 756 b5952Ye.exe 756 b5952Ye.exe 400 c63tl80.exe 400 c63tl80.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 756 b5952Ye.exe Token: SeDebugPrivilege 400 c63tl80.exe Token: SeDebugPrivilege 1384 dtxyE09.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4160 2796 70812e99bee3b7e2274ae42f1c757d4451d59ddd068f38f605bda7550ad6359d.exe 84 PID 2796 wrote to memory of 4160 2796 70812e99bee3b7e2274ae42f1c757d4451d59ddd068f38f605bda7550ad6359d.exe 84 PID 2796 wrote to memory of 4160 2796 70812e99bee3b7e2274ae42f1c757d4451d59ddd068f38f605bda7550ad6359d.exe 84 PID 4160 wrote to memory of 2212 4160 tice2946.exe 85 PID 4160 wrote to memory of 2212 4160 tice2946.exe 85 PID 4160 wrote to memory of 2212 4160 tice2946.exe 85 PID 2212 wrote to memory of 756 2212 tice1270.exe 86 PID 2212 wrote to memory of 756 2212 tice1270.exe 86 PID 2212 wrote to memory of 400 2212 tice1270.exe 95 PID 2212 wrote to memory of 400 2212 tice1270.exe 95 PID 2212 wrote to memory of 400 2212 tice1270.exe 95 PID 4160 wrote to memory of 1384 4160 tice2946.exe 99 PID 4160 wrote to memory of 1384 4160 tice2946.exe 99 PID 4160 wrote to memory of 1384 4160 tice2946.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\70812e99bee3b7e2274ae42f1c757d4451d59ddd068f38f605bda7550ad6359d.exe"C:\Users\Admin\AppData\Local\Temp\70812e99bee3b7e2274ae42f1c757d4451d59ddd068f38f605bda7550ad6359d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2946.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2946.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice1270.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice1270.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5952Ye.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5952Ye.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c63tl80.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c63tl80.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 10845⤵
- Program crash
PID:2600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dtxyE09.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dtxyE09.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 400 -ip 4001⤵PID:2632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
707KB
MD52bc9b286234c63aa90d23b3372617939
SHA11efb45d5da6475a3d341f0c859b7007b69925eb3
SHA256fc0566a90117d295da11044cbd2113b00c81e7f742d2d9b2ee400e42c34ee602
SHA512e11ab28a647bd12dea635b0882fd57c39461b5615cfc786f302d95ddd04cbc014da09a63980277d666b2432ec74cbe241151144490b1565c6f26f745be0f56d8
-
Filesize
391KB
MD5a36095206ec5302acc3d8794fb6a1d11
SHA10e1c1624b3bd507da600b1d39cb6e0958c471c35
SHA2563c76b44b3e4a5af4311afd360e6a9edd471e318d80c2589e660c63ccc7e245dc
SHA5127032852b55eae29eb008a3c41abc01a725191380ef86d6e2d6350d3c829ad851a373ef36ffde2d42358b3964d9015ffed5bb5eb71862fc47838d291ea45fd91a
-
Filesize
354KB
MD5c3519e05f2533c11d16421f72a1b70ee
SHA1366fc4c96b1991f766a9c73f4496a85f35b0a3b5
SHA256845342a0a949a25958419cd70a58571c1f3dd2906a86c7af4fd1f9692cc58a1e
SHA5121608260bae41b9d673a96a6c0e8122c25629825eed1a55b28c4292b509dfb4e94b319507b4a4c0fa41a6e19efbdaa1fb1f092a5750f338e7b64eacc4c0139b8d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
333KB
MD5658af7df2e6aa08cb643c0f7e9b7e76d
SHA13d895ea2180d956b2bf6e6836ee4e7aa09a8cc74
SHA2568ae99bd0789c665ae716c58d0e590f8f70e8287103a26e64b8ceb4c2e32dfdfb
SHA512c201784edb5828f8206e5949f6e0be0bc8403a669d6ad0f32a9ad4b43c896032f7445811ca7357b24805f11733ec94ad44cfb7b644fcdd3be12c8660d940d468