Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:12
Static task
static1
Behavioral task
behavioral1
Sample
4ee9744eedc8be62cfb067b18df968d0eba2f42e8706cc8132e0b986b30b49eb.exe
Resource
win10v2004-20241007-en
General
-
Target
4ee9744eedc8be62cfb067b18df968d0eba2f42e8706cc8132e0b986b30b49eb.exe
-
Size
479KB
-
MD5
d6d08f55c9b4a75dd763d6daae515294
-
SHA1
9a0682464b8a8b2ef904cb43173cacfb1f291388
-
SHA256
4ee9744eedc8be62cfb067b18df968d0eba2f42e8706cc8132e0b986b30b49eb
-
SHA512
f678867deea09a47f97a76c15ed715a3281d44bab1d6e40191649904def4490d616ac9933c38654ba8f1c1300d0ed0093e14eec9ab143e29da3269a6256d8c7e
-
SSDEEP
12288:fMrdy90CRQkg6bUzwmdcNkHba6WpOcLXw:SyhBTbmRmnpOc8
Malware Config
Extracted
redline
maher
217.196.96.101:4132
-
auth_value
c57763165f68aabcf4874e661a1ffbac
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2368-15-0x0000000002260000-0x000000000227A000-memory.dmp healer behavioral1/memory/2368-18-0x0000000004980000-0x0000000004998000-memory.dmp healer behavioral1/memory/2368-46-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2368-44-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2368-42-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2368-40-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2368-38-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2368-36-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2368-34-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2368-32-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2368-30-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2368-28-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2368-26-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2368-24-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2368-22-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2368-20-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2368-19-0x0000000004980000-0x0000000004992000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8547837.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8547837.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8547837.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8547837.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8547837.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8547837.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cc0-54.dat family_redline behavioral1/memory/4388-56-0x0000000000460000-0x0000000000490000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4032 v9034269.exe 2368 a8547837.exe 4388 b8726172.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8547837.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8547837.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4ee9744eedc8be62cfb067b18df968d0eba2f42e8706cc8132e0b986b30b49eb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9034269.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v9034269.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8547837.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8726172.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ee9744eedc8be62cfb067b18df968d0eba2f42e8706cc8132e0b986b30b49eb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2368 a8547837.exe 2368 a8547837.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2368 a8547837.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4672 wrote to memory of 4032 4672 4ee9744eedc8be62cfb067b18df968d0eba2f42e8706cc8132e0b986b30b49eb.exe 84 PID 4672 wrote to memory of 4032 4672 4ee9744eedc8be62cfb067b18df968d0eba2f42e8706cc8132e0b986b30b49eb.exe 84 PID 4672 wrote to memory of 4032 4672 4ee9744eedc8be62cfb067b18df968d0eba2f42e8706cc8132e0b986b30b49eb.exe 84 PID 4032 wrote to memory of 2368 4032 v9034269.exe 85 PID 4032 wrote to memory of 2368 4032 v9034269.exe 85 PID 4032 wrote to memory of 2368 4032 v9034269.exe 85 PID 4032 wrote to memory of 4388 4032 v9034269.exe 97 PID 4032 wrote to memory of 4388 4032 v9034269.exe 97 PID 4032 wrote to memory of 4388 4032 v9034269.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ee9744eedc8be62cfb067b18df968d0eba2f42e8706cc8132e0b986b30b49eb.exe"C:\Users\Admin\AppData\Local\Temp\4ee9744eedc8be62cfb067b18df968d0eba2f42e8706cc8132e0b986b30b49eb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9034269.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9034269.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8547837.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8547837.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8726172.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8726172.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4388
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5aad6d7075e312080568185eb9244be70
SHA12e3c5e8558535c3f3449e68085e502699b6ccf85
SHA2561c2850d11a851dff241b10b2644e470d7aa85e66378215cbc4f243dcd47eaf91
SHA512f46b88cac25c88a5b65c1529d715a4bc00e78ee8c33c666da12fcc90ba98b94832564fc608bca4fdedd7b3fa59474210dc42d60f9a15509de36c364f3a669386
-
Filesize
179KB
MD544e8d7d50632d22cf63147b1d0a35702
SHA18e2530631af96415dbbbf65488af6dbd846e48b8
SHA256abe1cbbc6afe5f18e5935afd8adeba1229edc339354ef987b2dfef4d7e546b96
SHA51271d095df04f9b3718df52dcd23cca8d804310cd2865f3a9ef9f01e9ad877a18512f2e70a26757c5d30cd7f5f45e6815a8d276dc3056e2ab88e6c7591ba5d417e
-
Filesize
168KB
MD534886f4c9f0ab843bc134224041f6543
SHA1c8958e7a268a59f06d328727e8e006d5341d4b6e
SHA2563228c4de743a9333cc06d1a442fd9db7c7454e87b9de796f192d100c2b0c7c6c
SHA512a44b6e47e1040dba35b093d5b68d0ae6837eaf7e1a796dbf6efdd8d681418b9b8c7528658c1ad1a2f83d2964e3285c3c16139f4198ac2c63413740496f4f085a