Analysis Overview
SHA256
18c39760ddddb94cbe4998455e06c0f11014becd4b98b71078d1dc20d31ae0cb
Threat Level: Known bad
The file 18c39760ddddb94cbe4998455e06c0f11014becd4b98b71078d1dc20d31ae0cb was found to be: Known bad.
Malicious Activity Summary
RedLine
Detects Healer an antivirus disabler dropper
RedLine payload
Redline family
Healer
Healer family
Modifies Windows Defender Real-time Protection settings
Checks computer location settings
Executes dropped EXE
Windows security modification
Adds Run key to start application
System Location Discovery: System Language Discovery
Program crash
Enumerates physical storage devices
Unsigned PE
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-05 06:05
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-05 06:05
Reported
2024-11-05 06:07
Platform
win10v2004-20241007-en
Max time kernel
145s
Max time network
149s
Command Line
Signatures
Detects Healer an antivirus disabler dropper
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Healer
Healer family
Modifies Windows Defender Real-time Protection settings
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr571188.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr571188.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr571188.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr571188.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr571188.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr571188.exe | N/A |
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Redline family
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku338025.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioG5013.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr571188.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku338025.exe | N/A |
| N/A | N/A | C:\Windows\Temp\1.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr812715.exe | N/A |
Windows security modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr571188.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\18c39760ddddb94cbe4998455e06c0f11014becd4b98b71078d1dc20d31ae0cb.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioG5013.exe | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku338025.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\Temp\1.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr812715.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\18c39760ddddb94cbe4998455e06c0f11014becd4b98b71078d1dc20d31ae0cb.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioG5013.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku338025.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr571188.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr571188.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr571188.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku338025.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\18c39760ddddb94cbe4998455e06c0f11014becd4b98b71078d1dc20d31ae0cb.exe
"C:\Users\Admin\AppData\Local\Temp\18c39760ddddb94cbe4998455e06c0f11014becd4b98b71078d1dc20d31ae0cb.exe"
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioG5013.exe
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioG5013.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr571188.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr571188.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku338025.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku338025.exe
C:\Windows\Temp\1.exe
"C:\Windows\Temp\1.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1268 -ip 1268
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 1380
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr812715.exe
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr812715.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| US | 8.8.8.8:53 | 21.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp | |
| FI | 77.91.124.145:4125 | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioG5013.exe
| MD5 | d34d43e55f5ab29a91834be2d3bebb37 |
| SHA1 | 5af48e96a6a5fa6192f92dbb169f29cf70e454bf |
| SHA256 | 95ed2c258b6e3aa1e1ce3d3c48083b6dcd90950d33fb255c4ea66083fd92ddf2 |
| SHA512 | 5ba49f8c6e7f2fda0bc15869acc8096b6b7cb1bba0d66d6050454c7215bd890098b9af12bca66ecd6b044e88e539121018b34fc442ae775cb7f8fe628c3d58f8 |
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr571188.exe
| MD5 | 19e6e86b7e192dc44a58eb4e972e1724 |
| SHA1 | 1c55de643b011f08be06e76bc1037fb7e8216ec2 |
| SHA256 | b44f9e18080296806a5a1316cbea04de1583c14d6daa2dd64c4d602f0e60ed86 |
| SHA512 | af8f334caf7cea6d0a12dc2bac7f12b1b080b4ab6e98783537a20076634a3d61524351ac56c4f111fd7dad00cf8a1bd46a1111053369c0efcf34dc8f73b044ef |
memory/1028-14-0x00007FFAC8BA3000-0x00007FFAC8BA5000-memory.dmp
memory/1028-15-0x0000000000DA0000-0x0000000000DAA000-memory.dmp
memory/1028-16-0x00007FFAC8BA3000-0x00007FFAC8BA5000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku338025.exe
| MD5 | 471cf7efbc22b625de8b1be918d148fc |
| SHA1 | 6c6c273bda476cf459e782bd272f53c40f80c33e |
| SHA256 | 68465e19192442327f94f6eeece8e6014f8bea803a39b9545c46108920ee7fc7 |
| SHA512 | 2a2fb7b6330bf5a1df7035dafb1b256f995edcf3fe4c9e5ca315e22c98119cb1bf3157ecafd5e28c8e56b2ecfcb698e820fc803797b50997da14aaea7c4b31d3 |
memory/1268-22-0x0000000004C90000-0x0000000004CF6000-memory.dmp
memory/1268-23-0x0000000004D70000-0x0000000005314000-memory.dmp
memory/1268-24-0x0000000005320000-0x0000000005386000-memory.dmp
memory/1268-36-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-28-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-26-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-25-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-34-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-88-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-86-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-84-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-82-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-78-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-76-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-74-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-70-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-68-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-66-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-64-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-62-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-60-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-58-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-54-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-52-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-50-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-48-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-46-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-44-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-42-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-40-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-32-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-30-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-80-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-72-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-57-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-38-0x0000000005320000-0x000000000537F000-memory.dmp
memory/1268-2105-0x0000000005540000-0x0000000005572000-memory.dmp
C:\Windows\Temp\1.exe
| MD5 | 1073b2e7f778788852d3f7bb79929882 |
| SHA1 | 7f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4 |
| SHA256 | c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb |
| SHA512 | 90cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0 |
memory/4296-2118-0x0000000000D10000-0x0000000000D40000-memory.dmp
memory/4296-2119-0x0000000005530000-0x0000000005536000-memory.dmp
memory/4296-2120-0x0000000005CA0000-0x00000000062B8000-memory.dmp
memory/4296-2121-0x0000000005790000-0x000000000589A000-memory.dmp
memory/4296-2122-0x00000000056A0000-0x00000000056B2000-memory.dmp
memory/4296-2123-0x0000000005700000-0x000000000573C000-memory.dmp
memory/4296-2124-0x0000000005740000-0x000000000578C000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr812715.exe
| MD5 | ff2a8c605e453675eacb5f55cd6355a7 |
| SHA1 | 0cf737687d82908a8ed1f7c10a190c7d5d6fbbf2 |
| SHA256 | 772a9d51158aa3939de8a2129c7c4bf53a0d942da5ed4e33da2ed4302ef3e56b |
| SHA512 | fc596e9a4c32a950b14f1d4bf4b550b295013b5d412b9a0580c6b700edf68d1e71afc5491f39fec349ed5a1f5cef3eec57308f3a44c48ae50f5116e94dd06bd9 |
memory/1620-2129-0x00000000007A0000-0x00000000007D0000-memory.dmp
memory/1620-2130-0x00000000050C0000-0x00000000050C6000-memory.dmp