Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25.exe
Resource
win10v2004-20241007-en
General
-
Target
1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25.exe
-
Size
873KB
-
MD5
4300f8bc621a3afcb9442a5c866fbc75
-
SHA1
3921a76e6971773c38145c1454847c7fd8cf20f0
-
SHA256
1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25
-
SHA512
a93fed1b66cd0e903fd9d0363dcd8ef9b84af4cf9c79c17dd260574077306697b86271c975e1d66c6e4bc12c5b6423bd2b92f3cc6b11276c4ec5707a4ae722a2
-
SSDEEP
24576:TycPs6HJm3H6iA7IpSoY/29knp9lY58UZlKQxNmp73g:mZMEJB9Up9lclKQxQp7
Malware Config
Extracted
redline
diza
83.97.73.122:19062
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4140-22-0x0000000000390000-0x000000000039A000-memory.dmp healer -
Healer family
-
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9370770.exe family_redline behavioral1/memory/4884-30-0x0000000000B20000-0x0000000000B4A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
y1481756.exey5938721.exek5132050.exel9370770.exepid process 4676 y1481756.exe 4852 y5938721.exe 3704 k5132050.exe 4884 l9370770.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25.exey1481756.exey5938721.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1481756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y5938721.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
k5132050.exedescription pid process target process PID 3704 set thread context of 4140 3704 k5132050.exe AppLaunch.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AppLaunch.exel9370770.exe1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25.exey1481756.exey5938721.exek5132050.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l9370770.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y1481756.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y5938721.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k5132050.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 4140 AppLaunch.exe 4140 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 4140 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25.exey1481756.exey5938721.exek5132050.exedescription pid process target process PID 4660 wrote to memory of 4676 4660 1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25.exe y1481756.exe PID 4660 wrote to memory of 4676 4660 1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25.exe y1481756.exe PID 4660 wrote to memory of 4676 4660 1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25.exe y1481756.exe PID 4676 wrote to memory of 4852 4676 y1481756.exe y5938721.exe PID 4676 wrote to memory of 4852 4676 y1481756.exe y5938721.exe PID 4676 wrote to memory of 4852 4676 y1481756.exe y5938721.exe PID 4852 wrote to memory of 3704 4852 y5938721.exe k5132050.exe PID 4852 wrote to memory of 3704 4852 y5938721.exe k5132050.exe PID 4852 wrote to memory of 3704 4852 y5938721.exe k5132050.exe PID 3704 wrote to memory of 4140 3704 k5132050.exe AppLaunch.exe PID 3704 wrote to memory of 4140 3704 k5132050.exe AppLaunch.exe PID 3704 wrote to memory of 4140 3704 k5132050.exe AppLaunch.exe PID 3704 wrote to memory of 4140 3704 k5132050.exe AppLaunch.exe PID 3704 wrote to memory of 4140 3704 k5132050.exe AppLaunch.exe PID 4852 wrote to memory of 4884 4852 y5938721.exe l9370770.exe PID 4852 wrote to memory of 4884 4852 y5938721.exe l9370770.exe PID 4852 wrote to memory of 4884 4852 y5938721.exe l9370770.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25.exe"C:\Users\Admin\AppData\Local\Temp\1d94542113f46242881a6bd5a56490747173eb0830468d496b5f4e0c16812a25.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1481756.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1481756.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5938721.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5938721.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5132050.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5132050.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9370770.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9370770.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4884
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601KB
MD5b76021b826789a1078f1a169d7ba3bf1
SHA11b5a0882b6f60ae0c9e08f42251da5c206486054
SHA256583599948674ae3c331e0fa326eca17649f6985db9fe9dc33a1e13ee8c89006b
SHA5128bd996b0cce24d8734962378bdc59b04b066a9ccad6ed8dc78a4e55f9c794c5fb05ddd78102936843c610fa76e4383ab76acc981d9cb0d4a25c42242184731b5
-
Filesize
276KB
MD5fe978fb73ba3f7aaa88213d0be900562
SHA1b7db5cb3f74bc967f7a3d18d6f17947442a68aec
SHA2564188590754416459652388a4ce2dae03bc9b5d919520d6937829fb9dbf41aa5f
SHA512372572214147f9a98fa7c9aadfd15395814fa9b358ccfbe01c0beef61173fe9adee84f4feae1fca4776bd0ad47b744a9649b213eefbff9c010fb447a5a4be1f2
-
Filesize
194KB
MD5fa8319afaec78b0db6d80523cdeedad7
SHA18d957dde2ee592150fc23850e74d8d33abc126b0
SHA25676df42bffba49df2910516f442f6f5328bf614f608813b4c9e059306f755e23f
SHA512461a7eb7312b63d73eed1a556cd725d7ee55c40f096bfe80072c8a909c26e3d93ee96c7c68ae21d0c76936157c570a8dd6d6d9ea9729d380e344e91ddbd1e485
-
Filesize
146KB
MD516b024c0f5354d90ab50c89318b8e995
SHA13b0ec005128e278541a43bd8b4184e87967da8a4
SHA256370dcb48a26bc438bc6aa5c00c94dece4c44881b434061af75d7ae4cb9a68f88
SHA512a594e8a445b59842cecc9eb4e3fe006bc199a838906acaa78306992df8c01bdef7318f1205ce119f246b7d57bd6f1264c1bb8996173508ea5240c0eca3e7f1d4