Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
47aed9bcbcddbf648d9bcafb8dd75ca03735525fa323898b116fb0720b7c5061.exe
Resource
win10v2004-20241007-en
General
-
Target
47aed9bcbcddbf648d9bcafb8dd75ca03735525fa323898b116fb0720b7c5061.exe
-
Size
479KB
-
MD5
4e234ed57b3be7f51ab573d6323e0de2
-
SHA1
18b4f514b021d9fa56ba3e8b92467e8ce4a8f147
-
SHA256
47aed9bcbcddbf648d9bcafb8dd75ca03735525fa323898b116fb0720b7c5061
-
SHA512
c806423d968734e7d6ff24ea6388eed0fec67cd7e2e9daed49d7a98cf0c0fabfdb165e6242cf2f5f43f0f7e7fc75c904487a9590bd12308d7d2ae8bbcce84d50
-
SSDEEP
12288:lMrcy906VtJdczela2SoDqsULCQdgO21KEvth46Qra5mi9H:By9tJF45slQWhKiC6t5mi9H
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3928-15-0x00000000048F0000-0x000000000490A000-memory.dmp healer behavioral1/memory/3928-18-0x0000000004F40000-0x0000000004F58000-memory.dmp healer behavioral1/memory/3928-38-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3928-46-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3928-44-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3928-42-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3928-40-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3928-36-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3928-35-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3928-32-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3928-30-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3928-28-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3928-27-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3928-24-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3928-22-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3928-20-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/3928-19-0x0000000004F40000-0x0000000004F52000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k2484946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2484946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2484946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2484946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2484946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2484946.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cc0-54.dat family_redline behavioral1/memory/3256-56-0x0000000000980000-0x00000000009B0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3604 y4280200.exe 3928 k2484946.exe 3256 l3328889.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2484946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2484946.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4280200.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 47aed9bcbcddbf648d9bcafb8dd75ca03735525fa323898b116fb0720b7c5061.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2120 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k2484946.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l3328889.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47aed9bcbcddbf648d9bcafb8dd75ca03735525fa323898b116fb0720b7c5061.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y4280200.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3928 k2484946.exe 3928 k2484946.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3928 k2484946.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1160 wrote to memory of 3604 1160 47aed9bcbcddbf648d9bcafb8dd75ca03735525fa323898b116fb0720b7c5061.exe 86 PID 1160 wrote to memory of 3604 1160 47aed9bcbcddbf648d9bcafb8dd75ca03735525fa323898b116fb0720b7c5061.exe 86 PID 1160 wrote to memory of 3604 1160 47aed9bcbcddbf648d9bcafb8dd75ca03735525fa323898b116fb0720b7c5061.exe 86 PID 3604 wrote to memory of 3928 3604 y4280200.exe 87 PID 3604 wrote to memory of 3928 3604 y4280200.exe 87 PID 3604 wrote to memory of 3928 3604 y4280200.exe 87 PID 3604 wrote to memory of 3256 3604 y4280200.exe 92 PID 3604 wrote to memory of 3256 3604 y4280200.exe 92 PID 3604 wrote to memory of 3256 3604 y4280200.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\47aed9bcbcddbf648d9bcafb8dd75ca03735525fa323898b116fb0720b7c5061.exe"C:\Users\Admin\AppData\Local\Temp\47aed9bcbcddbf648d9bcafb8dd75ca03735525fa323898b116fb0720b7c5061.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4280200.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4280200.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2484946.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2484946.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3328889.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3328889.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3256
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2120
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5bd28dac9bdf9cfa40124d34994dbb9c6
SHA1c89734082727055e332348741119b2dd6358b8e1
SHA256acd329dad3a1d1d9f89cacf945afc5be98f1eaf9850401d56817cce8f290c207
SHA51246a9d90b7c0c616ca7146b0cf4d6e79507e725a3ef5b76362c4fb68bb8e6f18d70656ec3d76e12a5e24309999b8de1f6b6b8c8ac6f2e88c1c74370f7be6b2907
-
Filesize
180KB
MD5233ee980378294e8c85ca193507e5966
SHA1e27d700bd8ecb08009d5681293b0405caa340cca
SHA256d16797c300b2521d188ca3424f4b5b775d295a3e24d6845bc5ad2c743730d3d9
SHA512332234b8ee068b4d4926edd37b79467c71f8a271c907b40f76973ec1b3bcd07ae354eb54caf04a280f00dfef5d4e368fb82e1d5098214fc1e245a44bbd831778
-
Filesize
168KB
MD55fbfb4a9093a570bcb1698fd5da1d075
SHA1e97e006f9c112ca9fbb3c98ba1f2f1f17b733acf
SHA2569a7bc538ebab7ea73158cfb5109662e17271157f1c59285ba8c6c80f1961ccae
SHA512343269f6ef1511436b53184a36ee2a79b9b36966480b89b6f7c622e4ba9d5319a4cfa16f6c776ca71c9b6aed1d3f3147fc672216844cd8b5f8ebbab63cd0b51b