Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 07:07
Static task
static1
Behavioral task
behavioral1
Sample
81e8a0ef9f5ab53837c1aabbcba309745866286bcd3b9360e9a2206e1215fb2d.exe
Resource
win10v2004-20241007-en
General
-
Target
81e8a0ef9f5ab53837c1aabbcba309745866286bcd3b9360e9a2206e1215fb2d.exe
-
Size
479KB
-
MD5
6f30b008421fab1ccb48033a87708f22
-
SHA1
5c8f526083b540c8b1658d449356192f819eb1ad
-
SHA256
81e8a0ef9f5ab53837c1aabbcba309745866286bcd3b9360e9a2206e1215fb2d
-
SHA512
5348d2fb6b3a093721b53055d63333fe52a2fbd941a63d06597cff2dae0eb58aa4caac062f0c6b73f4b2f551a5ac138678cc719728d280159152c4a6ac7c537b
-
SSDEEP
12288:sMrGy90LbymToQVoEX2lOpiyxnw6tZlnna2B:qyYumDoUN26DNna2B
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2760-15-0x00000000048E0000-0x00000000048FA000-memory.dmp healer behavioral1/memory/2760-18-0x0000000004980000-0x0000000004998000-memory.dmp healer behavioral1/memory/2760-47-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2760-45-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2760-43-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2760-41-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2760-39-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2760-37-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2760-35-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2760-33-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2760-31-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2760-29-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2760-27-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2760-25-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2760-23-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2760-21-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2760-20-0x0000000004980000-0x0000000004992000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1433142.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1433142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1433142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1433142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1433142.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1433142.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cb7-55.dat family_redline behavioral1/memory/3000-56-0x0000000000F20000-0x0000000000F50000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4148 y2892229.exe 2760 k1433142.exe 3000 l9703665.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1433142.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1433142.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 81e8a0ef9f5ab53837c1aabbcba309745866286bcd3b9360e9a2206e1215fb2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2892229.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81e8a0ef9f5ab53837c1aabbcba309745866286bcd3b9360e9a2206e1215fb2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y2892229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k1433142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l9703665.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2760 k1433142.exe 2760 k1433142.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2760 k1433142.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1132 wrote to memory of 4148 1132 81e8a0ef9f5ab53837c1aabbcba309745866286bcd3b9360e9a2206e1215fb2d.exe 83 PID 1132 wrote to memory of 4148 1132 81e8a0ef9f5ab53837c1aabbcba309745866286bcd3b9360e9a2206e1215fb2d.exe 83 PID 1132 wrote to memory of 4148 1132 81e8a0ef9f5ab53837c1aabbcba309745866286bcd3b9360e9a2206e1215fb2d.exe 83 PID 4148 wrote to memory of 2760 4148 y2892229.exe 84 PID 4148 wrote to memory of 2760 4148 y2892229.exe 84 PID 4148 wrote to memory of 2760 4148 y2892229.exe 84 PID 4148 wrote to memory of 3000 4148 y2892229.exe 100 PID 4148 wrote to memory of 3000 4148 y2892229.exe 100 PID 4148 wrote to memory of 3000 4148 y2892229.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\81e8a0ef9f5ab53837c1aabbcba309745866286bcd3b9360e9a2206e1215fb2d.exe"C:\Users\Admin\AppData\Local\Temp\81e8a0ef9f5ab53837c1aabbcba309745866286bcd3b9360e9a2206e1215fb2d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2892229.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2892229.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1433142.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1433142.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9703665.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9703665.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3000
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5958215b5f3bdf367eb77c07c373ea674
SHA13ca1771018313d937ee140030605e16a4773b3b1
SHA2565d86bbba6c71ba7b69d4deb2a128a6d0ba9f7424966d4d1fb9e4691f672790fa
SHA512cd7067bd8aacf1ae1750121df9e612e57d3fa5c36ab26068b462034b0db34590431d6dd523c35d1f17e06da363d70493c46d0e4b7bd24b3ef9819caca4e4485b
-
Filesize
180KB
MD5801b681f8ec14592f1fe714bf54241e6
SHA1a85800680e6c2fcb5b1fefffeb6952f36032c36a
SHA2564e3260104a42c87120b3bc4dcb6ada317fe478f4583f364636ff6fcd39b23dd9
SHA512a8874b9421253beffab64b001055bc45af175d03191e747d6528a360cae98008fe647d7a2c38a3e77aafd951a649f5a28b568b9b2d20b6561a7723c8867f1e49
-
Filesize
168KB
MD5332712d5e97134a18c2545a1769c300f
SHA1a543be0a760df3fb95fd6267383b3e384c8b09a5
SHA256375d2f81e6319dfbc6ca57768a51a05e6d5d8d076d6dd2317d1ab2e002531ac8
SHA512f771f5c92310380ee21e33700010b31b98408420324a7a7b9d0193157427d9264a6901d8e3cf99397e6f6d6a80605741d8be13a47e9e15d0e2ef00fec1287880