Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
dc5002a9d595d9b1ee2535e31ad8b64faa2fb576d5f4d7a9ddd37c634b453578.exe
Resource
win10v2004-20241007-en
General
-
Target
dc5002a9d595d9b1ee2535e31ad8b64faa2fb576d5f4d7a9ddd37c634b453578.exe
-
Size
479KB
-
MD5
c9ea61449827eece44fb8cae8b5dec05
-
SHA1
c9cee069121c3d87e7416c778a384b8a0c95eaeb
-
SHA256
dc5002a9d595d9b1ee2535e31ad8b64faa2fb576d5f4d7a9ddd37c634b453578
-
SHA512
3febd96a5d29bd3b3ee7a7a0439723dd8281cb4c5025c31e6bc47b648881d7d9cd544bd1d63ffc051c897b56883fb1acdeed043df19b02dfbbe9911d85e00029
-
SSDEEP
12288:dMray903LaYtHl5c1u31cTt8y+5kMx3nXwA0M:LykppXWTuy+5N0M
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/232-15-0x00000000023F0000-0x000000000240A000-memory.dmp healer behavioral1/memory/232-18-0x0000000005080000-0x0000000005098000-memory.dmp healer behavioral1/memory/232-24-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/232-46-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/232-44-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/232-42-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/232-40-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/232-38-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/232-36-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/232-34-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/232-23-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/232-32-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/232-30-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/232-28-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/232-27-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/232-20-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/232-19-0x0000000005080000-0x0000000005092000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k9580713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9580713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9580713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9580713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9580713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9580713.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023caa-49.dat family_redline behavioral1/memory/4732-51-0x0000000000D00000-0x0000000000D30000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1932 y3437898.exe 232 k9580713.exe 4732 l8280674.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k9580713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k9580713.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dc5002a9d595d9b1ee2535e31ad8b64faa2fb576d5f4d7a9ddd37c634b453578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3437898.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5072 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l8280674.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc5002a9d595d9b1ee2535e31ad8b64faa2fb576d5f4d7a9ddd37c634b453578.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y3437898.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k9580713.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 232 k9580713.exe 232 k9580713.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 232 k9580713.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5016 wrote to memory of 1932 5016 dc5002a9d595d9b1ee2535e31ad8b64faa2fb576d5f4d7a9ddd37c634b453578.exe 83 PID 5016 wrote to memory of 1932 5016 dc5002a9d595d9b1ee2535e31ad8b64faa2fb576d5f4d7a9ddd37c634b453578.exe 83 PID 5016 wrote to memory of 1932 5016 dc5002a9d595d9b1ee2535e31ad8b64faa2fb576d5f4d7a9ddd37c634b453578.exe 83 PID 1932 wrote to memory of 232 1932 y3437898.exe 85 PID 1932 wrote to memory of 232 1932 y3437898.exe 85 PID 1932 wrote to memory of 232 1932 y3437898.exe 85 PID 1932 wrote to memory of 4732 1932 y3437898.exe 95 PID 1932 wrote to memory of 4732 1932 y3437898.exe 95 PID 1932 wrote to memory of 4732 1932 y3437898.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc5002a9d595d9b1ee2535e31ad8b64faa2fb576d5f4d7a9ddd37c634b453578.exe"C:\Users\Admin\AppData\Local\Temp\dc5002a9d595d9b1ee2535e31ad8b64faa2fb576d5f4d7a9ddd37c634b453578.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3437898.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3437898.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9580713.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9580713.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8280674.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8280674.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4732
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5072
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5101d1767c82a80baa866837e96c225e5
SHA1767c7dc52315d7e27ea8b37adcb02d9cc6836ef4
SHA25661a2c09ca1713199b164ee0eddbe64186e25c5047127c3a37023e0f176578cba
SHA512f23a7acad4fd258f71fb5c08916e1c5fad624b7725542172f5b54861ddc09d13dcaee08ada72206d47defa6bd9fd64ee29c5d56303d92d9e74d0f38a1dbf440b
-
Filesize
180KB
MD5cf5efd56ef50ea9e83e81f691783756f
SHA1db8b9e373e9790cb4b113d7124d63fc4f35ecb8a
SHA25642d47c58fa2591c152603ff6e1f3179996f055ac8ac8f659dd08b0fb5f5d14d2
SHA512ab7cbc67dc9bb8097eb445127a7cfd140172ebc91508f08b2d2e95aaa90d64e2030a6cf3f416bbb5ab2aac4973bacc359a43bb0ac31caefe2a6828fbbc8164fb
-
Filesize
168KB
MD5aec89b017dca675dbfcee9982aeddf14
SHA1a31db72ac441b23a6da1b6aa5409677891e766de
SHA256c04865b20ce6a89cc3d9dad48bce7e062e55c44c4a282b548e232d8452af5eb0
SHA51207c61eb6d4dd7feb9b747cad578fba804c18e4ba0b5a0127325bfe9956f4b82882628e9788dc752ab9ef7e37426536a1ca06610489bfa74526e34c1e0530612f