Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
a1ed29869568ed1630c15caf55bf27837ad263ab2a67cf764cb4f9e1b91ede87.exe
Resource
win10v2004-20241007-en
General
-
Target
a1ed29869568ed1630c15caf55bf27837ad263ab2a67cf764cb4f9e1b91ede87.exe
-
Size
479KB
-
MD5
6c45902e0dc615f5e20e1085a91d3a1d
-
SHA1
f058cdcab4cfaea29c7f609882005be1a913f575
-
SHA256
a1ed29869568ed1630c15caf55bf27837ad263ab2a67cf764cb4f9e1b91ede87
-
SHA512
c1e98cb2e49fbec0603f9f13e9b6ab03473c1d09067b1b630ec51f34e6f542a8f2a8d14ffa27afeccc6fd5145f45e9aac55f390929ebd6efbe1cc8195399991b
-
SSDEEP
12288:qMrIy90XpTOamFlzIm+9c5c1u31tTmWd1f21wktCInkWIzDY55h84a:+y0pTvmDucXPTxd1owk2zDY58P
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4320-15-0x00000000022C0000-0x00000000022DA000-memory.dmp healer behavioral1/memory/4320-18-0x00000000023B0000-0x00000000023C8000-memory.dmp healer behavioral1/memory/4320-48-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/4320-46-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/4320-44-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/4320-42-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/4320-40-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/4320-38-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/4320-36-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/4320-34-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/4320-32-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/4320-30-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/4320-28-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/4320-26-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/4320-24-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/4320-22-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/4320-21-0x00000000023B0000-0x00000000023C2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1653349.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1653349.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1653349.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1653349.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1653349.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1653349.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b93-54.dat family_redline behavioral1/memory/1032-56-0x0000000000590000-0x00000000005C0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3000 y9590467.exe 4320 k1653349.exe 1032 l2241688.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1653349.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1653349.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1ed29869568ed1630c15caf55bf27837ad263ab2a67cf764cb4f9e1b91ede87.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9590467.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1ed29869568ed1630c15caf55bf27837ad263ab2a67cf764cb4f9e1b91ede87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y9590467.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k1653349.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l2241688.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4320 k1653349.exe 4320 k1653349.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4320 k1653349.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1976 wrote to memory of 3000 1976 a1ed29869568ed1630c15caf55bf27837ad263ab2a67cf764cb4f9e1b91ede87.exe 83 PID 1976 wrote to memory of 3000 1976 a1ed29869568ed1630c15caf55bf27837ad263ab2a67cf764cb4f9e1b91ede87.exe 83 PID 1976 wrote to memory of 3000 1976 a1ed29869568ed1630c15caf55bf27837ad263ab2a67cf764cb4f9e1b91ede87.exe 83 PID 3000 wrote to memory of 4320 3000 y9590467.exe 84 PID 3000 wrote to memory of 4320 3000 y9590467.exe 84 PID 3000 wrote to memory of 4320 3000 y9590467.exe 84 PID 3000 wrote to memory of 1032 3000 y9590467.exe 94 PID 3000 wrote to memory of 1032 3000 y9590467.exe 94 PID 3000 wrote to memory of 1032 3000 y9590467.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1ed29869568ed1630c15caf55bf27837ad263ab2a67cf764cb4f9e1b91ede87.exe"C:\Users\Admin\AppData\Local\Temp\a1ed29869568ed1630c15caf55bf27837ad263ab2a67cf764cb4f9e1b91ede87.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9590467.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9590467.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1653349.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1653349.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2241688.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2241688.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1032
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD563e455fd2cfd546f95a1c7ca576e28cd
SHA137dd534f1f0e14ebcefa02b89a30dd6ece6fca38
SHA2569f72edf0d6730a161049a9797af49e2046e1b86567c9ab5065ecae1ace984662
SHA512c5582356e67c25728eb2de9bf4b54d9c9407f0842363cf8a9c8e4bbae0a3d4d80560265141b70d6802c2ba089d9f309bd18bb91b371c2af471a1f9e9d953bdc0
-
Filesize
180KB
MD565cc207f2635584c07f76fd33dbc6afe
SHA186b1a21ea17ac5a82597d70c91033c10bd06e9d8
SHA2567f8bc8dc2dbebb3343a3de5aa069c5e367f2eba650eb669e2e4250c510a46cfa
SHA5123a1767b4fd30ebb933d35e95230600836c99a374873c74cc7cd1dfb244c0cb71dcbc9885a84fc72fd86d3d9b928a05222bb1d7ed691098712447e0117b8e2ee3
-
Filesize
168KB
MD55b21fa7ad3fff19bdb30c6a2332ead5d
SHA1ee941ddfbbba03dc1191272cbee82ef646f7bff0
SHA25625126b80f7b6211882b858ba331160564f5166d9cdb9f9406d9a559e5e8e88ab
SHA5129e2823f06436499ecc2cce2f0fe29bcce55703316251f0e9196c6422f9414d47042adb064e4a566e44f6cceb6adbe6bae8429cbec8f830e73b04750f3e43ffc8