Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
80923e2abd756dc6c8f1eb716f629de938babeac9e75226765a846b253343457.exe
Resource
win10v2004-20241007-en
General
-
Target
80923e2abd756dc6c8f1eb716f629de938babeac9e75226765a846b253343457.exe
-
Size
478KB
-
MD5
11e3c291ca4ab9ade446a5dfc7b98a78
-
SHA1
dedacc4eed3f7cf7044d90c38448fb96a9459589
-
SHA256
80923e2abd756dc6c8f1eb716f629de938babeac9e75226765a846b253343457
-
SHA512
8c46b8f5ea2f3b8322e3d66b571d43837529927fd675d78ae53e2b3150a5fdfc197bc568569b10fc1635f78c20bbb9c53d820bca815d10414a79fa23f4236b2b
-
SSDEEP
12288:5MrOy90A7wAbFyGI5c1u31QTHEOP0w8n8reOHLD1gn7D:jy1NbMLX+TkOP+8pL5gnX
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/264-15-0x0000000002450000-0x000000000246A000-memory.dmp healer behavioral1/memory/264-18-0x0000000004980000-0x0000000004998000-memory.dmp healer behavioral1/memory/264-47-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/264-45-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/264-43-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/264-41-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/264-39-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/264-37-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/264-35-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/264-33-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/264-31-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/264-29-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/264-27-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/264-25-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/264-23-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/264-21-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/264-20-0x0000000004980000-0x0000000004992000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k4647399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4647399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4647399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4647399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4647399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4647399.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023bbe-55.dat family_redline behavioral1/memory/3304-56-0x0000000000160000-0x0000000000190000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3480 y5083217.exe 264 k4647399.exe 3304 l6881655.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k4647399.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k4647399.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 80923e2abd756dc6c8f1eb716f629de938babeac9e75226765a846b253343457.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5083217.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5012 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y5083217.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k4647399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l6881655.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80923e2abd756dc6c8f1eb716f629de938babeac9e75226765a846b253343457.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 264 k4647399.exe 264 k4647399.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 264 k4647399.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2064 wrote to memory of 3480 2064 80923e2abd756dc6c8f1eb716f629de938babeac9e75226765a846b253343457.exe 84 PID 2064 wrote to memory of 3480 2064 80923e2abd756dc6c8f1eb716f629de938babeac9e75226765a846b253343457.exe 84 PID 2064 wrote to memory of 3480 2064 80923e2abd756dc6c8f1eb716f629de938babeac9e75226765a846b253343457.exe 84 PID 3480 wrote to memory of 264 3480 y5083217.exe 86 PID 3480 wrote to memory of 264 3480 y5083217.exe 86 PID 3480 wrote to memory of 264 3480 y5083217.exe 86 PID 3480 wrote to memory of 3304 3480 y5083217.exe 95 PID 3480 wrote to memory of 3304 3480 y5083217.exe 95 PID 3480 wrote to memory of 3304 3480 y5083217.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\80923e2abd756dc6c8f1eb716f629de938babeac9e75226765a846b253343457.exe"C:\Users\Admin\AppData\Local\Temp\80923e2abd756dc6c8f1eb716f629de938babeac9e75226765a846b253343457.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5083217.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5083217.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4647399.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4647399.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:264
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6881655.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6881655.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3304
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5012
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5cee666f74354c2861938b291224d09bd
SHA1b91a90d7ca24704098e84e64f59704666d430cd6
SHA256193c9c93e77c0f611fada434e73cdaea740be93e51a34ec8d6078c77e6a19e79
SHA512a6c427c05214ad30f5a38d2e015029fe3211927e258e7b1596f0e0f5f02eb04c72a6a24061c07cf7b996eec36f598d6ca59dca4bd37471a23f37104e689fd7f7
-
Filesize
180KB
MD59bab430c18f8063ebb5bc4df29bd1d77
SHA1e49c628c62a5289b1e98c3bae328285186b0f1ff
SHA2560a0701db0280c3c81560154af39d86174ac7b38127126636847903a0684db68a
SHA5126d418fe5ef7bfa580312c4969e617de5a284ea068c10fb43e54d13e59dd5dc9a10e7850368d897f568ad23159da1515c2b46ddf0596fd3e62b2885ca8fbf96ed
-
Filesize
168KB
MD56013c779e21c2a2d1fb897f42ec20e5f
SHA19589493cda44d155c9f610cd68c85ed1ebcd4a57
SHA25643c27291a6ab460cf1b7ec5e1960e7b7a3f65de4b05b70b8db2f535be38c35e6
SHA512c074704ae41bd9054ce07672fba5995c511f3a0d5c54ce26563e6045d4e6b5d10e595fe3935b8a732716e2cfee82fc06d3ae3525f02295ee6c7ca2a14f075856