Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 16:55
Static task
static1
Behavioral task
behavioral1
Sample
912796429a29149a2da4e1edf88cacb103aaedb07f454fd2de77d30c885ea013.exe
Resource
win10v2004-20241007-en
General
-
Target
912796429a29149a2da4e1edf88cacb103aaedb07f454fd2de77d30c885ea013.exe
-
Size
479KB
-
MD5
59599aab5b384289e062e0a0fbbf480c
-
SHA1
9407e9ae58d972c92bd6cb3acb31a817031f0419
-
SHA256
912796429a29149a2da4e1edf88cacb103aaedb07f454fd2de77d30c885ea013
-
SHA512
ee11ff2c36a9fc5620c8c438c94efde064f2efcef342b55b74d46023077eae7221a0138df3086c99240de97cde22c6dd65e3faa04780587d9196510da101fa91
-
SSDEEP
12288:WMrYy90sCkUXa0jL5ROihzzhzjTXT+BXhcu0gqCgjIo8NcW3:KyIkU/5Rj1pCXjcC1
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1872-15-0x00000000049F0000-0x0000000004A0A000-memory.dmp healer behavioral1/memory/1872-18-0x0000000004AC0000-0x0000000004AD8000-memory.dmp healer behavioral1/memory/1872-22-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/1872-24-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/1872-46-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/1872-44-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/1872-42-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/1872-40-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/1872-38-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/1872-36-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/1872-34-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/1872-32-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/1872-30-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/1872-28-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/1872-26-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/1872-19-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/1872-20-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4965104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4965104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4965104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4965104.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k4965104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4965104.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b9e-53.dat family_redline behavioral1/memory/4468-55-0x00000000006F0000-0x0000000000720000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1332 y1202791.exe 1872 k4965104.exe 4468 l1205684.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k4965104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k4965104.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 912796429a29149a2da4e1edf88cacb103aaedb07f454fd2de77d30c885ea013.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1202791.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k4965104.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l1205684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 912796429a29149a2da4e1edf88cacb103aaedb07f454fd2de77d30c885ea013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y1202791.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1872 k4965104.exe 1872 k4965104.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1872 k4965104.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4344 wrote to memory of 1332 4344 912796429a29149a2da4e1edf88cacb103aaedb07f454fd2de77d30c885ea013.exe 83 PID 4344 wrote to memory of 1332 4344 912796429a29149a2da4e1edf88cacb103aaedb07f454fd2de77d30c885ea013.exe 83 PID 4344 wrote to memory of 1332 4344 912796429a29149a2da4e1edf88cacb103aaedb07f454fd2de77d30c885ea013.exe 83 PID 1332 wrote to memory of 1872 1332 y1202791.exe 84 PID 1332 wrote to memory of 1872 1332 y1202791.exe 84 PID 1332 wrote to memory of 1872 1332 y1202791.exe 84 PID 1332 wrote to memory of 4468 1332 y1202791.exe 92 PID 1332 wrote to memory of 4468 1332 y1202791.exe 92 PID 1332 wrote to memory of 4468 1332 y1202791.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\912796429a29149a2da4e1edf88cacb103aaedb07f454fd2de77d30c885ea013.exe"C:\Users\Admin\AppData\Local\Temp\912796429a29149a2da4e1edf88cacb103aaedb07f454fd2de77d30c885ea013.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1202791.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1202791.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4965104.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4965104.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1205684.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1205684.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4468
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD53d3ff6a2903837e16a5c6bcf92fc87b3
SHA1740a456c251924b1b61f3bf5af2db314d1122a1d
SHA256e64488979d1db437352bf34770f7d9727b5353323e562cc850e2c761bd97ff99
SHA512dd022fe579f921e93d388ef7bf2bc3bc36c23327ba19dfdc220d24e7e88822c6745207f541d3e539e3b6b36892a0354b2544770652021d06260f66d80c5f2987
-
Filesize
180KB
MD5cc987276811e4f066394bc8060b1a380
SHA12c73732c3e9b0e9cdf45cca8e24c316b5d512f05
SHA256558b9551c1b9987b3cf60b558c3229dd1f2d26cd4dcb2e8b88ecad7053593c24
SHA5124dd3d269ac3e77695ce368cde50612c22f292157e7d00cbf937719bef257baf1193d504884c2a57dd6699faf3a1235d0aedb7e0f35035fca9cf3fcc6dd17fd2d
-
Filesize
168KB
MD566007a0567284dece8476c72845c1a7f
SHA1e1a5546f52745b3e124e6768a185c0d599d7a2f1
SHA25647d4960c1c7a44861e4078b5c48441078d7b60c2796539d9741baf555e630570
SHA5121e6cb9802697f2ff4451a3a657ee1802f00b6527a799d687b9b087ac3d41dba13e0efe25e64a4bb281dafd0469783006a70e9719f316df9e888437599c4d2fe4