Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d.exe
Resource
win10v2004-20241007-en
General
-
Target
57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d.exe
-
Size
479KB
-
MD5
6db0a782f894f25ceecffe88768b39ac
-
SHA1
aec479646d5910d6650e1a42c298839e86d9f359
-
SHA256
57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d
-
SHA512
adea3d90ced418823837aeda81359e1c7b85974de5ce0091d5b9ee7284c26fd53f8efd4c49e1f3ae3d4fd911b6d949cc17295232659333acf3cef005b1b71621
-
SSDEEP
12288:BMr3y90jQyTQ0qy1dE5wcEimBY5Do4m9:qyAQZ0i1K
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3556-15-0x0000000002120000-0x000000000213A000-memory.dmp healer behavioral1/memory/3556-18-0x00000000022D0000-0x00000000022E8000-memory.dmp healer behavioral1/memory/3556-47-0x00000000022D0000-0x00000000022E2000-memory.dmp healer behavioral1/memory/3556-45-0x00000000022D0000-0x00000000022E2000-memory.dmp healer behavioral1/memory/3556-43-0x00000000022D0000-0x00000000022E2000-memory.dmp healer behavioral1/memory/3556-41-0x00000000022D0000-0x00000000022E2000-memory.dmp healer behavioral1/memory/3556-39-0x00000000022D0000-0x00000000022E2000-memory.dmp healer behavioral1/memory/3556-37-0x00000000022D0000-0x00000000022E2000-memory.dmp healer behavioral1/memory/3556-35-0x00000000022D0000-0x00000000022E2000-memory.dmp healer behavioral1/memory/3556-33-0x00000000022D0000-0x00000000022E2000-memory.dmp healer behavioral1/memory/3556-31-0x00000000022D0000-0x00000000022E2000-memory.dmp healer behavioral1/memory/3556-29-0x00000000022D0000-0x00000000022E2000-memory.dmp healer behavioral1/memory/3556-27-0x00000000022D0000-0x00000000022E2000-memory.dmp healer behavioral1/memory/3556-25-0x00000000022D0000-0x00000000022E2000-memory.dmp healer behavioral1/memory/3556-23-0x00000000022D0000-0x00000000022E2000-memory.dmp healer behavioral1/memory/3556-21-0x00000000022D0000-0x00000000022E2000-memory.dmp healer behavioral1/memory/3556-20-0x00000000022D0000-0x00000000022E2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9674739.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k9674739.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9674739.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9674739.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9674739.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9674739.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cb5-54.dat family_redline behavioral1/memory/3984-56-0x00000000009A0000-0x00000000009D0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4620 y4322945.exe 3556 k9674739.exe 3984 l4056875.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k9674739.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k9674739.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4322945.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y4322945.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k9674739.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l4056875.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3556 k9674739.exe 3556 k9674739.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3556 k9674739.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2024 wrote to memory of 4620 2024 57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d.exe 85 PID 2024 wrote to memory of 4620 2024 57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d.exe 85 PID 2024 wrote to memory of 4620 2024 57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d.exe 85 PID 4620 wrote to memory of 3556 4620 y4322945.exe 86 PID 4620 wrote to memory of 3556 4620 y4322945.exe 86 PID 4620 wrote to memory of 3556 4620 y4322945.exe 86 PID 4620 wrote to memory of 3984 4620 y4322945.exe 98 PID 4620 wrote to memory of 3984 4620 y4322945.exe 98 PID 4620 wrote to memory of 3984 4620 y4322945.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d.exe"C:\Users\Admin\AppData\Local\Temp\57d5ea30e8afbcea939465c403790fa0085dbd0eff1ac68eaaa7d78b2f59c76d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4322945.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4322945.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9674739.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9674739.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4056875.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4056875.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3984
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD58ac14995dc38b6605a22863bf8d1d243
SHA1b04fff14f99f55691b5bb0f3e7db79ac65615bd0
SHA2569cf090644a2ce922f9c20353252d4de50335d77233b4ee2071f49a962fc8c00b
SHA512cea9c9041629f4dd92c99d389354fe7d348e7d1753126084fe30440d17a87efcfa920405bb72f5d01cd144118ef6fc36d99d0765ceab1d6c264f57784f045655
-
Filesize
180KB
MD522acedd0c32204ce6545487072bf87a8
SHA18795f89bf7291499a281e7c50538a31cb0d0964d
SHA256f4acc879a404de7b966d11479a9578c8e5d362f95601f6a00405306da52aefba
SHA512af347a1c917cb4fa4f8dc9dc9c3e6ba91b178f5c713c9c5f77dc42877fb4fbaebc60ddbe6365d52c7bbd58979e3a18d24904468ce4f6ad9c540558e5fd448e63
-
Filesize
168KB
MD555e260eb7c221c764cc051916bb52442
SHA11a0e24cf05a4968c637792856e634c8c461a2d79
SHA2564a90b266a3de831a7e7ad03ac658e055ac051b916a9eff3a4563d0523734ad21
SHA512b6037061190f4e9294bcd2d9b5da30334e1d3cdcbb4b93250e608ae5778839543ab66566512e05ca8c1621bff4f8fac6b79994d61e00b798c3c120ebf510dc23