Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
d9fba3938215612fe8c0fa721b0abad9535077af7e2649a82f1f1824a7488699.exe
Resource
win10v2004-20241007-en
General
-
Target
d9fba3938215612fe8c0fa721b0abad9535077af7e2649a82f1f1824a7488699.exe
-
Size
683KB
-
MD5
a030ff86dde36cba574ca3f83123f019
-
SHA1
17be17049f917bae8a206175af2fe3ba1e29347b
-
SHA256
d9fba3938215612fe8c0fa721b0abad9535077af7e2649a82f1f1824a7488699
-
SHA512
6548a8dcd67d101107a0e46df4c4aaca6488bbeafb9ba3deca630e1c6e61adab2ce0633fa94cb651d8e260157122f5e9be347e2fb03b0f93f74e08d7e5ba3093
-
SSDEEP
12288:EMrqy90OTWtXC/NNfvRHPOqWXwG+UqMYG3seNwAyWRqAc4tEl:OyLq0NNfv5mqWXcYiARRqAc46l
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2596-17-0x00000000048B0000-0x00000000048CA000-memory.dmp healer behavioral1/memory/2596-19-0x0000000004940000-0x0000000004958000-memory.dmp healer behavioral1/memory/2596-30-0x0000000004940000-0x0000000004952000-memory.dmp healer behavioral1/memory/2596-48-0x0000000004940000-0x0000000004952000-memory.dmp healer behavioral1/memory/2596-46-0x0000000004940000-0x0000000004952000-memory.dmp healer behavioral1/memory/2596-44-0x0000000004940000-0x0000000004952000-memory.dmp healer behavioral1/memory/2596-42-0x0000000004940000-0x0000000004952000-memory.dmp healer behavioral1/memory/2596-40-0x0000000004940000-0x0000000004952000-memory.dmp healer behavioral1/memory/2596-38-0x0000000004940000-0x0000000004952000-memory.dmp healer behavioral1/memory/2596-36-0x0000000004940000-0x0000000004952000-memory.dmp healer behavioral1/memory/2596-34-0x0000000004940000-0x0000000004952000-memory.dmp healer behavioral1/memory/2596-28-0x0000000004940000-0x0000000004952000-memory.dmp healer behavioral1/memory/2596-26-0x0000000004940000-0x0000000004952000-memory.dmp healer behavioral1/memory/2596-32-0x0000000004940000-0x0000000004952000-memory.dmp healer behavioral1/memory/2596-22-0x0000000004940000-0x0000000004952000-memory.dmp healer behavioral1/memory/2596-21-0x0000000004940000-0x0000000004952000-memory.dmp healer behavioral1/memory/2596-24-0x0000000004940000-0x0000000004952000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1666.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1666.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4912-59-0x0000000004C80000-0x0000000004CC6000-memory.dmp family_redline behavioral1/memory/4912-60-0x0000000007740000-0x0000000007784000-memory.dmp family_redline behavioral1/memory/4912-73-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-80-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-92-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-90-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-88-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-86-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-85-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-78-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-76-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-74-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-70-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-68-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-66-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-95-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-83-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-64-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-62-0x0000000007740000-0x000000000777E000-memory.dmp family_redline behavioral1/memory/4912-61-0x0000000007740000-0x000000000777E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 516 un723059.exe 2596 pro1666.exe 4912 qu6295.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1666.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un723059.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9fba3938215612fe8c0fa721b0abad9535077af7e2649a82f1f1824a7488699.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9fba3938215612fe8c0fa721b0abad9535077af7e2649a82f1f1824a7488699.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un723059.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6295.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2596 pro1666.exe 2596 pro1666.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2596 pro1666.exe Token: SeDebugPrivilege 4912 qu6295.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 216 wrote to memory of 516 216 d9fba3938215612fe8c0fa721b0abad9535077af7e2649a82f1f1824a7488699.exe 83 PID 216 wrote to memory of 516 216 d9fba3938215612fe8c0fa721b0abad9535077af7e2649a82f1f1824a7488699.exe 83 PID 216 wrote to memory of 516 216 d9fba3938215612fe8c0fa721b0abad9535077af7e2649a82f1f1824a7488699.exe 83 PID 516 wrote to memory of 2596 516 un723059.exe 84 PID 516 wrote to memory of 2596 516 un723059.exe 84 PID 516 wrote to memory of 2596 516 un723059.exe 84 PID 516 wrote to memory of 4912 516 un723059.exe 92 PID 516 wrote to memory of 4912 516 un723059.exe 92 PID 516 wrote to memory of 4912 516 un723059.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9fba3938215612fe8c0fa721b0abad9535077af7e2649a82f1f1824a7488699.exe"C:\Users\Admin\AppData\Local\Temp\d9fba3938215612fe8c0fa721b0abad9535077af7e2649a82f1f1824a7488699.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un723059.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un723059.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1666.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1666.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6295.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6295.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD510b732b3fa4ebb717b27d595eb610ef1
SHA14f6bc1c938a0a7c1ae4bf0a70eea6aa68ed7aeca
SHA2567e771faa60c31f63d4e09a0ea97f3172a8e88722de65dbf2f5f3078263253281
SHA512b828e1504ef102dbce4abdfccac54e5ec9aba64ebf4a9ad839e8c22bb78e2c9b54deb8db5db6c24f9bec275e5debf8391027d2aa191c8c48e4d9829f8848146b
-
Filesize
322KB
MD5d8145143160f8b068d6fcf7e69d56b1a
SHA1253ce4c0fc9f01cbb91e27308c1e8bebe57987b3
SHA256a7bccee8157d7739190295bf131dbe2c9bf87e6bc2e47fb43626b1ad62a7c043
SHA512207b8bd47f90b48a8e5ddc218952866dc5fba4d422fd43b619a2e3c0d24ed3a9dc1fe25d039d24e5bef3a62d87760a6b13d8efc3a97ac4b6d9d5564d4351700c
-
Filesize
379KB
MD5857a6a4d808a113398da0300876c9878
SHA1083c748490b6a186c66436d0c66f30ff5f8e4857
SHA25603144c478550ef5f7bfcade615ccc97406a2934f5a9ee750d28395502a985334
SHA51259d817d79e89ea1e04257e3e5ab38547c68beb97c5f30ffdc82ffaea603f33a94e4f2934d1c9055e38db6c3b86f60a4eacbf0aba306b640adac0af9237656529