Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
2539f36297cdff0893963834557ac15f38e9f4047b7077c80e13a714c7bef4e2.exe
Resource
win10v2004-20241007-en
General
-
Target
2539f36297cdff0893963834557ac15f38e9f4047b7077c80e13a714c7bef4e2.exe
-
Size
478KB
-
MD5
a885ec977e3a8fce9094efb45b9eb2c9
-
SHA1
c7fb632e182fb17c5018b3d64f4ed32abd001fbd
-
SHA256
2539f36297cdff0893963834557ac15f38e9f4047b7077c80e13a714c7bef4e2
-
SHA512
3148d5cb4e8813d43dda01bab05fbd2721b6cc38a059199f84126e366a11ea43e9d6f5de441d84127e79fa2088819681fb0fdc52916151ff79f2f21052408f89
-
SSDEEP
12288:FMryy90JnK04HH8DeK74oyZZoqjlW8s8zTyPiyD:ryAK5uee4TZo2Tu
Malware Config
Extracted
redline
morty
217.196.96.101:4132
-
auth_value
fe1a24c211cc8e5bf9ff11c737ce0e97
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4772-15-0x0000000002320000-0x000000000233A000-memory.dmp healer behavioral1/memory/4772-18-0x0000000004980000-0x0000000004998000-memory.dmp healer behavioral1/memory/4772-48-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4772-46-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4772-44-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4772-42-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4772-40-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4772-38-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4772-36-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4772-34-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4772-32-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4772-30-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4772-28-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4772-26-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4772-24-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4772-22-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4772-21-0x0000000004980000-0x0000000004992000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5851699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5851699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5851699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5851699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5851699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5851699.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023ca8-54.dat family_redline behavioral1/memory/4604-56-0x0000000000650000-0x000000000067E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 628 v7964032.exe 4772 a5851699.exe 4604 b7925676.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5851699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5851699.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2539f36297cdff0893963834557ac15f38e9f4047b7077c80e13a714c7bef4e2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7964032.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1384 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2539f36297cdff0893963834557ac15f38e9f4047b7077c80e13a714c7bef4e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v7964032.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5851699.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7925676.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4772 a5851699.exe 4772 a5851699.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4772 a5851699.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1320 wrote to memory of 628 1320 2539f36297cdff0893963834557ac15f38e9f4047b7077c80e13a714c7bef4e2.exe 83 PID 1320 wrote to memory of 628 1320 2539f36297cdff0893963834557ac15f38e9f4047b7077c80e13a714c7bef4e2.exe 83 PID 1320 wrote to memory of 628 1320 2539f36297cdff0893963834557ac15f38e9f4047b7077c80e13a714c7bef4e2.exe 83 PID 628 wrote to memory of 4772 628 v7964032.exe 84 PID 628 wrote to memory of 4772 628 v7964032.exe 84 PID 628 wrote to memory of 4772 628 v7964032.exe 84 PID 628 wrote to memory of 4604 628 v7964032.exe 94 PID 628 wrote to memory of 4604 628 v7964032.exe 94 PID 628 wrote to memory of 4604 628 v7964032.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2539f36297cdff0893963834557ac15f38e9f4047b7077c80e13a714c7bef4e2.exe"C:\Users\Admin\AppData\Local\Temp\2539f36297cdff0893963834557ac15f38e9f4047b7077c80e13a714c7bef4e2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7964032.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7964032.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a5851699.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a5851699.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7925676.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7925676.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4604
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1384
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD581809fac2ef22972bd71c025bc4b0028
SHA134b7b3236f599e35b3ad0a5ace40b210ba14f635
SHA2569fb593a59f7cc4e5e431096bd71cfba916692f35e9ec2601a583cbba4eb79b35
SHA5127bd582e9ab3643b724cdb2cc0d07241b264d723f3e9eae824ada4f2c1c752c5676fd034a72404def341afca66e1c82e9f8ad34800685d2b09bf90a1f83809b03
-
Filesize
179KB
MD575b24cbbb5927b8118ef394a7bb6f5ae
SHA1bab16b5cad866b28b0e09023cf8bbb625209f81e
SHA2563c7112fbad7a8045f6dfa51ffca318c7aabd298875336015686364259aa23c03
SHA5122cb2fb4fb994174ea727e26127f4b05fe7a19c726e289bfc497bba374f37cccd765b824b7928f9807b6e2e3241350d18a95faed2d9df7b6ae297d19b5389e64a
-
Filesize
168KB
MD5c1972b2f62d8971de9a187c08c2b8f52
SHA14f1085968fb1112f4e09279f8a084fdb5cef2ed1
SHA256fc9a2ab4cf37300051f2ed626489bf4fbeb4085d6a518f56dbbddde510ce6dcf
SHA512eca94cf5edd70d20571eeb0152b453584380229840b119433bf07aeeb0f7695eec54cf1658b11d82e6d558a756f37666fc6001cdce565ba1b9e1f933001506bc