Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90.exe
Resource
win10v2004-20241007-en
General
-
Target
88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90.exe
-
Size
618KB
-
MD5
cab8d8fac0352811da89d9880c232048
-
SHA1
34435ada8d7e92c3c8d592f7f2815c81f5206382
-
SHA256
88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90
-
SHA512
227d69623b9a12a66e8d01042a778a91d2f0fc725329cf5f96810991660f327b6e499e717835adcacdcd635f297d1eb12770c8dc7305daa9994d801a2b8d9d77
-
SSDEEP
12288:3y908Rspd6OTeHqhcwAZFeFaInspt6eRGcSNP8KYkQkphTcK/lkH1:3yXRspPTktFeFo6FfYyI
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b77-12.dat healer behavioral1/memory/4756-15-0x0000000000570000-0x000000000057A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 17151589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 17151589.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 17151589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 17151589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 17151589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 17151589.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2456-22-0x00000000027D0000-0x000000000280C000-memory.dmp family_redline behavioral1/memory/2456-24-0x0000000004E10000-0x0000000004E4A000-memory.dmp family_redline behavioral1/memory/2456-26-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-30-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-28-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-74-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-54-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-34-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-25-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-88-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-86-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-84-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-82-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-80-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-78-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-76-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-72-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-70-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-68-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-66-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-64-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-62-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-60-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-58-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-56-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-52-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-50-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-48-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-46-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-44-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-42-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-40-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-38-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-36-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/2456-32-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4536 st222091.exe 4756 17151589.exe 2456 kp998061.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 17151589.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st222091.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp998061.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language st222091.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4756 17151589.exe 4756 17151589.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4756 17151589.exe Token: SeDebugPrivilege 2456 kp998061.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1676 wrote to memory of 4536 1676 88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90.exe 83 PID 1676 wrote to memory of 4536 1676 88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90.exe 83 PID 1676 wrote to memory of 4536 1676 88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90.exe 83 PID 4536 wrote to memory of 4756 4536 st222091.exe 84 PID 4536 wrote to memory of 4756 4536 st222091.exe 84 PID 4536 wrote to memory of 2456 4536 st222091.exe 96 PID 4536 wrote to memory of 2456 4536 st222091.exe 96 PID 4536 wrote to memory of 2456 4536 st222091.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90.exe"C:\Users\Admin\AppData\Local\Temp\88f7d6cbc8bda9606331921374f777a80247bd1e94e29ec06d20e1fcf369fa90.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st222091.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st222091.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17151589.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\17151589.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp998061.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp998061.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
464KB
MD50a7db0582924104e31c51049ae32d2a0
SHA15c7b8132ac19461a5d2ff91ca38adc3fbeee0f59
SHA25604b3ddbd33e23ceebd2a7ac12fb0e71ec24fc8ebbff8c6894f8fba080eaa58eb
SHA51218b935e8640620bb202581c63cd2d7ed89b522e598d4d2a6388f85765766b0521e0eee3b22b82353d84d3e4726e09f07997734cbe06630140ed375f5765e30e9
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
478KB
MD5c61ef5d1e5b7358bac2fee794b7b021c
SHA17f960f231d9a5843e6533851f64d89032bce1569
SHA256bbf948a3c810d147904fb121df8f3000788590d943823d697fe2179b54892d26
SHA51224d62783d16e542c0b66efacd0bdb74e296ac6c2183a610bdbc6b2c5ac0fcf8ee6cd2d34cfeb0111d124ca82d7a22a81c4a87bc39c51adc911ac21c331cb0051