Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
7755f0d3338c6a3f0541e9f44b7d9a9119f4f56c7ecc4ab759f08b342b757a45.exe
Resource
win10v2004-20241007-en
General
-
Target
7755f0d3338c6a3f0541e9f44b7d9a9119f4f56c7ecc4ab759f08b342b757a45.exe
-
Size
481KB
-
MD5
a43340ee16566b82a02b386a990303c3
-
SHA1
8c3b595315c3ede1a6af09d8093f7c036d155a6c
-
SHA256
7755f0d3338c6a3f0541e9f44b7d9a9119f4f56c7ecc4ab759f08b342b757a45
-
SHA512
4b975efc425b47df5a843d77a0fc15d4227714fe013701859b0391579624be7644e9fb0602ca67fb4a968c9d1ee51e264ea9480066439dff8a195239616f006a
-
SSDEEP
12288:OMrby900pp67Odct74P48cguqmhC+OZ2xAc1:NyJiYc1SjRuqmsV4X
Malware Config
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3548-15-0x00000000022B0000-0x00000000022CA000-memory.dmp healer behavioral1/memory/3548-18-0x0000000002490000-0x00000000024A8000-memory.dmp healer behavioral1/memory/3548-42-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3548-46-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3548-44-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3548-40-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3548-38-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3548-32-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3548-30-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3548-19-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3548-36-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3548-34-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3548-28-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3548-26-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3548-24-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3548-22-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3548-20-0x0000000002490000-0x00000000024A2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2869051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2869051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2869051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2869051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2869051.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a2869051.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c8a-53.dat family_redline behavioral1/memory/656-55-0x0000000000740000-0x0000000000770000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3184 v0500868.exe 3548 a2869051.exe 656 b2510737.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2869051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2869051.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7755f0d3338c6a3f0541e9f44b7d9a9119f4f56c7ecc4ab759f08b342b757a45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0500868.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7755f0d3338c6a3f0541e9f44b7d9a9119f4f56c7ecc4ab759f08b342b757a45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v0500868.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2869051.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2510737.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3548 a2869051.exe 3548 a2869051.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3548 a2869051.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2460 wrote to memory of 3184 2460 7755f0d3338c6a3f0541e9f44b7d9a9119f4f56c7ecc4ab759f08b342b757a45.exe 83 PID 2460 wrote to memory of 3184 2460 7755f0d3338c6a3f0541e9f44b7d9a9119f4f56c7ecc4ab759f08b342b757a45.exe 83 PID 2460 wrote to memory of 3184 2460 7755f0d3338c6a3f0541e9f44b7d9a9119f4f56c7ecc4ab759f08b342b757a45.exe 83 PID 3184 wrote to memory of 3548 3184 v0500868.exe 84 PID 3184 wrote to memory of 3548 3184 v0500868.exe 84 PID 3184 wrote to memory of 3548 3184 v0500868.exe 84 PID 3184 wrote to memory of 656 3184 v0500868.exe 92 PID 3184 wrote to memory of 656 3184 v0500868.exe 92 PID 3184 wrote to memory of 656 3184 v0500868.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\7755f0d3338c6a3f0541e9f44b7d9a9119f4f56c7ecc4ab759f08b342b757a45.exe"C:\Users\Admin\AppData\Local\Temp\7755f0d3338c6a3f0541e9f44b7d9a9119f4f56c7ecc4ab759f08b342b757a45.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0500868.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0500868.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2869051.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2869051.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2510737.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2510737.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:656
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD548beeb93792358a312a5f5d1e6760fae
SHA10a958810501cb1578170f9cb7c1fdaf8bec480b7
SHA256af3c18baa1e3c521970f64e159182b0ec4f72131d365f2cd2658fa9cb549875f
SHA5124c49d281891b181ed51d5ed886a89ad34128a14073a9c6f971f9851c481f077affea580112f07def29e49c924000e23cbd93b6c995952d18a0ecc8b62a5a7a35
-
Filesize
179KB
MD5da48c000a9b937cf2f4b2f65bef59a28
SHA15150e3045e288637881878a0a305e02c33b8e7b9
SHA256eebcbdcde5a5d5d69442e7061e7604a83cc0f29b19a33446e0a7089bc8a4a16c
SHA5124ecc4c3f74d0dad740e6cd382d76379920a919276843db288269f98b7b58720286047b0e4febc1868c2192cb9dc7bd69607ce6c0b413f2dc0ebcf0f825c7b2cc
-
Filesize
168KB
MD55544af5f8fc01bd9cdc7d3bdb81460ec
SHA13afbd581ee1c7edb6d92a9ff9afebc5bc2ea83b7
SHA256471e6a9c73ace63179967e12bfbcda404802b40bcd4e5767d324467e7fce3a50
SHA51292312229932750d6e71e080c3f31b0eba3a480851bf61827136723b6c81a1c24562bdc189bba50dd6ece2ce3564318321b8a0cfb3af3845a56b77963183fc3c1