Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132.exe
Resource
win10v2004-20241007-en
General
-
Target
602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132.exe
-
Size
936KB
-
MD5
4834feda478d30d2b9cb89e3f22572f6
-
SHA1
725b8141c446eac49c5978527548162b421c6c1b
-
SHA256
602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132
-
SHA512
38245356f6867cd89124a7088c954f65540cc2484653c677776b7d43b093f5f21fee0ff34a7ff90ca7becdf956bc535f980aa4cc699ccd20d43be637e89c79d6
-
SSDEEP
24576:GyFFdQF2FCS6or9VHJ8ZPIXZKmdcSAh4Cw/Sn8IQOGGlwGd:VpTFCQzp8ZlmdcSAJEWnDw
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b61-19.dat healer behavioral1/memory/1616-22-0x0000000000010000-0x000000000001A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it606879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it606879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it606879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it606879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it606879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it606879.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1480-29-0x0000000002900000-0x000000000293C000-memory.dmp family_redline behavioral1/memory/1480-31-0x0000000004E70000-0x0000000004EAA000-memory.dmp family_redline behavioral1/memory/1480-39-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-79-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-77-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-75-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-73-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-71-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-69-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-67-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-65-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-63-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-61-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-59-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-57-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-55-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-53-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-51-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-49-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-47-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-45-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-43-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-93-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-41-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-37-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-35-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-33-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-32-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-95-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-91-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-89-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-87-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-86-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-83-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline behavioral1/memory/1480-82-0x0000000004E70000-0x0000000004EA5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4436 zinA2791.exe 2036 ziiZ8781.exe 1616 it606879.exe 1480 jr357069.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it606879.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziiZ8781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zinA2791.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zinA2791.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziiZ8781.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr357069.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1616 it606879.exe 1616 it606879.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1616 it606879.exe Token: SeDebugPrivilege 1480 jr357069.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4260 wrote to memory of 4436 4260 602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132.exe 83 PID 4260 wrote to memory of 4436 4260 602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132.exe 83 PID 4260 wrote to memory of 4436 4260 602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132.exe 83 PID 4436 wrote to memory of 2036 4436 zinA2791.exe 84 PID 4436 wrote to memory of 2036 4436 zinA2791.exe 84 PID 4436 wrote to memory of 2036 4436 zinA2791.exe 84 PID 2036 wrote to memory of 1616 2036 ziiZ8781.exe 86 PID 2036 wrote to memory of 1616 2036 ziiZ8781.exe 86 PID 2036 wrote to memory of 1480 2036 ziiZ8781.exe 98 PID 2036 wrote to memory of 1480 2036 ziiZ8781.exe 98 PID 2036 wrote to memory of 1480 2036 ziiZ8781.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132.exe"C:\Users\Admin\AppData\Local\Temp\602ebeddaea5feda009f97a35ebf8ac228c4221870ab4603352a0ab81f6dc132.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinA2791.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinA2791.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziiZ8781.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziiZ8781.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it606879.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it606879.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr357069.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr357069.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
622KB
MD526d8a2ee700aa81a8df4b696ad568dee
SHA1dbe03406e16cdab5462baeb43f834d111ad0360d
SHA256e063184cc392f602ddc1c3a53221c3a4fcabd8be628dbe90ab8cf548df34562f
SHA51237d64e78a78459572e55d9b90ab5d22eeae2cbe0f7d36d1d192df2f62d9742306bbfa52fa1bf46aaf9e9f8c800f1b61d0b0503d4742f911b0a00acb7973222b8
-
Filesize
469KB
MD5fe1b9c0800120b6aedd7b539c6aaf390
SHA1d766effa18f4631d14852be5a9a191db3d4c1b74
SHA256be662bf6d1144bbb79563cd7177ecfddc15b4c4d8ecbc6b13213972f96721801
SHA51299556b1ec4cee5a088e50695e2c8cd91fae1b43d281390fbdd9bfda5548317b34ae25251e79aa2dcc94b86a8e10d772b7f381e2257fac27af3d7b6912c4ff6d4
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
485KB
MD5db8c449732289c2ee776d7a3cb24d981
SHA106291c234c9127a65b6ab594984688f0e6913aba
SHA2567dab8c4e7f2b5e89a2b1ba7bfa7f7a3d228b950e44c61ab09648f83ca80e0b24
SHA512775105be4c8bc304d8142815661cd823ba4fed0bcbfe0692d41a1468cdffc5b7d05e391bdaff80974abef4fb0a5e245710aa6393cde7ed7fced2dd48d5f22204