Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:45
Static task
static1
Behavioral task
behavioral1
Sample
7860ec04f910a69984ce4d5344860fbf5a6d03d29cd993200155cb5f5e96ee4f.exe
Resource
win10v2004-20241007-en
General
-
Target
7860ec04f910a69984ce4d5344860fbf5a6d03d29cd993200155cb5f5e96ee4f.exe
-
Size
567KB
-
MD5
fa77efaa088b3328b43fdc0833d9ec11
-
SHA1
9c9aecce99dfb85bc393cbc6ab579a28af911409
-
SHA256
7860ec04f910a69984ce4d5344860fbf5a6d03d29cd993200155cb5f5e96ee4f
-
SHA512
bd0feaa24fb4fa6c7e705e16f51edd8e337a989a1506dcc1906fb6ef391badd00a3033beac074a76370f704d9531e84f057575771f99c28a404853a891d1f18d
-
SSDEEP
12288:fy90h+MfrBbG6l55rYkd43toI9PPuCk7JAK3zj3+oGl:fygDBb9l5Kk4CIMxn3PGl
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca3-12.dat healer behavioral1/memory/1068-15-0x00000000003A0000-0x00000000003AA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it050346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it050346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it050346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it050346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it050346.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it050346.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/412-22-0x0000000004D10000-0x0000000004D4C000-memory.dmp family_redline behavioral1/memory/412-24-0x0000000007210000-0x000000000724A000-memory.dmp family_redline behavioral1/memory/412-42-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-44-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-88-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-86-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-84-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-82-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-80-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-78-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-76-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-74-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-72-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-70-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-68-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-66-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-64-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-60-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-58-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-56-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-54-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-52-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-50-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-48-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-46-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-40-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-39-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-36-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-34-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-30-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-28-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-62-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-32-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-26-0x0000000007210000-0x0000000007245000-memory.dmp family_redline behavioral1/memory/412-25-0x0000000007210000-0x0000000007245000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3864 ziHN8047.exe 1068 it050346.exe 412 kp813522.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it050346.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7860ec04f910a69984ce4d5344860fbf5a6d03d29cd993200155cb5f5e96ee4f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziHN8047.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7860ec04f910a69984ce4d5344860fbf5a6d03d29cd993200155cb5f5e96ee4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziHN8047.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp813522.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1068 it050346.exe 1068 it050346.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1068 it050346.exe Token: SeDebugPrivilege 412 kp813522.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3864 3016 7860ec04f910a69984ce4d5344860fbf5a6d03d29cd993200155cb5f5e96ee4f.exe 84 PID 3016 wrote to memory of 3864 3016 7860ec04f910a69984ce4d5344860fbf5a6d03d29cd993200155cb5f5e96ee4f.exe 84 PID 3016 wrote to memory of 3864 3016 7860ec04f910a69984ce4d5344860fbf5a6d03d29cd993200155cb5f5e96ee4f.exe 84 PID 3864 wrote to memory of 1068 3864 ziHN8047.exe 85 PID 3864 wrote to memory of 1068 3864 ziHN8047.exe 85 PID 3864 wrote to memory of 412 3864 ziHN8047.exe 96 PID 3864 wrote to memory of 412 3864 ziHN8047.exe 96 PID 3864 wrote to memory of 412 3864 ziHN8047.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\7860ec04f910a69984ce4d5344860fbf5a6d03d29cd993200155cb5f5e96ee4f.exe"C:\Users\Admin\AppData\Local\Temp\7860ec04f910a69984ce4d5344860fbf5a6d03d29cd993200155cb5f5e96ee4f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHN8047.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHN8047.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it050346.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it050346.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp813522.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp813522.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:412
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5b22d81a66e640ef24cae0f2a9216322f
SHA129dca21dee4cb9c275f045cb7e25719a33fdc6f0
SHA256bd61bbb764ec25662b99c4a13c74f43d37bbf352285ed1cb82e191d1f69ebf74
SHA512ee4e4187db0b9ad7812a0fa866cf399498612d0b15043c361361b54e90eb095691fb152fe4c0924c09a400d10c41c9cc0c3c1fe6de7a6f6712e78b248e8eb3c6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
369KB
MD5799ca296e8b426dc114d3c56bb6693a8
SHA16d7c0d7184fca2005f1f738500c207a51d5ad6c8
SHA256af04d61b6827c72274529ca15863e658aefffb77e0299507bd42ac201bcddf9f
SHA512b452c5707941ee6c84dd0529a5b8684db357e5e2783677e7a0d58231fd9c598f9d4de6016e2a2d10c7f244f11acee5a6e623273ed786bd7b7c4cead180c0dac7