Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
3bc7921f6db693131e2d4e2a7e8d26fc080904f1c61e6d825676055697c7813c.exe
Resource
win10v2004-20241007-en
General
-
Target
3bc7921f6db693131e2d4e2a7e8d26fc080904f1c61e6d825676055697c7813c.exe
-
Size
852KB
-
MD5
86ff5f4074b3991531d16918ed98c094
-
SHA1
ea64613fce9be39674cd5057874cc99ee53ee126
-
SHA256
3bc7921f6db693131e2d4e2a7e8d26fc080904f1c61e6d825676055697c7813c
-
SHA512
a17e85317b25070b41ccab0fc9892c07fa95dd5b0b3b2f2d899d53ef727091d86c5ac12eb1bb75c86e1592609d41bb1c0ec0fc20fc98ba9064d14a56b5496b65
-
SSDEEP
24576:Fyd9gR0JwIj3BQoib8jL3vD1Ao1cXJcX:gd9gAwgB/wsL3vDyo1cXJ
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0009000000023bee-19.dat healer behavioral1/memory/4976-22-0x0000000000710000-0x000000000071A000-memory.dmp healer behavioral1/memory/3268-29-0x00000000048F0000-0x000000000490A000-memory.dmp healer behavioral1/memory/3268-31-0x0000000004C50000-0x0000000004C68000-memory.dmp healer behavioral1/memory/3268-32-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/3268-45-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/3268-59-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/3268-57-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/3268-56-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/3268-53-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/3268-51-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/3268-49-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/3268-47-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/3268-43-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/3268-41-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/3268-39-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/3268-37-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/3268-35-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/3268-33-0x0000000004C50000-0x0000000004C62000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c23vs94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c23vs94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c23vs94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b4520pm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b4520pm.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c23vs94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c23vs94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c23vs94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b4520pm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b4520pm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b4520pm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b4520pm.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/400-67-0x0000000004BF0000-0x0000000004C36000-memory.dmp family_redline behavioral1/memory/400-68-0x0000000004DF0000-0x0000000004E34000-memory.dmp family_redline behavioral1/memory/400-82-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-74-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-70-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-69-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-102-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-100-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-98-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-96-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-94-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-92-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-90-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-88-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-86-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-84-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-80-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-78-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-76-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/400-72-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 4220 tice9551.exe 3716 tice4405.exe 4976 b4520pm.exe 3268 c23vs94.exe 400 docgs53.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b4520pm.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c23vs94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c23vs94.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3bc7921f6db693131e2d4e2a7e8d26fc080904f1c61e6d825676055697c7813c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice9551.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice4405.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3980 3268 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bc7921f6db693131e2d4e2a7e8d26fc080904f1c61e6d825676055697c7813c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice9551.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tice4405.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c23vs94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language docgs53.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4976 b4520pm.exe 4976 b4520pm.exe 3268 c23vs94.exe 3268 c23vs94.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4976 b4520pm.exe Token: SeDebugPrivilege 3268 c23vs94.exe Token: SeDebugPrivilege 400 docgs53.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1240 wrote to memory of 4220 1240 3bc7921f6db693131e2d4e2a7e8d26fc080904f1c61e6d825676055697c7813c.exe 84 PID 1240 wrote to memory of 4220 1240 3bc7921f6db693131e2d4e2a7e8d26fc080904f1c61e6d825676055697c7813c.exe 84 PID 1240 wrote to memory of 4220 1240 3bc7921f6db693131e2d4e2a7e8d26fc080904f1c61e6d825676055697c7813c.exe 84 PID 4220 wrote to memory of 3716 4220 tice9551.exe 86 PID 4220 wrote to memory of 3716 4220 tice9551.exe 86 PID 4220 wrote to memory of 3716 4220 tice9551.exe 86 PID 3716 wrote to memory of 4976 3716 tice4405.exe 87 PID 3716 wrote to memory of 4976 3716 tice4405.exe 87 PID 3716 wrote to memory of 3268 3716 tice4405.exe 97 PID 3716 wrote to memory of 3268 3716 tice4405.exe 97 PID 3716 wrote to memory of 3268 3716 tice4405.exe 97 PID 4220 wrote to memory of 400 4220 tice9551.exe 102 PID 4220 wrote to memory of 400 4220 tice9551.exe 102 PID 4220 wrote to memory of 400 4220 tice9551.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bc7921f6db693131e2d4e2a7e8d26fc080904f1c61e6d825676055697c7813c.exe"C:\Users\Admin\AppData\Local\Temp\3bc7921f6db693131e2d4e2a7e8d26fc080904f1c61e6d825676055697c7813c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9551.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9551.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4405.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4405.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4520pm.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4520pm.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c23vs94.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c23vs94.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 10805⤵
- Program crash
PID:3980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\docgs53.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\docgs53.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3268 -ip 32681⤵PID:3036
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
707KB
MD5fb9c27a4853a8a42fbf55b1a26dfb740
SHA15cc06acffb6707b359126de7668d667bee36b184
SHA256498f331cbf3ac7cab174a6f2d557cc751707ded51581766294954bc2ada4c398
SHA5121a5676deb8239206ff7ecd706649f9f5cb933e477cf8e26c80fae901178681da94353cda364abfe5d30289d4ec71d2c455506a41838a47a0d3b7b3891b3b2849
-
Filesize
391KB
MD587ad3727721123f890fc97f3e6f2a821
SHA13d30944877d5993db1f905afac30e8439366b555
SHA256b4ec244a61e8f32c6b72cd1f53f91a4137ed4d9d67627e7749c75ecc5588404c
SHA5128931ffa41d50767006eb4d41d8347ea239aff89cd0a0f62bab3414cf25970650e64a882ce2b3c557871bb0d4ad2699aa9a77d68aa07a48a635cde5fd3d358246
-
Filesize
353KB
MD548db280ecf337590c3da7f679860f2a6
SHA1352b08e94e01d11a6d848a2d5794575dec76451e
SHA256334c8c44fafe392fba9a806094cb91ad4f0515cb253066cc3b5904bdc524dc72
SHA5122e0ddaa0b4e6351baf2d99976f860ed734e33787c58939db84bbc02edb1fd5b1d03cf126ebb41f34c3e029f6c16e9716ca8608b2d8ea1047ab4db21eba229679
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
333KB
MD5cd44e9512fccc11510c2945278105d8b
SHA13fef4c815958c743965cf29121193ce5a108f219
SHA256e16ff1c592dbddb4a7598b437629f85204fc56888de658e80fa45f5e12aade59
SHA5121519633d2cc3d59fd1095099826ce34eb11f94e7701eadb4291131dc36420b373d20f328a9a2275b0224a797368b467a21e296a1519283bad95b923755aa9353