Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
45ab7e88e4a85dc72106191a4706a5c164d078c0f7047faf14f42e93ef26e38f.exe
Resource
win10v2004-20241007-en
General
-
Target
45ab7e88e4a85dc72106191a4706a5c164d078c0f7047faf14f42e93ef26e38f.exe
-
Size
479KB
-
MD5
47e959d62630b6ca063eb9b09d548278
-
SHA1
efc1e73b2eac2919ed0f2b2bbd3279dae2d5db93
-
SHA256
45ab7e88e4a85dc72106191a4706a5c164d078c0f7047faf14f42e93ef26e38f
-
SHA512
969bb1ab650477feb85ab663db910f7d00717e5a7c045c84e6b56c7d41dd5ccd645a178c746b068971c62062b882b94730c8ee2b8cf5f2f7b5459a4c27564b8e
-
SSDEEP
12288:4MrYy90A+aJgJJD5C4YwiBtIE+94NAMvN:wyhJgrVC4WKE+94NDvN
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4956-15-0x00000000024D0000-0x00000000024EA000-memory.dmp healer behavioral1/memory/4956-18-0x0000000002550000-0x0000000002568000-memory.dmp healer behavioral1/memory/4956-46-0x0000000002550000-0x0000000002562000-memory.dmp healer behavioral1/memory/4956-44-0x0000000002550000-0x0000000002562000-memory.dmp healer behavioral1/memory/4956-19-0x0000000002550000-0x0000000002562000-memory.dmp healer behavioral1/memory/4956-42-0x0000000002550000-0x0000000002562000-memory.dmp healer behavioral1/memory/4956-40-0x0000000002550000-0x0000000002562000-memory.dmp healer behavioral1/memory/4956-38-0x0000000002550000-0x0000000002562000-memory.dmp healer behavioral1/memory/4956-36-0x0000000002550000-0x0000000002562000-memory.dmp healer behavioral1/memory/4956-34-0x0000000002550000-0x0000000002562000-memory.dmp healer behavioral1/memory/4956-32-0x0000000002550000-0x0000000002562000-memory.dmp healer behavioral1/memory/4956-30-0x0000000002550000-0x0000000002562000-memory.dmp healer behavioral1/memory/4956-28-0x0000000002550000-0x0000000002562000-memory.dmp healer behavioral1/memory/4956-26-0x0000000002550000-0x0000000002562000-memory.dmp healer behavioral1/memory/4956-24-0x0000000002550000-0x0000000002562000-memory.dmp healer behavioral1/memory/4956-22-0x0000000002550000-0x0000000002562000-memory.dmp healer behavioral1/memory/4956-20-0x0000000002550000-0x0000000002562000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k8403840.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8403840.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8403840.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8403840.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8403840.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8403840.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c94-54.dat family_redline behavioral1/memory/1412-56-0x0000000000050000-0x0000000000080000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2536 y2994458.exe 4956 k8403840.exe 1412 l0221131.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k8403840.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8403840.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 45ab7e88e4a85dc72106191a4706a5c164d078c0f7047faf14f42e93ef26e38f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2994458.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y2994458.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k8403840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l0221131.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45ab7e88e4a85dc72106191a4706a5c164d078c0f7047faf14f42e93ef26e38f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4956 k8403840.exe 4956 k8403840.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4956 k8403840.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 756 wrote to memory of 2536 756 45ab7e88e4a85dc72106191a4706a5c164d078c0f7047faf14f42e93ef26e38f.exe 83 PID 756 wrote to memory of 2536 756 45ab7e88e4a85dc72106191a4706a5c164d078c0f7047faf14f42e93ef26e38f.exe 83 PID 756 wrote to memory of 2536 756 45ab7e88e4a85dc72106191a4706a5c164d078c0f7047faf14f42e93ef26e38f.exe 83 PID 2536 wrote to memory of 4956 2536 y2994458.exe 84 PID 2536 wrote to memory of 4956 2536 y2994458.exe 84 PID 2536 wrote to memory of 4956 2536 y2994458.exe 84 PID 2536 wrote to memory of 1412 2536 y2994458.exe 95 PID 2536 wrote to memory of 1412 2536 y2994458.exe 95 PID 2536 wrote to memory of 1412 2536 y2994458.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\45ab7e88e4a85dc72106191a4706a5c164d078c0f7047faf14f42e93ef26e38f.exe"C:\Users\Admin\AppData\Local\Temp\45ab7e88e4a85dc72106191a4706a5c164d078c0f7047faf14f42e93ef26e38f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2994458.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2994458.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8403840.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8403840.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0221131.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0221131.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1412
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD51f08ee23c4cc58e52c0aef73936bde17
SHA103fa9e56bf9bef749c74bc409f29f8bd141a6bd8
SHA25604af685cd5edeb5ba024b4e77aa95be52bd5935a1f87a1d4d501c6e3ba52254a
SHA512af4afeb8d3dafce935a2a969a9ac7bda5ea617c6be5a5bcf494b2e676ea6833cb6c107907af4d76bdaece3c16971362f9aec7698e7db144cbddf48e05ae317c8
-
Filesize
180KB
MD56a5ca788f75d12c583bbcb2f034eb880
SHA1640984d426c7202feb0cf20070c87b2dc014be83
SHA2560e1f7797b46c0c51c4bac3c8f94df1a8794834f040594d6f79f94f0061cf7670
SHA5121e7c4f0f5f4559322779d1bf4ead16484c060c4d22a20204be478363afa1c79a28705ade5e124f5c66845a57a64afd803b0836180b0001744a7a837de7601f3b
-
Filesize
168KB
MD5833c767f93477b2d56c2b8947286e85c
SHA1797eadac95f078123da3c220219619fbebeb704b
SHA256184ef10a1588a308d0c01cbd2faee6e1b4478ad8d7ae0d25a4f3ad6b5aa54957
SHA512e7b563353adeeff36f6cc68e5edb7fb49689394b21833f319ef43895d79d7a21da8f70d966474041ce210acd6b296024673983cb1a9b159a0262d230d69d4898