Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 04:08
Static task
static1
Behavioral task
behavioral1
Sample
00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879.exe
Resource
win10v2004-20241007-en
General
-
Target
00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879.exe
-
Size
479KB
-
MD5
cfaf31599f1dfc3d7b11e8051a8bd7a1
-
SHA1
dabbf9b7183d18868836d54072e66cab2bafcddc
-
SHA256
00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879
-
SHA512
c441680ee31264eb8df10855ab040530b64849c76b54fb73a3c7e4c998d26096b6b33cf16bc49c6ebc9c50a09ed47a73106f0a6019061407c07a00b5a9bcbbc0
-
SSDEEP
12288:VMrky90pQ8iDnnUK1EdPnORU6pxoPXnWbV:tyYQz3OuvoPXW5
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3264-15-0x0000000002230000-0x000000000224A000-memory.dmp healer behavioral1/memory/3264-18-0x00000000023D0000-0x00000000023E8000-memory.dmp healer behavioral1/memory/3264-47-0x00000000023D0000-0x00000000023E2000-memory.dmp healer behavioral1/memory/3264-45-0x00000000023D0000-0x00000000023E2000-memory.dmp healer behavioral1/memory/3264-43-0x00000000023D0000-0x00000000023E2000-memory.dmp healer behavioral1/memory/3264-41-0x00000000023D0000-0x00000000023E2000-memory.dmp healer behavioral1/memory/3264-39-0x00000000023D0000-0x00000000023E2000-memory.dmp healer behavioral1/memory/3264-37-0x00000000023D0000-0x00000000023E2000-memory.dmp healer behavioral1/memory/3264-35-0x00000000023D0000-0x00000000023E2000-memory.dmp healer behavioral1/memory/3264-33-0x00000000023D0000-0x00000000023E2000-memory.dmp healer behavioral1/memory/3264-31-0x00000000023D0000-0x00000000023E2000-memory.dmp healer behavioral1/memory/3264-29-0x00000000023D0000-0x00000000023E2000-memory.dmp healer behavioral1/memory/3264-27-0x00000000023D0000-0x00000000023E2000-memory.dmp healer behavioral1/memory/3264-25-0x00000000023D0000-0x00000000023E2000-memory.dmp healer behavioral1/memory/3264-23-0x00000000023D0000-0x00000000023E2000-memory.dmp healer behavioral1/memory/3264-21-0x00000000023D0000-0x00000000023E2000-memory.dmp healer behavioral1/memory/3264-20-0x00000000023D0000-0x00000000023E2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0200996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0200996.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k0200996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0200996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0200996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0200996.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b76-55.dat family_redline behavioral1/memory/860-56-0x0000000000660000-0x0000000000690000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4288 y4229741.exe 3264 k0200996.exe 860 l1593406.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k0200996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0200996.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4229741.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y4229741.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k0200996.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l1593406.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3264 k0200996.exe 3264 k0200996.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3264 k0200996.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4248 wrote to memory of 4288 4248 00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879.exe 83 PID 4248 wrote to memory of 4288 4248 00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879.exe 83 PID 4248 wrote to memory of 4288 4248 00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879.exe 83 PID 4288 wrote to memory of 3264 4288 y4229741.exe 84 PID 4288 wrote to memory of 3264 4288 y4229741.exe 84 PID 4288 wrote to memory of 3264 4288 y4229741.exe 84 PID 4288 wrote to memory of 860 4288 y4229741.exe 96 PID 4288 wrote to memory of 860 4288 y4229741.exe 96 PID 4288 wrote to memory of 860 4288 y4229741.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879.exe"C:\Users\Admin\AppData\Local\Temp\00898c71085f157a5ea80dcd103185b93e768fdfe79a3eee1ce1aba4918a7879.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4229741.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4229741.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0200996.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0200996.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1593406.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1593406.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:860
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD58530c27a2b5f9ced8fcf8f629fe603fb
SHA119f60bbb8407ec2ef2cdcda7619d4e30d93a536d
SHA2564f9e3ecae17febb2e630795ec0682387b454decdbbcefec42640d2491a70f7ce
SHA51274ef720b7e5f7b6fe9488b048524fad52f07c4f5965178fbd93d1f5dd09aefb8d54203a41bb3640c1ab8b011c2bbafdf2cc109c17f9da50f1f83f4b41f6dfef9
-
Filesize
180KB
MD5aacb7d2d633cef877858544de2fe441c
SHA1cbd72b865a4a52df77c7f82b34d7eaa56ce0b858
SHA256f49978353e200522716aa4d26b4a34cb4651f4e17ec07fafb348b54a962fe770
SHA512befba76377812ef41d6f1818ab6ff2745b3be6cc9968fbcb6643e7489056ddbb1dd823a4ffa589ea62d8dc7bcc2a0e702effcc8b4c6175ee36859706408a4e29
-
Filesize
168KB
MD5f19fd1fca07af64f05b51fedb428f96a
SHA1de24f8fcbec60277d05e914bbf29775fcf4a6679
SHA25631725ca3930a8e2bc959c46df691fbed92961a2b8103916521aa32221382e26d
SHA5129d238552d8e1686bef65bc97ef5b5989ea3e06d0e98584a0a0d559449a4cb029cd6b2c4c8a1a3e2d8290d2ee1dd77b62c6f3ed6e7a13d5f338eeb328b419a36f