Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 06:19
Static task
static1
Behavioral task
behavioral1
Sample
aa21e3a7bcb0682e9a0ac499ac7bc14f5f5c6efb9d20f8d7565b2994acd47e07.exe
Resource
win10v2004-20241007-en
General
-
Target
aa21e3a7bcb0682e9a0ac499ac7bc14f5f5c6efb9d20f8d7565b2994acd47e07.exe
-
Size
479KB
-
MD5
3d014232b3745d351c387b6e5ae04096
-
SHA1
64683c6c2715783d067f50b0c3fd1d97d243224a
-
SHA256
aa21e3a7bcb0682e9a0ac499ac7bc14f5f5c6efb9d20f8d7565b2994acd47e07
-
SHA512
7aa89840f634cd54e91d618d86db30b30a1b0891ad3cffcaae86cbba92e4dd705a4562aaadc7362248f01464762b52b44a5aa5539038967995dcb1b7d444b01b
-
SSDEEP
12288:VMrdy90E5whS/hiZUyi/LwJSCykLF8fTQU:oyH7/hyKWtVLFUt
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4924-15-0x0000000002060000-0x000000000207A000-memory.dmp healer behavioral1/memory/4924-18-0x0000000002130000-0x0000000002148000-memory.dmp healer behavioral1/memory/4924-32-0x0000000002130000-0x0000000002142000-memory.dmp healer behavioral1/memory/4924-34-0x0000000002130000-0x0000000002142000-memory.dmp healer behavioral1/memory/4924-46-0x0000000002130000-0x0000000002142000-memory.dmp healer behavioral1/memory/4924-44-0x0000000002130000-0x0000000002142000-memory.dmp healer behavioral1/memory/4924-42-0x0000000002130000-0x0000000002142000-memory.dmp healer behavioral1/memory/4924-40-0x0000000002130000-0x0000000002142000-memory.dmp healer behavioral1/memory/4924-38-0x0000000002130000-0x0000000002142000-memory.dmp healer behavioral1/memory/4924-36-0x0000000002130000-0x0000000002142000-memory.dmp healer behavioral1/memory/4924-30-0x0000000002130000-0x0000000002142000-memory.dmp healer behavioral1/memory/4924-28-0x0000000002130000-0x0000000002142000-memory.dmp healer behavioral1/memory/4924-26-0x0000000002130000-0x0000000002142000-memory.dmp healer behavioral1/memory/4924-24-0x0000000002130000-0x0000000002142000-memory.dmp healer behavioral1/memory/4924-22-0x0000000002130000-0x0000000002142000-memory.dmp healer behavioral1/memory/4924-20-0x0000000002130000-0x0000000002142000-memory.dmp healer behavioral1/memory/4924-19-0x0000000002130000-0x0000000002142000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3273516.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3273516.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3273516.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3273516.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k3273516.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3273516.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b94-54.dat family_redline behavioral1/memory/2932-56-0x0000000000B40000-0x0000000000B70000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3600 y8093022.exe 4924 k3273516.exe 2932 l8233924.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k3273516.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3273516.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aa21e3a7bcb0682e9a0ac499ac7bc14f5f5c6efb9d20f8d7565b2994acd47e07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8093022.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa21e3a7bcb0682e9a0ac499ac7bc14f5f5c6efb9d20f8d7565b2994acd47e07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y8093022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k3273516.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l8233924.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4924 k3273516.exe 4924 k3273516.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4924 k3273516.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 448 wrote to memory of 3600 448 aa21e3a7bcb0682e9a0ac499ac7bc14f5f5c6efb9d20f8d7565b2994acd47e07.exe 84 PID 448 wrote to memory of 3600 448 aa21e3a7bcb0682e9a0ac499ac7bc14f5f5c6efb9d20f8d7565b2994acd47e07.exe 84 PID 448 wrote to memory of 3600 448 aa21e3a7bcb0682e9a0ac499ac7bc14f5f5c6efb9d20f8d7565b2994acd47e07.exe 84 PID 3600 wrote to memory of 4924 3600 y8093022.exe 85 PID 3600 wrote to memory of 4924 3600 y8093022.exe 85 PID 3600 wrote to memory of 4924 3600 y8093022.exe 85 PID 3600 wrote to memory of 2932 3600 y8093022.exe 95 PID 3600 wrote to memory of 2932 3600 y8093022.exe 95 PID 3600 wrote to memory of 2932 3600 y8093022.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa21e3a7bcb0682e9a0ac499ac7bc14f5f5c6efb9d20f8d7565b2994acd47e07.exe"C:\Users\Admin\AppData\Local\Temp\aa21e3a7bcb0682e9a0ac499ac7bc14f5f5c6efb9d20f8d7565b2994acd47e07.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8093022.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8093022.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3273516.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3273516.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8233924.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8233924.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2932
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD59b2f09316d23396324d970184ce0fcbb
SHA159d80900da58a0c6019a26858f0ffdf1b4945166
SHA256d9cbe3e268a283dde07622531e52a6ac964f9759d142d44a6df087d2388c43f4
SHA5122f5e7ebb96b18ea6aaa3d70c451325b4e1eb4db95cb4df730075fb339ba599edc8857acf1fec5d2b7864a69002f7d70fec0dde268f5962c3e5362677b0915b9e
-
Filesize
180KB
MD5db0cbe6826f392cc566c78a1542555ab
SHA18b5a64eca46bcc228bd6c9d1745812bdb58f8add
SHA256dfc24ae950db18794141dcffba8f195ea5a318b05de5633a894a359198491e9a
SHA51222b9d9c65e5306bd8d1fb51138653075fdaa4fa0e0fb79bdf0b304929ff891ec2af11655bd53fbaf256ad7545ea256668677f715aaca4ccaacf8fb5b776737d3
-
Filesize
168KB
MD5d783fe39c9dffee36e90af4302a3abb4
SHA1acd3dcaefb764486f15091566e1157d355f9bc43
SHA256967b508bd9bcc9dc535c0e579dd2c89b02967c681646179adf06ab4bfe5294b6
SHA51258b5bd5c0b72a87d5f6201ca3565e9fd57dff9d7032178770758be4541d90f0233cb986071b210ff4d1bcad6d0daa6e31c80db1c5ec61de2db54e4b3add6db46