Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
d3269725d532b370e2a1d4308fda2ead440deb46ee46de658c618feb4aee5082.exe
Resource
win10v2004-20241007-en
General
-
Target
d3269725d532b370e2a1d4308fda2ead440deb46ee46de658c618feb4aee5082.exe
-
Size
479KB
-
MD5
b882b4e79a1f63cb800292542c77306a
-
SHA1
887fe0a1351318a9a3e8a14bcf57d09f4ddd2665
-
SHA256
d3269725d532b370e2a1d4308fda2ead440deb46ee46de658c618feb4aee5082
-
SHA512
d3f3eef086a20a4dc00fa0dbd9541c7e802f3341294da837d9aaebbe63c0687d791fb873c70e5a17f70f7aee8cf9bf489cde29e923e1ac721a77003dd248de75
-
SSDEEP
12288:kMray90MCdJ2OVhmtbMrYYwHiCUltsMDbl24G:Wy1Cd4OimIiC+3BG
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4736-15-0x0000000002360000-0x000000000237A000-memory.dmp healer behavioral1/memory/4736-19-0x0000000004980000-0x0000000004998000-memory.dmp healer behavioral1/memory/4736-47-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4736-45-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4736-43-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4736-41-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4736-39-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4736-37-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4736-35-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4736-33-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4736-31-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4736-29-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4736-27-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4736-25-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4736-23-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4736-21-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/4736-20-0x0000000004980000-0x0000000004992000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k5005325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5005325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5005325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5005325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5005325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5005325.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cb1-53.dat family_redline behavioral1/memory/3968-55-0x00000000007B0000-0x00000000007E0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1892 y6908631.exe 4736 k5005325.exe 3968 l9476672.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5005325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5005325.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6908631.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d3269725d532b370e2a1d4308fda2ead440deb46ee46de658c618feb4aee5082.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3269725d532b370e2a1d4308fda2ead440deb46ee46de658c618feb4aee5082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y6908631.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k5005325.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l9476672.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4736 k5005325.exe 4736 k5005325.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4736 k5005325.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1892 2928 d3269725d532b370e2a1d4308fda2ead440deb46ee46de658c618feb4aee5082.exe 83 PID 2928 wrote to memory of 1892 2928 d3269725d532b370e2a1d4308fda2ead440deb46ee46de658c618feb4aee5082.exe 83 PID 2928 wrote to memory of 1892 2928 d3269725d532b370e2a1d4308fda2ead440deb46ee46de658c618feb4aee5082.exe 83 PID 1892 wrote to memory of 4736 1892 y6908631.exe 84 PID 1892 wrote to memory of 4736 1892 y6908631.exe 84 PID 1892 wrote to memory of 4736 1892 y6908631.exe 84 PID 1892 wrote to memory of 3968 1892 y6908631.exe 95 PID 1892 wrote to memory of 3968 1892 y6908631.exe 95 PID 1892 wrote to memory of 3968 1892 y6908631.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3269725d532b370e2a1d4308fda2ead440deb46ee46de658c618feb4aee5082.exe"C:\Users\Admin\AppData\Local\Temp\d3269725d532b370e2a1d4308fda2ead440deb46ee46de658c618feb4aee5082.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6908631.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6908631.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5005325.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5005325.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9476672.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9476672.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3968
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD55891e1f67a36573f267e4c3eb333f05e
SHA17c98ac4ac2ebf4f8d7a64d3d75b9e1708480f5d5
SHA2568462c0ff704611aee694949efcf5b8ba42ec869425f58a36133cfae01f4fc6af
SHA512667d254bdb39a3d1846e31abf692ac5b0d7f75a14348e5c423f0308d9b2c715e2917682635d947f0c3fe70b6846a94058b553a2408b3605af30648502fd32023
-
Filesize
180KB
MD5dc73c3b734598302b305575d2757ea6d
SHA1392abf151dd98e5a203524fc6e1c3c93a07395fa
SHA256fbdda4cddb05278783a318c7b4f000048dddb88f1332a21517192b1ce6666acb
SHA512069092d27138a24612ad6549f3214aeca9f0e6113316d6f29e9c9785f80750de721931e289c339b42cfd2197b3b274c490b0f4da1f74070d889b50b081abb879
-
Filesize
168KB
MD588f0166b9bad73325839ac3e9a96203a
SHA147ec95f084af19e8565f0c7a90ccb34a39f00633
SHA256572536e18599de77cf631f4512f1ee8c7e93371eca4d3b761b97d639f240c17b
SHA512d46ab7e32e2d22ebc92cf4e1553776960de9d9fe97b442ac196afae07a28a27803d5527389a3ad26f9cf4980b823552df40f10378c6741257689197430c43e7f