Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
bed14ee7d04f53587860d7f6309f683d0f62fe9b3d5055c5d8af670f7f458822.exe
Resource
win10v2004-20241007-en
General
-
Target
bed14ee7d04f53587860d7f6309f683d0f62fe9b3d5055c5d8af670f7f458822.exe
-
Size
1.5MB
-
MD5
e25393e886ded632f260449b651cca61
-
SHA1
f4f50064aec9e58596956cd73a257b8035285208
-
SHA256
bed14ee7d04f53587860d7f6309f683d0f62fe9b3d5055c5d8af670f7f458822
-
SHA512
0890d014ec77a29f8f640f4e8cab41ad54618bd91570af1735aba2f074e495d03f0a7c3dd65604a06ee29bc80e8f45ac79d284da507d2812ea62b7c2dfc74221
-
SSDEEP
24576:MyQbBSZV5KOjJECRQCMPzdeWfKe7wC8KuqsxAh/QRDbBIWBz/qMRrXXgfp:7uBmF2CKfGeElYsihIFbH7Uf
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1552-36-0x0000000002370000-0x000000000238A000-memory.dmp healer behavioral1/memory/1552-38-0x0000000004C90000-0x0000000004CA8000-memory.dmp healer behavioral1/memory/1552-39-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/1552-66-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/1552-64-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/1552-62-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/1552-60-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/1552-58-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/1552-56-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/1552-55-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/1552-52-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/1552-50-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/1552-48-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/1552-46-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/1552-44-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/1552-42-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/1552-40-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7853769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7853769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7853769.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7853769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7853769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7853769.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b80-71.dat family_redline behavioral1/memory/456-73-0x0000000000F60000-0x0000000000F90000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 4468 v1633024.exe 1360 v9578073.exe 2804 v8008408.exe 1996 v8100721.exe 1552 a7853769.exe 456 b3704795.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7853769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7853769.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v8100721.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bed14ee7d04f53587860d7f6309f683d0f62fe9b3d5055c5d8af670f7f458822.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1633024.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9578073.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8008408.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3336 1552 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3704795.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bed14ee7d04f53587860d7f6309f683d0f62fe9b3d5055c5d8af670f7f458822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v1633024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v9578073.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8008408.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8100721.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7853769.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1552 a7853769.exe 1552 a7853769.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1552 a7853769.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4820 wrote to memory of 4468 4820 bed14ee7d04f53587860d7f6309f683d0f62fe9b3d5055c5d8af670f7f458822.exe 83 PID 4820 wrote to memory of 4468 4820 bed14ee7d04f53587860d7f6309f683d0f62fe9b3d5055c5d8af670f7f458822.exe 83 PID 4820 wrote to memory of 4468 4820 bed14ee7d04f53587860d7f6309f683d0f62fe9b3d5055c5d8af670f7f458822.exe 83 PID 4468 wrote to memory of 1360 4468 v1633024.exe 84 PID 4468 wrote to memory of 1360 4468 v1633024.exe 84 PID 4468 wrote to memory of 1360 4468 v1633024.exe 84 PID 1360 wrote to memory of 2804 1360 v9578073.exe 86 PID 1360 wrote to memory of 2804 1360 v9578073.exe 86 PID 1360 wrote to memory of 2804 1360 v9578073.exe 86 PID 2804 wrote to memory of 1996 2804 v8008408.exe 88 PID 2804 wrote to memory of 1996 2804 v8008408.exe 88 PID 2804 wrote to memory of 1996 2804 v8008408.exe 88 PID 1996 wrote to memory of 1552 1996 v8100721.exe 89 PID 1996 wrote to memory of 1552 1996 v8100721.exe 89 PID 1996 wrote to memory of 1552 1996 v8100721.exe 89 PID 1996 wrote to memory of 456 1996 v8100721.exe 103 PID 1996 wrote to memory of 456 1996 v8100721.exe 103 PID 1996 wrote to memory of 456 1996 v8100721.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\bed14ee7d04f53587860d7f6309f683d0f62fe9b3d5055c5d8af670f7f458822.exe"C:\Users\Admin\AppData\Local\Temp\bed14ee7d04f53587860d7f6309f683d0f62fe9b3d5055c5d8af670f7f458822.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1633024.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1633024.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9578073.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9578073.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8008408.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8008408.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8100721.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8100721.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7853769.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7853769.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 11007⤵
- Program crash
PID:3336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3704795.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3704795.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:456
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1552 -ip 15521⤵PID:2224
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD55abc601d2ee725088a4ae3a1e995e98b
SHA1b7272b7999f0ddc2bfd1829fee56daa52289afc2
SHA2567fa64de79cfab8657c6164b3de67b9c2b7b7c89dfdff6d9348a7ebf559d2858b
SHA512c58e192ef8bf19814eb728b9b5cfb0a2ccaba79af9982c586f0a1a31062effa5ece3b46502e98ca055426fb12595655f38b5212ff051262e8abdb99e9c3f0684
-
Filesize
911KB
MD53e3139f4da2a234d7120e8ef8ad0475d
SHA12861f6a75d62aece510d48254d8eafe30501d82f
SHA25668bb74038b839727f4587e603dccf47cc46ed1f9dba5b0e770db622bca7510f3
SHA5129578d7df621dde644ae13171935be9e3e6c84566473a9d2844afe566a5633a545ce3a3ec246038e1d155edf505f3adf3cdc1e027d8e7212fdffb843b440ccd7d
-
Filesize
707KB
MD5905137e1d7093cad82b75f7e4baac46c
SHA14d38c726d1febc316180a128d912f01558dca5d4
SHA2566f1f14f989584bf5294aaa4baa3408de0af42e1addd98ef0f113ef0080576751
SHA5123495995b7c01302d7d927351901014fc7f709b2cd0b8a52cdb0a83508294a769ac4750b75724229f51269f7a1890cb492052954b3c24bc65512335bbc8747852
-
Filesize
416KB
MD5effb6ff5af3f90e73b5921ec2a6cf227
SHA15530ba2a15693515a94d2f01dcb50261ac6819fa
SHA2561d0ab7d58041ed4b4da2595a56c2c2499e74976144a53e62abf1a13ab7805ff6
SHA512620be5632ef4647a1fe7d8c089cb1851d5632584195b1fdfaac67661c2fc82510fff69f64efd182dfcd980feb1628fa14327d5af2593fc071744e513c29dd90f
-
Filesize
360KB
MD5592b18a167252f7b7178c4ca0fbb4671
SHA12d2b8146e5d48e96df623e5fa548b607cd21c3ef
SHA256d548bdff6c18a3db50508d32e068fa080a83281580da224601ca817efe493bd6
SHA5122afcd652f7666303ee4cf188f4d76975dec6b6d65cdd4c8507fc9582e0939a492d5f33babb677f949020b5c9986129666ee7d76fee9928ea74046a71e710cdae
-
Filesize
168KB
MD53034658bd18551ca968af89c0a3983d3
SHA1ed9890bd1556ec3d6208ac9265a55c8cff42ef0a
SHA25673ce7b7c975962568ffd62dc66787caabb28ce01621de3bf5fa938f237c66f19
SHA51249d7a154a55f215f5b5706603205e7189d414c9f9c23b4966bab15b69dead2044a6e7a8740b845e1a19d47ae9baddfcc01abc6cc88034bc8d158a8f58b4be77f