Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
15b19e8ffff351c139e63848681ef9db46202e256dbdeb4499b8454359cf8c9a.exe
Resource
win10v2004-20241007-en
General
-
Target
15b19e8ffff351c139e63848681ef9db46202e256dbdeb4499b8454359cf8c9a.exe
-
Size
1.5MB
-
MD5
f3bb119191b3901ae81a0fc18acaf842
-
SHA1
19c7e6f6d1e0994928a1a5e0cbc89faa76618cf4
-
SHA256
15b19e8ffff351c139e63848681ef9db46202e256dbdeb4499b8454359cf8c9a
-
SHA512
d555c03ae618dfbcf3d143c700e2be26ffd8774ecd4bc767d46d50f4dab9f564dd2996b892e2b4f666d72c43001228925e33e7ae3efb8ae5803e3a1276347904
-
SSDEEP
24576:ey52KsKOp5NQNma8VKYeUEJkjFQH6Od82tEKCYKNpVR4pw+vlY6Z3:tYKsKOp5Numa8VuUEuJgV1tEZN/R+Y6
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/664-36-0x0000000002850000-0x000000000286A000-memory.dmp healer behavioral1/memory/664-38-0x0000000002980000-0x0000000002998000-memory.dmp healer behavioral1/memory/664-44-0x0000000002980000-0x0000000002992000-memory.dmp healer behavioral1/memory/664-66-0x0000000002980000-0x0000000002992000-memory.dmp healer behavioral1/memory/664-65-0x0000000002980000-0x0000000002992000-memory.dmp healer behavioral1/memory/664-62-0x0000000002980000-0x0000000002992000-memory.dmp healer behavioral1/memory/664-60-0x0000000002980000-0x0000000002992000-memory.dmp healer behavioral1/memory/664-58-0x0000000002980000-0x0000000002992000-memory.dmp healer behavioral1/memory/664-57-0x0000000002980000-0x0000000002992000-memory.dmp healer behavioral1/memory/664-54-0x0000000002980000-0x0000000002992000-memory.dmp healer behavioral1/memory/664-52-0x0000000002980000-0x0000000002992000-memory.dmp healer behavioral1/memory/664-50-0x0000000002980000-0x0000000002992000-memory.dmp healer behavioral1/memory/664-48-0x0000000002980000-0x0000000002992000-memory.dmp healer behavioral1/memory/664-46-0x0000000002980000-0x0000000002992000-memory.dmp healer behavioral1/memory/664-39-0x0000000002980000-0x0000000002992000-memory.dmp healer behavioral1/memory/664-42-0x0000000002980000-0x0000000002992000-memory.dmp healer behavioral1/memory/664-40-0x0000000002980000-0x0000000002992000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8116010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8116010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8116010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8116010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8116010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8116010.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b89-71.dat family_redline behavioral1/memory/2436-73-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 2264 v6172254.exe 4040 v3532827.exe 3388 v8497775.exe 1468 v6543756.exe 664 a8116010.exe 2436 b8020577.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8116010.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8116010.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 15b19e8ffff351c139e63848681ef9db46202e256dbdeb4499b8454359cf8c9a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6172254.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3532827.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8497775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v6543756.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1212 664 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3532827.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8497775.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6543756.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8116010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8020577.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15b19e8ffff351c139e63848681ef9db46202e256dbdeb4499b8454359cf8c9a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6172254.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 664 a8116010.exe 664 a8116010.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 664 a8116010.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2264 2680 15b19e8ffff351c139e63848681ef9db46202e256dbdeb4499b8454359cf8c9a.exe 83 PID 2680 wrote to memory of 2264 2680 15b19e8ffff351c139e63848681ef9db46202e256dbdeb4499b8454359cf8c9a.exe 83 PID 2680 wrote to memory of 2264 2680 15b19e8ffff351c139e63848681ef9db46202e256dbdeb4499b8454359cf8c9a.exe 83 PID 2264 wrote to memory of 4040 2264 v6172254.exe 84 PID 2264 wrote to memory of 4040 2264 v6172254.exe 84 PID 2264 wrote to memory of 4040 2264 v6172254.exe 84 PID 4040 wrote to memory of 3388 4040 v3532827.exe 85 PID 4040 wrote to memory of 3388 4040 v3532827.exe 85 PID 4040 wrote to memory of 3388 4040 v3532827.exe 85 PID 3388 wrote to memory of 1468 3388 v8497775.exe 86 PID 3388 wrote to memory of 1468 3388 v8497775.exe 86 PID 3388 wrote to memory of 1468 3388 v8497775.exe 86 PID 1468 wrote to memory of 664 1468 v6543756.exe 88 PID 1468 wrote to memory of 664 1468 v6543756.exe 88 PID 1468 wrote to memory of 664 1468 v6543756.exe 88 PID 1468 wrote to memory of 2436 1468 v6543756.exe 103 PID 1468 wrote to memory of 2436 1468 v6543756.exe 103 PID 1468 wrote to memory of 2436 1468 v6543756.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\15b19e8ffff351c139e63848681ef9db46202e256dbdeb4499b8454359cf8c9a.exe"C:\Users\Admin\AppData\Local\Temp\15b19e8ffff351c139e63848681ef9db46202e256dbdeb4499b8454359cf8c9a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6172254.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6172254.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3532827.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3532827.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8497775.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8497775.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6543756.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6543756.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8116010.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8116010.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 664 -s 10847⤵
- Program crash
PID:1212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8020577.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8020577.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2436
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 664 -ip 6641⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5a0b2408774f242baa7ae0366e80077a3
SHA1e1238bd0a1718b30cd4118e698ee6fdad2276cf6
SHA25663cdfc8093bbe5b06dd92b008236c972a6061720cf5af87f50b3a330cb26930c
SHA512c99a9da8422ed21379a1fb8d14791848f2714b031cc8ecc19ba8552e79a0e9a4531e8c39d12ead933abcd748541440982646adc0683e760c482c292cd74499b6
-
Filesize
911KB
MD55fd822ae8437a57992d8850255e2a4b9
SHA1488d981907cd4308b5cfb160b7bdf5c64b66cb75
SHA256a6899574144fa12fa43d6f05f22c4733c1270d02d79959d4b73e64a36675ba9b
SHA512b7779756e72450cd8e46653cc666770629ecc016da1d6f4d82857d456f46990be04aaf6bc1f4be7e561dd4dac9d74e57c02ada8c252ed85e8a969a7c46013a95
-
Filesize
706KB
MD5391d430787110d607abd051d5ff526e5
SHA170ebeb72045644d0f95cdcc606df13064ffb9241
SHA2560e7627aaed4fee5b20c9ee4ea255fb86a0fa8df23d0436c73dcf745c90d4aa6c
SHA512aa2a8321fdc8f2410b1d49c7272b5c0c7dc0078facf7e4aa58659ffd1a65de34cb96f94fea87d8a72a5f1b6f257d3d4fc3694077f9df6deae27362e6c7c405e6
-
Filesize
415KB
MD5b2340f599389d8bbf12540817b129173
SHA187ae3a5adaab4f26e3a90ff83432001b43fa98b5
SHA2567f727ff22e813c48c5a1008604fadf7dbfdf8cb011c9b1dbc6639ee0cc7e24b9
SHA5120273ba22ab5e98cbf4ad220b21b134b164f5d9505927114e8c6c54c3dd2e57103d8c7392136985b7ab02742592c985eaab6a1ae284087b20950440c70d404d07
-
Filesize
360KB
MD5fa4b73b59fa5ed68abd617835e07176c
SHA14315d9fcd15de6d1573083505bb149bff78ad237
SHA2561f5f57daa37aa5c0a7d9a455ad9c31cbce434a4df9da5982355725d9f8568c93
SHA5124a39532de4e6989982934839ccde90a4c3d7aa53163c3dcf1d387d0f97658dbbe0e56a5e4e4630d6a1a91eb7b3a8fb3370dcf2b489f30e88973d4a7af5ce956a
-
Filesize
168KB
MD5428ff14c78db8c5a105b4de394da80b0
SHA18d73dc6ec8bcbc03c2b8c031ed1b4e618141a93b
SHA25648accbd0bda412dea7a18121eaae6179caf770631c9038d2562aedea38cfced4
SHA512aad000453219088c2a2e618adcfa4a418ae422600f0a68460fcaf205a6e91edecfd5f69c4ae3404b3429597f14bb63df598adfb8992920931a5b44acd1f71132