Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
8a752dc43e43a06fe6b70d54d6efc676e2341624a3fea10d59496b2512e69c47.exe
Resource
win10v2004-20241007-en
General
-
Target
8a752dc43e43a06fe6b70d54d6efc676e2341624a3fea10d59496b2512e69c47.exe
-
Size
1.5MB
-
MD5
e6aa2a4dd80bacd7245122be9f1716c2
-
SHA1
36c2b0852c84afbd6d1ac250b9b565151e9f6e7a
-
SHA256
8a752dc43e43a06fe6b70d54d6efc676e2341624a3fea10d59496b2512e69c47
-
SHA512
812cf73888be745a7cd7f5a3013a374c56d06171d7db68ba819e12bf447a8ee495c02fb23984fb6c0beb327a0cf02542f11ea99a5a6fabf7b551b1428f61a309
-
SSDEEP
49152:j7dfVh6DCrTAQUfre00BrJHGut/rhU8Q:3RV8WrLKre0gH/jhU8
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4476-36-0x0000000002500000-0x000000000251A000-memory.dmp healer behavioral1/memory/4476-38-0x0000000002530000-0x0000000002548000-memory.dmp healer behavioral1/memory/4476-42-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4476-66-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4476-65-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4476-62-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4476-60-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4476-58-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4476-56-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4476-54-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4476-52-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4476-50-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4476-48-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4476-46-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4476-44-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4476-39-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4476-40-0x0000000002530000-0x0000000002542000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8276274.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8276274.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8276274.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8276274.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8276274.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8276274.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b90-71.dat family_redline behavioral1/memory/516-73-0x0000000000250000-0x0000000000280000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 3240 v5946676.exe 1980 v9215542.exe 4668 v3185907.exe 4424 v5349501.exe 4476 a8276274.exe 516 b1741150.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8276274.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8276274.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8a752dc43e43a06fe6b70d54d6efc676e2341624a3fea10d59496b2512e69c47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5946676.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9215542.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3185907.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v5349501.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4268 4476 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v5946676.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v9215542.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3185907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v5349501.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8276274.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1741150.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a752dc43e43a06fe6b70d54d6efc676e2341624a3fea10d59496b2512e69c47.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4476 a8276274.exe 4476 a8276274.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4476 a8276274.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3412 wrote to memory of 3240 3412 8a752dc43e43a06fe6b70d54d6efc676e2341624a3fea10d59496b2512e69c47.exe 83 PID 3412 wrote to memory of 3240 3412 8a752dc43e43a06fe6b70d54d6efc676e2341624a3fea10d59496b2512e69c47.exe 83 PID 3412 wrote to memory of 3240 3412 8a752dc43e43a06fe6b70d54d6efc676e2341624a3fea10d59496b2512e69c47.exe 83 PID 3240 wrote to memory of 1980 3240 v5946676.exe 84 PID 3240 wrote to memory of 1980 3240 v5946676.exe 84 PID 3240 wrote to memory of 1980 3240 v5946676.exe 84 PID 1980 wrote to memory of 4668 1980 v9215542.exe 85 PID 1980 wrote to memory of 4668 1980 v9215542.exe 85 PID 1980 wrote to memory of 4668 1980 v9215542.exe 85 PID 4668 wrote to memory of 4424 4668 v3185907.exe 86 PID 4668 wrote to memory of 4424 4668 v3185907.exe 86 PID 4668 wrote to memory of 4424 4668 v3185907.exe 86 PID 4424 wrote to memory of 4476 4424 v5349501.exe 88 PID 4424 wrote to memory of 4476 4424 v5349501.exe 88 PID 4424 wrote to memory of 4476 4424 v5349501.exe 88 PID 4424 wrote to memory of 516 4424 v5349501.exe 103 PID 4424 wrote to memory of 516 4424 v5349501.exe 103 PID 4424 wrote to memory of 516 4424 v5349501.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a752dc43e43a06fe6b70d54d6efc676e2341624a3fea10d59496b2512e69c47.exe"C:\Users\Admin\AppData\Local\Temp\8a752dc43e43a06fe6b70d54d6efc676e2341624a3fea10d59496b2512e69c47.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5946676.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5946676.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9215542.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9215542.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3185907.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3185907.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5349501.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5349501.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8276274.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8276274.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 10807⤵
- Program crash
PID:4268
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1741150.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1741150.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:516
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4476 -ip 44761⤵PID:2428
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD534675e0740d16ae60b2bd1541cd8b6e6
SHA18db2b10c23066a89cdfab9bc8cba5e6c04a054c9
SHA25657fc3a6b71a3cf2291950429b2aadfae1c2b6e826784a7562653e5f59f8440ec
SHA512bda63ed7070a887c6587ba6124073ed50eb42772a7f1910ee9519f68c55da5a224d5f554001fee37f917e5f8835a4d0588c292a445bc3644d9b6b348704e3cd3
-
Filesize
915KB
MD51c754bd5d2a2762d74a1b6f3d5497626
SHA169a8e327e3d357ae53383446a8178a32d76c60ac
SHA256c6b7533038f63cdf4beac40648a6396ae1f6fbe3511235030e1e0d523ea7cf2f
SHA512c2264dc01bee62dcd1555852aa32981132bf12918f40116965d78dd856daf0d1743b64e98faaf609d9c246c6f4260594d6e593d57b53d5ed72ef4587d2a8b98b
-
Filesize
711KB
MD5cf82b4929d8037aa89b1056fd3f1fe91
SHA11d78b88813d833b5778c9c73a346e8f9614ad497
SHA2564c31f1f6911ae1cf932478d9ecc3783603a0a9e475de2be48cab91ee58038529
SHA512dbd246dfe6d59a8bc652ca7560189e10508ee0f172b4279fb9612fc07a1943101ba44165207bf38791c95b532f258c701097098146d3d5bd6fa484121a48ccbb
-
Filesize
416KB
MD50c55fce769ed9cab0197ccb1e60042f3
SHA1764be7c1b94909f1ae95dfe9549ed918b84fc26c
SHA256575901438f8b32c4dba176c8d1d2978a74515cca09d1421d37d5b30f71b94545
SHA5123831fd6c10b81afdc58ac3bac3b635235c6916d6da3453a6aabf616609b00978133b9e2232ee04bce2b98f1696772d43c364c5ce1df76c8c910021f763a4d977
-
Filesize
360KB
MD504072c1b1231c5dea0be45ce2a3485cb
SHA1cb1d22c148ab8ea15fdafa9cc073b0da5feb7202
SHA2563990e5e2ba5e62328ea57f13fb5067f330d20b5e331af2c6b0140118241f1a0e
SHA512af8104f8260b71d7ef15e6972b8ca6f7e35ac7174614b47496aac55f708c768b01d3e7992061b3069760147cc3d8418f8ebec47749aab8a662f90507184c3f22
-
Filesize
168KB
MD57b6b1bd82e0be5cf8add126ac9f7e0d1
SHA12f0716bfe728ee8ea0355c4dcbb26b623353b4a5
SHA25664760db4612df11a5874498b75b475e9de796928abf6a03c5300ec1085bdccb7
SHA5127d8e9e2c861eb2e69d3939886d33059ae3215ad63c25e1ffdc102468e705db5a852159ccc579aa6c188c8cdaa1816e46acd74d2e253f034773870e132e83fb0d