Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
a5761aaa0cfd4db4b4e1c534a8e40d66160e2d711d68241af65b34084c68b503.exe
Resource
win10v2004-20241007-en
General
-
Target
a5761aaa0cfd4db4b4e1c534a8e40d66160e2d711d68241af65b34084c68b503.exe
-
Size
479KB
-
MD5
e8324fbc7c9f55a71691d271d15244db
-
SHA1
477216916f3a2de1815233e8242d5e61aeee8ae4
-
SHA256
a5761aaa0cfd4db4b4e1c534a8e40d66160e2d711d68241af65b34084c68b503
-
SHA512
2268b11bc27f26ffe197dfaaee9df26db09a0d0437bc615f8d317799fefc3ef56f8899e16dddb96d4b9fba2b4f2b83f844c5dfeca7376e7ed513772a8c57f915
-
SSDEEP
12288:4Mrsy90PTIGksuf+PI0fPwaXLMpKzXm+NI:Uy+TIz8x7QN+NI
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3060-15-0x00000000008D0000-0x00000000008EA000-memory.dmp healer behavioral1/memory/3060-18-0x0000000004990000-0x00000000049A8000-memory.dmp healer behavioral1/memory/3060-38-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral1/memory/3060-42-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral1/memory/3060-46-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral1/memory/3060-44-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral1/memory/3060-40-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral1/memory/3060-36-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral1/memory/3060-34-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral1/memory/3060-32-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral1/memory/3060-30-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral1/memory/3060-28-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral1/memory/3060-26-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral1/memory/3060-24-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral1/memory/3060-22-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral1/memory/3060-20-0x0000000004990000-0x00000000049A2000-memory.dmp healer behavioral1/memory/3060-19-0x0000000004990000-0x00000000049A2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7442162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7442162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7442162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7442162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7442162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7442162.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023ba1-54.dat family_redline behavioral1/memory/4184-56-0x0000000000B90000-0x0000000000BC0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 116 y0038595.exe 3060 k7442162.exe 4184 l1830572.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7442162.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7442162.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0038595.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a5761aaa0cfd4db4b4e1c534a8e40d66160e2d711d68241af65b34084c68b503.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5761aaa0cfd4db4b4e1c534a8e40d66160e2d711d68241af65b34084c68b503.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y0038595.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k7442162.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l1830572.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3060 k7442162.exe 3060 k7442162.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3060 k7442162.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2308 wrote to memory of 116 2308 a5761aaa0cfd4db4b4e1c534a8e40d66160e2d711d68241af65b34084c68b503.exe 83 PID 2308 wrote to memory of 116 2308 a5761aaa0cfd4db4b4e1c534a8e40d66160e2d711d68241af65b34084c68b503.exe 83 PID 2308 wrote to memory of 116 2308 a5761aaa0cfd4db4b4e1c534a8e40d66160e2d711d68241af65b34084c68b503.exe 83 PID 116 wrote to memory of 3060 116 y0038595.exe 84 PID 116 wrote to memory of 3060 116 y0038595.exe 84 PID 116 wrote to memory of 3060 116 y0038595.exe 84 PID 116 wrote to memory of 4184 116 y0038595.exe 92 PID 116 wrote to memory of 4184 116 y0038595.exe 92 PID 116 wrote to memory of 4184 116 y0038595.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5761aaa0cfd4db4b4e1c534a8e40d66160e2d711d68241af65b34084c68b503.exe"C:\Users\Admin\AppData\Local\Temp\a5761aaa0cfd4db4b4e1c534a8e40d66160e2d711d68241af65b34084c68b503.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0038595.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0038595.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7442162.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7442162.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1830572.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1830572.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4184
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD548a57bbf807ef1355deaff59c6b2f01d
SHA132e47b3da8165b386ddaa41a7a948dcb2f50a217
SHA2563021ba5ec59df94b92902d0d6daf4c9cf625c92a98e069dc4db444c1f61e3f89
SHA51264d021d16bcfd7cb86611886e98a1dfb4481aed4aa91890a6b23acc286524166343b6236646b79291ff88a4286d6832d0fe15dd0535c41e78d6afb1d4ac00f9d
-
Filesize
180KB
MD526d31a0f8b9f7166f57e2fe7a5e0fa69
SHA159c8062231633a2cefe16b2680895a3bdb476c09
SHA256e553ee629875c0423295deb518a78f5a4cac6c44e223438dbd76a2bfc3bc5a25
SHA512c12737ff092f6f07945361fec4631a55f38b17570d24634c624f415016d191761c0867ac13d40ac905fec38f506017a9371f97ce3a97ebd98f18db20d31c23f7
-
Filesize
168KB
MD55c178f77587ec00b5fb2ed2846dad86a
SHA1d9cf753f887bfd103496d7956ef93adcb1a7dd02
SHA256567ae0b9dcaffeee0a5ad2f867c4d5061d092999c14db3f6c3cbdc8beb7ceeea
SHA512884b1ea0fc815975c3a56e0d9324741c62eaf3380c27b7ce42f40a1533618dfc12fdec7d9144f455a7afbdad54111ddad443448dc71dc941572477e512056526