Analysis
-
max time kernel
116s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
f42fa3305229c7ec3ec66163a6ebba3dcde4c9b136d9ec8fa6bfbdd0a12854a5N.exe
Resource
win10v2004-20241007-en
General
-
Target
f42fa3305229c7ec3ec66163a6ebba3dcde4c9b136d9ec8fa6bfbdd0a12854a5N.exe
-
Size
479KB
-
MD5
224633a4bc9104f0f81489948e3a6610
-
SHA1
c27bc8dc240a9b4c23821fb3b35a5fd4e0de4d78
-
SHA256
f42fa3305229c7ec3ec66163a6ebba3dcde4c9b136d9ec8fa6bfbdd0a12854a5
-
SHA512
3bef96ea6464dde450abba618d4f84eb49d86b030fa39448aaf8a941805cf57b48cc1479aa9f284f8477679daaa6b5f9959467466d1a62d479e491fc648cde9e
-
SSDEEP
12288:5Mr4y90mt8+WUjstTSpDswBnL1RpvU//8id:hyH0cwuzLbK/kG
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4748-15-0x0000000002010000-0x000000000202A000-memory.dmp healer behavioral1/memory/4748-19-0x0000000004970000-0x0000000004988000-memory.dmp healer behavioral1/memory/4748-25-0x0000000004970000-0x0000000004982000-memory.dmp healer behavioral1/memory/4748-47-0x0000000004970000-0x0000000004982000-memory.dmp healer behavioral1/memory/4748-45-0x0000000004970000-0x0000000004982000-memory.dmp healer behavioral1/memory/4748-43-0x0000000004970000-0x0000000004982000-memory.dmp healer behavioral1/memory/4748-42-0x0000000004970000-0x0000000004982000-memory.dmp healer behavioral1/memory/4748-39-0x0000000004970000-0x0000000004982000-memory.dmp healer behavioral1/memory/4748-37-0x0000000004970000-0x0000000004982000-memory.dmp healer behavioral1/memory/4748-35-0x0000000004970000-0x0000000004982000-memory.dmp healer behavioral1/memory/4748-33-0x0000000004970000-0x0000000004982000-memory.dmp healer behavioral1/memory/4748-31-0x0000000004970000-0x0000000004982000-memory.dmp healer behavioral1/memory/4748-29-0x0000000004970000-0x0000000004982000-memory.dmp healer behavioral1/memory/4748-27-0x0000000004970000-0x0000000004982000-memory.dmp healer behavioral1/memory/4748-23-0x0000000004970000-0x0000000004982000-memory.dmp healer behavioral1/memory/4748-22-0x0000000004970000-0x0000000004982000-memory.dmp healer behavioral1/memory/4748-20-0x0000000004970000-0x0000000004982000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5311608.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k5311608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5311608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5311608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5311608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5311608.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c01-53.dat family_redline behavioral1/memory/4968-55-0x0000000000760000-0x0000000000790000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1424 y8946735.exe 4748 k5311608.exe 4968 l0056333.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5311608.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5311608.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f42fa3305229c7ec3ec66163a6ebba3dcde4c9b136d9ec8fa6bfbdd0a12854a5N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8946735.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l0056333.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f42fa3305229c7ec3ec66163a6ebba3dcde4c9b136d9ec8fa6bfbdd0a12854a5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y8946735.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k5311608.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4748 k5311608.exe 4748 k5311608.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4748 k5311608.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2160 wrote to memory of 1424 2160 f42fa3305229c7ec3ec66163a6ebba3dcde4c9b136d9ec8fa6bfbdd0a12854a5N.exe 84 PID 2160 wrote to memory of 1424 2160 f42fa3305229c7ec3ec66163a6ebba3dcde4c9b136d9ec8fa6bfbdd0a12854a5N.exe 84 PID 2160 wrote to memory of 1424 2160 f42fa3305229c7ec3ec66163a6ebba3dcde4c9b136d9ec8fa6bfbdd0a12854a5N.exe 84 PID 1424 wrote to memory of 4748 1424 y8946735.exe 85 PID 1424 wrote to memory of 4748 1424 y8946735.exe 85 PID 1424 wrote to memory of 4748 1424 y8946735.exe 85 PID 1424 wrote to memory of 4968 1424 y8946735.exe 92 PID 1424 wrote to memory of 4968 1424 y8946735.exe 92 PID 1424 wrote to memory of 4968 1424 y8946735.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f42fa3305229c7ec3ec66163a6ebba3dcde4c9b136d9ec8fa6bfbdd0a12854a5N.exe"C:\Users\Admin\AppData\Local\Temp\f42fa3305229c7ec3ec66163a6ebba3dcde4c9b136d9ec8fa6bfbdd0a12854a5N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8946735.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8946735.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5311608.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5311608.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0056333.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0056333.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4968
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD56656a41ce97ae59fa8b4533d97eb82dd
SHA1e9c2fa12ce65767c21cf79b239732a663b7463a0
SHA256d078cfff3803f63a15734262c443250f456433fdad506a079e4ad010bcab9ef5
SHA512d305249b15f30894828809c7f6b14da67babf603120a175805e83dc778395be6915244a74566b2b87362e0feec4799c89f75bbb173a0f4096985209b24f2c008
-
Filesize
180KB
MD5349e3b9e09b6dd6e73da47c2198f07cd
SHA1f3e2634524bedd91378683951677fc29266fbcb3
SHA256894e7c115399261c4bd85d3a68f87086fc20380982a71ed85bd7191d97e860ee
SHA512b8d5919807b0692135084fb1a2b926170700568ebe91dbbbfa1aed1fa5fdbd09445f0d78b1cab07f78612ea3bb12a2315280934be33cd9b02ff1124d915862db
-
Filesize
168KB
MD53189ef282204d665f723a06ffc58f1c1
SHA15f2423ef3ef1c8d2427213173959ccf713ef9dbc
SHA256f9f66a0b1656a62b6289987f004a95b9bb1bf71f79987cfddfe4d73f531d14ae
SHA5127d0bb6e76054027cf2aaa2db5e9ae4cd993b3bf106f957c538de8f52411858b1ea8f5beef8652f201df0d0320d613d899025397df5c2e673bfb636f49a941e9f