Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 15:28
Static task
static1
Behavioral task
behavioral1
Sample
36bc5deda8b8d28d1116780894a8894b5f8c6037e5214aa423c55a0c1e176efa.exe
Resource
win10v2004-20241007-en
General
-
Target
36bc5deda8b8d28d1116780894a8894b5f8c6037e5214aa423c55a0c1e176efa.exe
-
Size
1.5MB
-
MD5
2fe0e533f561429c504ef0f9e50186e8
-
SHA1
eceb77f83f56e03d8ff627b7ba085632ff4e4afd
-
SHA256
36bc5deda8b8d28d1116780894a8894b5f8c6037e5214aa423c55a0c1e176efa
-
SHA512
6d52191f28b1c9ab687bd8d7413cf1140024b357a6478fca5acd3e7408e5b8276b3ba30fd93f007e6d605d379cb0ef4e5166d547bec12c27a9fb69c290c0c6a2
-
SSDEEP
49152:Kq2jxHbfAq71mGDUUkEQv/fs/a0hKJqO49cubL:v2jxH7X1mGDbI/fs2qX9cYL
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4836-36-0x0000000002740000-0x000000000275A000-memory.dmp healer behavioral1/memory/4836-38-0x0000000005390000-0x00000000053A8000-memory.dmp healer behavioral1/memory/4836-66-0x0000000005390000-0x00000000053A2000-memory.dmp healer behavioral1/memory/4836-64-0x0000000005390000-0x00000000053A2000-memory.dmp healer behavioral1/memory/4836-62-0x0000000005390000-0x00000000053A2000-memory.dmp healer behavioral1/memory/4836-60-0x0000000005390000-0x00000000053A2000-memory.dmp healer behavioral1/memory/4836-58-0x0000000005390000-0x00000000053A2000-memory.dmp healer behavioral1/memory/4836-56-0x0000000005390000-0x00000000053A2000-memory.dmp healer behavioral1/memory/4836-54-0x0000000005390000-0x00000000053A2000-memory.dmp healer behavioral1/memory/4836-53-0x0000000005390000-0x00000000053A2000-memory.dmp healer behavioral1/memory/4836-50-0x0000000005390000-0x00000000053A2000-memory.dmp healer behavioral1/memory/4836-48-0x0000000005390000-0x00000000053A2000-memory.dmp healer behavioral1/memory/4836-46-0x0000000005390000-0x00000000053A2000-memory.dmp healer behavioral1/memory/4836-44-0x0000000005390000-0x00000000053A2000-memory.dmp healer behavioral1/memory/4836-42-0x0000000005390000-0x00000000053A2000-memory.dmp healer behavioral1/memory/4836-40-0x0000000005390000-0x00000000053A2000-memory.dmp healer behavioral1/memory/4836-39-0x0000000005390000-0x00000000053A2000-memory.dmp healer -
Healer family
-
Processes:
a1195355.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1195355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1195355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1195355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1195355.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a1195355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1195355.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7742424.exe family_redline behavioral1/memory/2488-73-0x0000000000D60000-0x0000000000D90000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
Processes:
v5200934.exev5092746.exev8675122.exev8023413.exea1195355.exeb7742424.exepid process 3504 v5200934.exe 4992 v5092746.exe 2464 v8675122.exe 5028 v8023413.exe 4836 a1195355.exe 2488 b7742424.exe -
Processes:
a1195355.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1195355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1195355.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
v8023413.exe36bc5deda8b8d28d1116780894a8894b5f8c6037e5214aa423c55a0c1e176efa.exev5200934.exev5092746.exev8675122.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v8023413.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 36bc5deda8b8d28d1116780894a8894b5f8c6037e5214aa423c55a0c1e176efa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5200934.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5092746.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8675122.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4968 4836 WerFault.exe a1195355.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
v8023413.exea1195355.exeb7742424.exe36bc5deda8b8d28d1116780894a8894b5f8c6037e5214aa423c55a0c1e176efa.exev5200934.exev5092746.exev8675122.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8023413.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1195355.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7742424.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36bc5deda8b8d28d1116780894a8894b5f8c6037e5214aa423c55a0c1e176efa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v5200934.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v5092746.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8675122.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a1195355.exepid process 4836 a1195355.exe 4836 a1195355.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a1195355.exedescription pid process Token: SeDebugPrivilege 4836 a1195355.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
36bc5deda8b8d28d1116780894a8894b5f8c6037e5214aa423c55a0c1e176efa.exev5200934.exev5092746.exev8675122.exev8023413.exedescription pid process target process PID 3764 wrote to memory of 3504 3764 36bc5deda8b8d28d1116780894a8894b5f8c6037e5214aa423c55a0c1e176efa.exe v5200934.exe PID 3764 wrote to memory of 3504 3764 36bc5deda8b8d28d1116780894a8894b5f8c6037e5214aa423c55a0c1e176efa.exe v5200934.exe PID 3764 wrote to memory of 3504 3764 36bc5deda8b8d28d1116780894a8894b5f8c6037e5214aa423c55a0c1e176efa.exe v5200934.exe PID 3504 wrote to memory of 4992 3504 v5200934.exe v5092746.exe PID 3504 wrote to memory of 4992 3504 v5200934.exe v5092746.exe PID 3504 wrote to memory of 4992 3504 v5200934.exe v5092746.exe PID 4992 wrote to memory of 2464 4992 v5092746.exe v8675122.exe PID 4992 wrote to memory of 2464 4992 v5092746.exe v8675122.exe PID 4992 wrote to memory of 2464 4992 v5092746.exe v8675122.exe PID 2464 wrote to memory of 5028 2464 v8675122.exe v8023413.exe PID 2464 wrote to memory of 5028 2464 v8675122.exe v8023413.exe PID 2464 wrote to memory of 5028 2464 v8675122.exe v8023413.exe PID 5028 wrote to memory of 4836 5028 v8023413.exe a1195355.exe PID 5028 wrote to memory of 4836 5028 v8023413.exe a1195355.exe PID 5028 wrote to memory of 4836 5028 v8023413.exe a1195355.exe PID 5028 wrote to memory of 2488 5028 v8023413.exe b7742424.exe PID 5028 wrote to memory of 2488 5028 v8023413.exe b7742424.exe PID 5028 wrote to memory of 2488 5028 v8023413.exe b7742424.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36bc5deda8b8d28d1116780894a8894b5f8c6037e5214aa423c55a0c1e176efa.exe"C:\Users\Admin\AppData\Local\Temp\36bc5deda8b8d28d1116780894a8894b5f8c6037e5214aa423c55a0c1e176efa.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5200934.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5200934.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5092746.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5092746.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8675122.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8675122.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8023413.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8023413.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1195355.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1195355.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 10807⤵
- Program crash
PID:4968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7742424.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7742424.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2488
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4836 -ip 48361⤵PID:4740
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5238f69a85a427fe7a169419a5ffb59d1
SHA15a3760a76c5613b580ec867e3605e04039e113cf
SHA256c3b9ee9d515842f85b66008b50c4b33b1fce9c156ebc369dbe992920c5fb6d84
SHA51287049666f2e5cd72cc55a79a2957659ab4de23f41dbb56a9bdb0cc44269036410d3cdfdf81a212676e77572d12bf4aea04e1c86810cea19a6873e4b40442dea0
-
Filesize
916KB
MD5847bc866e62969e28638275b2250a9a2
SHA112ee44ca354231c2172b9f7d7e8ea9ad7308781a
SHA256f26923cafb76da4ab5718b86337733c043b024884ddae06660aedf81c89a8737
SHA51278e7e145cd86422e9d13456256825f7273b7a1591ee3b482cfbd4be7310bbce1a5ce899a2f975706bb133dcfdceb5084dbb9b89406b27054ca312dec54e996b8
-
Filesize
711KB
MD5189f048e7207671de1af9a94a83eae40
SHA1ae7c62cd930210dda98f218b649467152d0ec730
SHA256c4f1667eb50a9599cda25881752ab7ec62bd5fed4d6fbf364ab4b07eb17ef072
SHA512df7f096905b0afba0c9c92045120490c158c41d5366f22959e0f0a0b9b323651443f4a5dc84e82fa020d606640a5643056f4a778069158ff5a737a598d846752
-
Filesize
416KB
MD5dbe9bde4a5f2a486bc3ce81ce7b21466
SHA1d696f4e0d68e8994e6c3307efa01e3ffcfe02c24
SHA256f53828dfbe6c891423c3a3850c7b0834b4d8d8951bdb97fef55aee0ff8e584e9
SHA5126da4d58e48b0383f4343bf0d5dc97ec9bac90d339ddef1314ec3823f640283a5038116e3e3799908bd97c6df2d98083146371d5eac7def13ab0e56d23c568f98
-
Filesize
360KB
MD517c3f17b162c834aabf2ac88d0b13ea2
SHA1674061e6de9d3215ad14cee54e495b9da1fac12b
SHA256f37789060fdf4d0dfe8a974bf84e94f6abbdd0a9b74c9aafffdaf75e6d837251
SHA512637135433f5c127c335337b6d2492ba9591cdea52650b33139cb4949b51097021c09399b7a9ee642b470fb22681902c3bbfd6d5dd1e9e6d8dff22dc5f3c3d677
-
Filesize
168KB
MD54c48cea4499a8c4202e7dc94b86af527
SHA1cc0c85fe044d1976f2bcd90822512c14414c8b52
SHA2563c618c9a35ca3c4320277a24a980c8852b113022bc4b8656ebef256795b128c1
SHA512b27dde7de19d117e0ebcfd20f882c5e030f7c8161fd00a1a7fb4851e08699f1fadd3757aa2160eea74766b68f3ec2aa1aeb2e723b8b4ff0e2ea830784ee00ad4