Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 16:28
Static task
static1
Behavioral task
behavioral1
Sample
04bd3ba368f32aeacfb1a6c4a56552d4ed23f882306ad8c5e9c39195e86e8ea4.exe
Resource
win10v2004-20241007-en
General
-
Target
04bd3ba368f32aeacfb1a6c4a56552d4ed23f882306ad8c5e9c39195e86e8ea4.exe
-
Size
1.5MB
-
MD5
a094181d67db566833f6cf33bddf1f76
-
SHA1
cf3a8a9e12714ec95ab03996b3945fced7cdd7f1
-
SHA256
04bd3ba368f32aeacfb1a6c4a56552d4ed23f882306ad8c5e9c39195e86e8ea4
-
SHA512
c24613425cf3dea218641f717b425a784ff7a5001befdabf87a73bbe9d02216418502bc2622aea8642ba8f8c3f0c53004828018882eb2ab6e547b03c9cb87c91
-
SSDEEP
24576:FyfV+9mwTMYcRZEHZuYeidzlSdVp4NhG0kpqiaB8HeWR1JhTuS9YbRtc5sRK10FX:gd4TMtIuYeid5kVpE1sNHeWRvhCLHcGb
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4044-36-0x0000000002190000-0x00000000021AA000-memory.dmp healer behavioral1/memory/4044-38-0x0000000002730000-0x0000000002748000-memory.dmp healer behavioral1/memory/4044-40-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/4044-66-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/4044-64-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/4044-62-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/4044-60-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/4044-58-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/4044-56-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/4044-54-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/4044-52-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/4044-50-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/4044-48-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/4044-46-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/4044-44-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/4044-43-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/4044-39-0x0000000002730000-0x0000000002742000-memory.dmp healer -
Healer family
-
Processes:
a7846648.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7846648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7846648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7846648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7846648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7846648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7846648.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7410386.exe family_redline behavioral1/memory/4436-73-0x0000000000CC0000-0x0000000000CF0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
Processes:
v9862860.exev7627804.exev4637203.exev0255775.exea7846648.exeb7410386.exepid process 3544 v9862860.exe 3352 v7627804.exe 3692 v4637203.exe 4344 v0255775.exe 4044 a7846648.exe 4436 b7410386.exe -
Processes:
a7846648.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7846648.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7846648.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
04bd3ba368f32aeacfb1a6c4a56552d4ed23f882306ad8c5e9c39195e86e8ea4.exev9862860.exev7627804.exev4637203.exev0255775.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 04bd3ba368f32aeacfb1a6c4a56552d4ed23f882306ad8c5e9c39195e86e8ea4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9862860.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7627804.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4637203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v0255775.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4988 4044 WerFault.exe a7846648.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a7846648.exeb7410386.exe04bd3ba368f32aeacfb1a6c4a56552d4ed23f882306ad8c5e9c39195e86e8ea4.exev9862860.exev7627804.exev4637203.exev0255775.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7846648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7410386.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04bd3ba368f32aeacfb1a6c4a56552d4ed23f882306ad8c5e9c39195e86e8ea4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v9862860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v7627804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4637203.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v0255775.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a7846648.exepid process 4044 a7846648.exe 4044 a7846648.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a7846648.exedescription pid process Token: SeDebugPrivilege 4044 a7846648.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
04bd3ba368f32aeacfb1a6c4a56552d4ed23f882306ad8c5e9c39195e86e8ea4.exev9862860.exev7627804.exev4637203.exev0255775.exedescription pid process target process PID 5108 wrote to memory of 3544 5108 04bd3ba368f32aeacfb1a6c4a56552d4ed23f882306ad8c5e9c39195e86e8ea4.exe v9862860.exe PID 5108 wrote to memory of 3544 5108 04bd3ba368f32aeacfb1a6c4a56552d4ed23f882306ad8c5e9c39195e86e8ea4.exe v9862860.exe PID 5108 wrote to memory of 3544 5108 04bd3ba368f32aeacfb1a6c4a56552d4ed23f882306ad8c5e9c39195e86e8ea4.exe v9862860.exe PID 3544 wrote to memory of 3352 3544 v9862860.exe v7627804.exe PID 3544 wrote to memory of 3352 3544 v9862860.exe v7627804.exe PID 3544 wrote to memory of 3352 3544 v9862860.exe v7627804.exe PID 3352 wrote to memory of 3692 3352 v7627804.exe v4637203.exe PID 3352 wrote to memory of 3692 3352 v7627804.exe v4637203.exe PID 3352 wrote to memory of 3692 3352 v7627804.exe v4637203.exe PID 3692 wrote to memory of 4344 3692 v4637203.exe v0255775.exe PID 3692 wrote to memory of 4344 3692 v4637203.exe v0255775.exe PID 3692 wrote to memory of 4344 3692 v4637203.exe v0255775.exe PID 4344 wrote to memory of 4044 4344 v0255775.exe a7846648.exe PID 4344 wrote to memory of 4044 4344 v0255775.exe a7846648.exe PID 4344 wrote to memory of 4044 4344 v0255775.exe a7846648.exe PID 4344 wrote to memory of 4436 4344 v0255775.exe b7410386.exe PID 4344 wrote to memory of 4436 4344 v0255775.exe b7410386.exe PID 4344 wrote to memory of 4436 4344 v0255775.exe b7410386.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04bd3ba368f32aeacfb1a6c4a56552d4ed23f882306ad8c5e9c39195e86e8ea4.exe"C:\Users\Admin\AppData\Local\Temp\04bd3ba368f32aeacfb1a6c4a56552d4ed23f882306ad8c5e9c39195e86e8ea4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9862860.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9862860.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7627804.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7627804.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4637203.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4637203.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0255775.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0255775.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7846648.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7846648.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 10847⤵
- Program crash
PID:4988
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7410386.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b7410386.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4436
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4044 -ip 40441⤵PID:3828
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD59ed5355f86b51ca543bf6692dd61833d
SHA134db4a656b5875055b72f97f4ab6ffc8e0a3782a
SHA25647ebe470c70de89e33b73e3e90f7eb9d12911eb40c23b46177eca0671ace039a
SHA5129f045d04af931c8fa5062ce2571fc988112e2c56723228d087c62108c18dd84c65abca13ca43e41ff25bedcba7f51eb296a3aa8f54626399b3b470e62ed52c61
-
Filesize
867KB
MD55848f4ebac728b66cde60ed5223db866
SHA1c5fdd203ebc4653cf263663c2fdad382fd2dfdc0
SHA256fd033801068454bc0c1e417867d81823d064ffdecada1631ee9090cdde03d12a
SHA5126588c972a6d67c8bb95293d1ecc435c5867da4bf5248da1347587d1f4bb2b981a7d3b5d036276d8fac36654b46c212243f77f89bda7ccb5c35c72e2bd30e06ca
-
Filesize
664KB
MD5a3fcf9d469482d5bc269143bec2717de
SHA13a530d24a62f8d21041e016a495893fbad24092c
SHA25667979381ff4874b5e5c27335388992357e13e6e524f9e47603daa7c699d11c91
SHA51207d98307111992ff7f88d7718f6edc328d915f94ee9965da6fa476ac92c088a8cd789c43f59e8f136256c1b172d27596e64d46233477981cc8f974f842e8c478
-
Filesize
394KB
MD5441289e99a4f1056da77c39c084757c3
SHA1c2df93909c5547ccab2e61922ba01764b81acf90
SHA256529db7fcc5c092774b4118e31dda3077593d80bd901539a5726ed7d0d1bca3e3
SHA512b3783cad7bb84908eaf9f54f4fe54d0c88c878d979bce3e8ead5c8eac36442e27734a136db69f887dc6a1a6d8b9adbc3f6c26d8e68e59e2276e0a1a2fb2a242e
-
Filesize
315KB
MD5ee4855dd71670656f4986e318fd7910f
SHA1f745fd8ee62709f99ddc255fbab18ac1f4889216
SHA256aba4a5ad6878ac0fa36cbcc397da8a3736177635c975aee2db3742b4fd7530b8
SHA512c9295748de06fe631fb1f4cea314996dc31b969e50b78f876973490d25f6f03c33725d78a00c706e3ed88e5daea4b4a9a2b45dd77c0e43f568419ca908aa8f4e
-
Filesize
168KB
MD59d5fafffde79a9e03f5e263ab49c37a6
SHA171a1557ec39814c8610e9d60d265f281d830fd2b
SHA25646785451f64373c6a7e185d03d851d3a19d27c5f51b034c52ec5b94ca159f807
SHA512857488bd0cd2cf309296da41bec327b7e105d7342b4423f019e577098873e912adac91fbc799ff33824c701a01d527086160261723fabe832e134fcdfc1804fa