Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 19:24
Static task
static1
Behavioral task
behavioral1
Sample
e33cad84827fe586dbbece5a849c1b5a78c939cf40d4ec6654b5924522cdfe3c.exe
Resource
win10v2004-20241007-en
General
-
Target
e33cad84827fe586dbbece5a849c1b5a78c939cf40d4ec6654b5924522cdfe3c.exe
-
Size
479KB
-
MD5
c0dca10acb9b64b1d475253e53c8780b
-
SHA1
4dc95c5a07e56d4993fed4013f5a664de464188b
-
SHA256
e33cad84827fe586dbbece5a849c1b5a78c939cf40d4ec6654b5924522cdfe3c
-
SHA512
57b4b5beefca032003b355fb5d93bb9e67d288804d5f98073f72e21c9c79c74f5c63972d16dc762324867af0b2c5a9d56af1f00b54ffe8fb5a3e341741f0b7c2
-
SSDEEP
12288:JMrQy90U5HeLINJfbkGuqS+Hge3ztwRuLMmaHEgHbCdsu:hyn5Kepk1bCgeCaMNHX7CSu
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2568-15-0x00000000021A0000-0x00000000021BA000-memory.dmp healer behavioral1/memory/2568-19-0x0000000004980000-0x0000000004998000-memory.dmp healer behavioral1/memory/2568-47-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2568-45-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2568-43-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2568-41-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2568-39-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2568-37-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2568-35-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2568-33-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2568-31-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2568-29-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2568-27-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2568-25-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2568-23-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2568-21-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/2568-20-0x0000000004980000-0x0000000004992000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2695725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2695725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2695725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2695725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2695725.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k2695725.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c89-53.dat family_redline behavioral1/memory/4136-55-0x0000000000E20000-0x0000000000E50000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4940 y9380359.exe 2568 k2695725.exe 4136 l7869404.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2695725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2695725.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e33cad84827fe586dbbece5a849c1b5a78c939cf40d4ec6654b5924522cdfe3c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9380359.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e33cad84827fe586dbbece5a849c1b5a78c939cf40d4ec6654b5924522cdfe3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y9380359.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k2695725.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l7869404.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2568 k2695725.exe 2568 k2695725.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2568 k2695725.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4828 wrote to memory of 4940 4828 e33cad84827fe586dbbece5a849c1b5a78c939cf40d4ec6654b5924522cdfe3c.exe 83 PID 4828 wrote to memory of 4940 4828 e33cad84827fe586dbbece5a849c1b5a78c939cf40d4ec6654b5924522cdfe3c.exe 83 PID 4828 wrote to memory of 4940 4828 e33cad84827fe586dbbece5a849c1b5a78c939cf40d4ec6654b5924522cdfe3c.exe 83 PID 4940 wrote to memory of 2568 4940 y9380359.exe 84 PID 4940 wrote to memory of 2568 4940 y9380359.exe 84 PID 4940 wrote to memory of 2568 4940 y9380359.exe 84 PID 4940 wrote to memory of 4136 4940 y9380359.exe 95 PID 4940 wrote to memory of 4136 4940 y9380359.exe 95 PID 4940 wrote to memory of 4136 4940 y9380359.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e33cad84827fe586dbbece5a849c1b5a78c939cf40d4ec6654b5924522cdfe3c.exe"C:\Users\Admin\AppData\Local\Temp\e33cad84827fe586dbbece5a849c1b5a78c939cf40d4ec6654b5924522cdfe3c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9380359.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9380359.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2695725.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2695725.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7869404.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7869404.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4136
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD594e263106ec98d23d40fa01d7d0fe545
SHA170f6d2eb471d5467dabec5eecb9933812fed0dc0
SHA2563df0c383c4460c47cbf81864b672b130e7738f4c467216138561411590f4d573
SHA512e45b8bccab711855171d4fe8e98376f7932b42c2b2a647f79c939fb8a81918da7d2694aecf3e0202d4f64f5d62ea594c277613cebfa94be451cca0e96add49eb
-
Filesize
180KB
MD592d288ba90617d98843a8569bc3fa0f7
SHA1fccba0c07dd758d7fbf0fc6c79080c6395c2b76d
SHA25605d2c2f455a43ac40095f7f5d58fac87698498be35e278a522e3f1d52255b033
SHA5127350e3b12b05df25a9a6fa4a0fc40e6374f2463cb214f1c6087570deda760cc5410f411ff3b03c5451521ec66caa19decb68613b7567edd8ebf04de8a2319701
-
Filesize
168KB
MD50d2931850b3cb732c68a6a33f92814bd
SHA1227ae0781e9687f2b6318fbfe014cc9dda743573
SHA25649c767e216f3b2df112e2819cdfc29e4733cbf37bf35580c7c8903604bebc500
SHA5128078744946bb5b9949b9425fa86d91ca5eee6ce58a38aef6f121449f0f228d96308c13750f7bd91690d95fce7bcc00a33b963e2249c27fbf502eee860f44eda5