Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 18:58
Static task
static1
Behavioral task
behavioral1
Sample
7a1d0bff8e0f8573f24b58a55cf518814424da23e626f9dd55b2485e87604bbb.exe
Resource
win10v2004-20241007-en
General
-
Target
7a1d0bff8e0f8573f24b58a55cf518814424da23e626f9dd55b2485e87604bbb.exe
-
Size
479KB
-
MD5
91380963df88064e909e4b6305a991cc
-
SHA1
9a8bc97f550b58899cd2fea1e410adc46436a804
-
SHA256
7a1d0bff8e0f8573f24b58a55cf518814424da23e626f9dd55b2485e87604bbb
-
SHA512
2ca94f4f79451f1573d5709982e6680ac6d89acf7e6590ead21438caa33201aac5272ec03584ef73bd6090e197d5ea9f577ca7997690d75c7c306621de720958
-
SSDEEP
6144:K7y+bnr+mp0yN90QEV5tUba9G7lKEqvj4TnIro/0krK9Q35awzFq2/4iRB0r6YsK:dMrWy901K0NvjInvnp5awkg02Ysxc
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4216-15-0x00000000025A0000-0x00000000025BA000-memory.dmp healer behavioral1/memory/4216-18-0x0000000004AC0000-0x0000000004AD8000-memory.dmp healer behavioral1/memory/4216-48-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4216-46-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4216-44-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4216-42-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4216-40-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4216-38-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4216-36-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4216-34-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4216-32-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4216-30-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4216-28-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4216-26-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4216-24-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4216-22-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4216-21-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k9192559.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9192559.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9192559.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9192559.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9192559.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9192559.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023ccf-54.dat family_redline behavioral1/memory/2180-56-0x0000000000CC0000-0x0000000000CF0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3516 y0505381.exe 4216 k9192559.exe 2180 l3037737.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k9192559.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k9192559.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7a1d0bff8e0f8573f24b58a55cf518814424da23e626f9dd55b2485e87604bbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0505381.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3736 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a1d0bff8e0f8573f24b58a55cf518814424da23e626f9dd55b2485e87604bbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y0505381.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k9192559.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l3037737.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4216 k9192559.exe 4216 k9192559.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4216 k9192559.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5116 wrote to memory of 3516 5116 7a1d0bff8e0f8573f24b58a55cf518814424da23e626f9dd55b2485e87604bbb.exe 83 PID 5116 wrote to memory of 3516 5116 7a1d0bff8e0f8573f24b58a55cf518814424da23e626f9dd55b2485e87604bbb.exe 83 PID 5116 wrote to memory of 3516 5116 7a1d0bff8e0f8573f24b58a55cf518814424da23e626f9dd55b2485e87604bbb.exe 83 PID 3516 wrote to memory of 4216 3516 y0505381.exe 84 PID 3516 wrote to memory of 4216 3516 y0505381.exe 84 PID 3516 wrote to memory of 4216 3516 y0505381.exe 84 PID 3516 wrote to memory of 2180 3516 y0505381.exe 92 PID 3516 wrote to memory of 2180 3516 y0505381.exe 92 PID 3516 wrote to memory of 2180 3516 y0505381.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a1d0bff8e0f8573f24b58a55cf518814424da23e626f9dd55b2485e87604bbb.exe"C:\Users\Admin\AppData\Local\Temp\7a1d0bff8e0f8573f24b58a55cf518814424da23e626f9dd55b2485e87604bbb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0505381.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0505381.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9192559.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9192559.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3037737.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3037737.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2180
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3736
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD580f910b9865ee2f4e00606e68784e06d
SHA1ed382f32a20840e74e078e68e7485d153394fe35
SHA256a6d62010340dd95ae7c4fcf773dee18e8eea7757524da57af2ac3f22653c3df4
SHA512e33af2937637e9e8f6bcae4d4264f12a436662bcc0440b6582b33ec69cce25d6351905e93d8547be35e24aa55524bb1ac4bcc1d47dce675bbc0462517365f7df
-
Filesize
180KB
MD5671cda79766142b2848ecd50a4e7bff1
SHA11e8c118b8d405110f18285fee238b2ca5aa5695c
SHA2561149340fe31f1903721ae2086579e6b3c34c6dfa764e0fa54c09ed8105b0f4dc
SHA5127d3e4396298c1c1a0afbdf5bdddca4e485ac820fd0c2b377128e18a28e174489ee75b7cd281c376b1ce66738ded0f0608cfd18162401717ba438202871ca8103
-
Filesize
168KB
MD528eff2ca5fb05677038a7090434a06e5
SHA1aa6f122012cb411537bc0e144c5c8ac9afcdac6d
SHA2565aa6f43ab22f485a6eaa6999123c81458cb9d503f11d78a6678a02c5b8a2f77f
SHA512c88ae9e6a3a31d4819594a5531d6a613f88aab8ec0e9be7c25c9fd72ca145a4ef08aea5570aa4b165669c7c9d980bb4a5b8a1ffa4ed6a76a6f682297b2e025a3