Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 19:12
Static task
static1
Behavioral task
behavioral1
Sample
e0d3e064c8f4b04099122fd0a9ffc28faa0f14e3dddb34218ca23b91ed6822ad.exe
Resource
win10v2004-20241007-en
General
-
Target
e0d3e064c8f4b04099122fd0a9ffc28faa0f14e3dddb34218ca23b91ed6822ad.exe
-
Size
1.5MB
-
MD5
d40a3aafb18fe80c8c29d06b9d545266
-
SHA1
1b162746968fb0bed46afc1fb7afa47804a40168
-
SHA256
e0d3e064c8f4b04099122fd0a9ffc28faa0f14e3dddb34218ca23b91ed6822ad
-
SHA512
789e4d6ee222e9edcf824ba6a73f26d057ff14cc1b04048971f30832578d5401355ffb3691afc2cd5bcf2f73360228d43cc64bb3829cc15efe82b74a4e00a54a
-
SSDEEP
49152:pRgaj4785Ys6ejUjCiXP0hAWc9MWQ33DglShin:kBBsVYjjX9Mj3zth
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2792-36-0x00000000027A0000-0x00000000027BA000-memory.dmp healer behavioral1/memory/2792-38-0x0000000002830000-0x0000000002848000-memory.dmp healer behavioral1/memory/2792-56-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2792-66-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2792-64-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2792-62-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2792-60-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2792-58-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2792-54-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2792-52-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2792-51-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2792-46-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2792-45-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2792-40-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2792-39-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2792-48-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2792-42-0x0000000002830000-0x0000000002842000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7760042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7760042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7760042.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7760042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7760042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7760042.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023ba0-71.dat family_redline behavioral1/memory/4848-73-0x0000000000140000-0x0000000000170000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 4680 v7611525.exe 1636 v4543044.exe 408 v5970735.exe 4140 v4346655.exe 2792 a7760042.exe 4848 b4215231.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7760042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7760042.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e0d3e064c8f4b04099122fd0a9ffc28faa0f14e3dddb34218ca23b91ed6822ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7611525.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4543044.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5970735.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v4346655.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4496 2792 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4346655.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7760042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4215231.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0d3e064c8f4b04099122fd0a9ffc28faa0f14e3dddb34218ca23b91ed6822ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v7611525.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4543044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v5970735.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2792 a7760042.exe 2792 a7760042.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2792 a7760042.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3412 wrote to memory of 4680 3412 e0d3e064c8f4b04099122fd0a9ffc28faa0f14e3dddb34218ca23b91ed6822ad.exe 85 PID 3412 wrote to memory of 4680 3412 e0d3e064c8f4b04099122fd0a9ffc28faa0f14e3dddb34218ca23b91ed6822ad.exe 85 PID 3412 wrote to memory of 4680 3412 e0d3e064c8f4b04099122fd0a9ffc28faa0f14e3dddb34218ca23b91ed6822ad.exe 85 PID 4680 wrote to memory of 1636 4680 v7611525.exe 86 PID 4680 wrote to memory of 1636 4680 v7611525.exe 86 PID 4680 wrote to memory of 1636 4680 v7611525.exe 86 PID 1636 wrote to memory of 408 1636 v4543044.exe 88 PID 1636 wrote to memory of 408 1636 v4543044.exe 88 PID 1636 wrote to memory of 408 1636 v4543044.exe 88 PID 408 wrote to memory of 4140 408 v5970735.exe 89 PID 408 wrote to memory of 4140 408 v5970735.exe 89 PID 408 wrote to memory of 4140 408 v5970735.exe 89 PID 4140 wrote to memory of 2792 4140 v4346655.exe 90 PID 4140 wrote to memory of 2792 4140 v4346655.exe 90 PID 4140 wrote to memory of 2792 4140 v4346655.exe 90 PID 4140 wrote to memory of 4848 4140 v4346655.exe 103 PID 4140 wrote to memory of 4848 4140 v4346655.exe 103 PID 4140 wrote to memory of 4848 4140 v4346655.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0d3e064c8f4b04099122fd0a9ffc28faa0f14e3dddb34218ca23b91ed6822ad.exe"C:\Users\Admin\AppData\Local\Temp\e0d3e064c8f4b04099122fd0a9ffc28faa0f14e3dddb34218ca23b91ed6822ad.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7611525.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7611525.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4543044.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4543044.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5970735.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5970735.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4346655.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4346655.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7760042.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7760042.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 10847⤵
- Program crash
PID:4496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4215231.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4215231.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4848
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2792 -ip 27921⤵PID:744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5b1633ef37e5ea5bd180b67a02a809f3b
SHA1deecfaa5761145c97bcba609a9d4a0ec93fe4d17
SHA2562aa044f99bf15012dca05f880b9f19db57c8385c17e6a4f109066877da34af64
SHA5126f98234603ce46d4a46c75c4df37e06af536f460c5df8b30f957dff490857e0a0b79cdd803b19ed8d917f2677cafdcedabbed56b89df73f565b48314451edb58
-
Filesize
911KB
MD517abaad802d8b43c57ccddc75e6ee3a6
SHA19cf3043c8268b81bfb35406fae5119ac84ab3e22
SHA2568abd246677ec293d092b80448c271c81c2dc695d7adb4f053d0e994ed4fee7a0
SHA5124687483ffc52b808ccc5f1efc023f46ea5735433c55756ba6d8bd046a990f30c5c3de80d949b71841d4aa1cb8484091975cceaf6d144786b8fc5b330c372f4bb
-
Filesize
706KB
MD5f78e2b2bc6ad1162524d3060c2f94de6
SHA1d4864d8b6acfd9f1facff72e9f16042d104cbf79
SHA2561023d6992ddd373d1007e1af2f146c5cf62e039fec40762e3c54f37ff61d535d
SHA512c5e12c8ff202564d599924e87a3d0cb47c5d8d8df50cd4dc28019d1549a2e6b74a76a36bf5fbaee892e6bd983237413b4ba0adcc8ffc1ac90ca7f25c6f9ba50f
-
Filesize
415KB
MD58b5843cb645b46fe990408b63fd91ec7
SHA113b551bd77d2f8cd3d30e9c07d98b6d9bbbd598a
SHA2564b74cf022730871334f06ede09ef0b6e302477fc076fecdb92747c45cc176be7
SHA512a828d201f7cf2bb307927e7c1de120b1b0448e10fa4e5a5fafa34a69b0608d805d82aa13ab3ad91fa65386568bf7eefd7b129c7f30af1bd6de3efdacfe0608b0
-
Filesize
360KB
MD56d6c071838693f3993af4d5c43a3350e
SHA10fca2b360c2446731ef6d1d1fe948d5c944268f6
SHA25620650e210bdfa40bf9f3e6b1c07b35a7e2b6cd040622d2be7be6018cb40f6f98
SHA51278023bb791c26c76f20eab97b0d1ecc2164a4b678fc7f0d8525388fa8dfcabb12c676322a509fdcbe41647cc3027fa3a384431a17406f62f1c4b5c0701825e42
-
Filesize
168KB
MD5b677bc96c90185272bf35347ccbcc23e
SHA115f97e777dafe1109f882f2d91f91281f63b2e86
SHA25640a35fb56eb52a5ae23a04a516fefc06cdc063be63bf2ce76b6ace5e42b2fe6a
SHA512c46327888323d9ff8b84d8f1b5032f0a2e801634b4be2de57c468cf213a194ddfd9257a6a749c3670f511dee0efa1b0e5294c99576eaebe40628826adba9b615