Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 19:37
Static task
static1
Behavioral task
behavioral1
Sample
096cd20a79fd6187c0e8277c5224d9dcf9bfa1221565537c3f3ed15626c4d9be.exe
Resource
win10v2004-20241007-en
General
-
Target
096cd20a79fd6187c0e8277c5224d9dcf9bfa1221565537c3f3ed15626c4d9be.exe
-
Size
1.5MB
-
MD5
50b40208ee78684c1a1a5605bd1429c3
-
SHA1
ea73f46c4db4ebd3c61876ea3fc4958e1bc48056
-
SHA256
096cd20a79fd6187c0e8277c5224d9dcf9bfa1221565537c3f3ed15626c4d9be
-
SHA512
1c77b0e523c3f279a59af4d65d1af66f9d7075c60c8e244a3238453427dd887dc376b3ac37d7ac67e1cbc02df6258f43ebb298ca59739bd9dee8f814bcd977f0
-
SSDEEP
24576:YyVIYQAVOwJ5jbuo59OFqibV5PjFjbqgu/tJL81gxlbTtclvjLV4GBsZerq:fVVQA0G5Co5IFTV5Pj1atJGYlc5qG+Zq
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 18 IoCs
resource yara_rule behavioral1/memory/3184-36-0x0000000002010000-0x000000000202A000-memory.dmp healer behavioral1/memory/3184-38-0x00000000024C0000-0x00000000024D8000-memory.dmp healer behavioral1/memory/3184-64-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-66-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-65-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-62-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-60-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-58-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-56-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-54-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-52-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-50-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-48-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-46-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-44-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-42-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-39-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/3184-40-0x00000000024C0000-0x00000000024D2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2069297.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a2069297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2069297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2069297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2069297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2069297.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cb1-71.dat family_redline behavioral1/memory/4884-73-0x0000000000A00000-0x0000000000A30000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 3836 v4843889.exe 2036 v9137863.exe 2380 v1734353.exe 2144 v3433007.exe 3184 a2069297.exe 4884 b2411439.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2069297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2069297.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9137863.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v1734353.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v3433007.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 096cd20a79fd6187c0e8277c5224d9dcf9bfa1221565537c3f3ed15626c4d9be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4843889.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3912 3184 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v1734353.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3433007.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2069297.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2411439.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 096cd20a79fd6187c0e8277c5224d9dcf9bfa1221565537c3f3ed15626c4d9be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4843889.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v9137863.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3184 a2069297.exe 3184 a2069297.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3184 a2069297.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3600 wrote to memory of 3836 3600 096cd20a79fd6187c0e8277c5224d9dcf9bfa1221565537c3f3ed15626c4d9be.exe 83 PID 3600 wrote to memory of 3836 3600 096cd20a79fd6187c0e8277c5224d9dcf9bfa1221565537c3f3ed15626c4d9be.exe 83 PID 3600 wrote to memory of 3836 3600 096cd20a79fd6187c0e8277c5224d9dcf9bfa1221565537c3f3ed15626c4d9be.exe 83 PID 3836 wrote to memory of 2036 3836 v4843889.exe 84 PID 3836 wrote to memory of 2036 3836 v4843889.exe 84 PID 3836 wrote to memory of 2036 3836 v4843889.exe 84 PID 2036 wrote to memory of 2380 2036 v9137863.exe 86 PID 2036 wrote to memory of 2380 2036 v9137863.exe 86 PID 2036 wrote to memory of 2380 2036 v9137863.exe 86 PID 2380 wrote to memory of 2144 2380 v1734353.exe 88 PID 2380 wrote to memory of 2144 2380 v1734353.exe 88 PID 2380 wrote to memory of 2144 2380 v1734353.exe 88 PID 2144 wrote to memory of 3184 2144 v3433007.exe 89 PID 2144 wrote to memory of 3184 2144 v3433007.exe 89 PID 2144 wrote to memory of 3184 2144 v3433007.exe 89 PID 2144 wrote to memory of 4884 2144 v3433007.exe 100 PID 2144 wrote to memory of 4884 2144 v3433007.exe 100 PID 2144 wrote to memory of 4884 2144 v3433007.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\096cd20a79fd6187c0e8277c5224d9dcf9bfa1221565537c3f3ed15626c4d9be.exe"C:\Users\Admin\AppData\Local\Temp\096cd20a79fd6187c0e8277c5224d9dcf9bfa1221565537c3f3ed15626c4d9be.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4843889.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4843889.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9137863.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9137863.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1734353.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1734353.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3433007.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3433007.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2069297.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2069297.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 10807⤵
- Program crash
PID:3912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2411439.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2411439.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4884
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3184 -ip 31841⤵PID:3208
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD52bf50b4c527b18cb3a9de997074ba214
SHA1e4141342aab689431ef150ce897e608eb538ee7c
SHA256d7e767f0901321522dacbc9bcc9b528947ac51cff8dcfb29a91a7384950fd40c
SHA51274462be7c68470c9fca151b834a4cb3205d1e30b227b61ddb34bfea71be74328a8519ce5e52f51078adb2ea581adcbff02bc7e0e1892fc7fa1808ee11ba2c679
-
Filesize
867KB
MD595e9e79734653ede7086999a123cc40a
SHA17079e13c2255c864a06996f1b02a5af9d32128b5
SHA2566c25cdba5ffcca79d43542f3049beb6606411541436c04f178d3d05f43c9ff43
SHA5121683f2ba7db9763a98faa575ec482b0316d59eaac0758fe2395d46dc576407847abd0d40c72b517bcdf6d1eb0920e033c443bb528c1a75f53c2eba31b10efa9c
-
Filesize
664KB
MD50c72012162481240430c9fc703026909
SHA1062b9bf0283a2638c0ad190ff7319050ccae8523
SHA25602f3e1fe030458681b2df049d06dc39906eff66dcfc6dd4bca16067610e5f0a1
SHA5124daac9badae381a5bbfcdd6c1b356c0330e77a350804db37418b0937bb440cb4b07af5d8015a5f6e4ee992e45f217fbb1965dafc7111cdaf2d6957b0acdc8e5c
-
Filesize
394KB
MD556a518fe3f95ed3af5a6b89b0af7fa03
SHA1eba05dad3db74b08a64c25a604c779991ecfe4fd
SHA25649a2ec9c1ee1a8b025897ce34332e5ea8b71016e55cd22b750a19e776fa9985b
SHA512d31feb073cbc55623cee5136b8b6d11c65f58fb5e5f968f61d6ddd94fc5c91f058b543fa1750d3947a5ebc133f6d35addb548adb616955207f501b98f726ae42
-
Filesize
315KB
MD556a5e06aab1e13dd60b882c3f2c5ffdb
SHA1f592edea6ff179cdb06b7dcab6d09cb1855249e5
SHA25635f9debaaffd04dac144ae12cf47577474a9c69db485dd4ad6d1d44ce77b0d5d
SHA512bb55197c77318648ee9e174b9e15461725782b83c4ea8b85841ca08f909f0fad6ee4f4bfa45818f2e17291d745314d71ce13a83a4fac49e5ba37c4fd98cde8a5
-
Filesize
168KB
MD507607d5e2f0cdedf92dc4283d23b60ce
SHA17eeeac54c3d4d15e118a4a9711bcb5379e082d0b
SHA256dc99b28a5d7bc3c73a9eba0d491bf13471623c27011a9ba099e719f9ab11b80f
SHA5127fc8f09642aebe225a3f038e36e5241f1ae8f0218f7e6ac115b53775efa2ab192ed277d49317841ba8610377de38cf805feb403c06dec8e1e4a30281b57861be