Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
86ffee32e12f77dc39823f90864230c1d1489dcffedb2838885a99bd4d34c6cf.exe
Resource
win10v2004-20241007-en
General
-
Target
86ffee32e12f77dc39823f90864230c1d1489dcffedb2838885a99bd4d34c6cf.exe
-
Size
478KB
-
MD5
383c9bfd3d5e3ea2c55a3880194400e7
-
SHA1
057ff8447f466b78f7230e555d97299846b01efc
-
SHA256
86ffee32e12f77dc39823f90864230c1d1489dcffedb2838885a99bd4d34c6cf
-
SHA512
6e5bd69cd7cb6fa8780e0ade4e5155c7b960cae53d053013e4dd8ad7de8967a310a2f7e28c4346adb698691654573dfbc63345c417cd0209ac5e549be971f760
-
SSDEEP
12288:OMr+y90/uSkZIGJsX+QrQO9ve9AsgkcoAeEyic1:8yudkpS1cLrJQc1
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4472-15-0x0000000002230000-0x000000000224A000-memory.dmp healer behavioral1/memory/4472-18-0x0000000002410000-0x0000000002428000-memory.dmp healer behavioral1/memory/4472-48-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/4472-46-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/4472-44-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/4472-42-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/4472-40-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/4472-38-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/4472-36-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/4472-34-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/4472-32-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/4472-30-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/4472-28-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/4472-26-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/4472-24-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/4472-22-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/4472-21-0x0000000002410000-0x0000000002422000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2946555.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k2946555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2946555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2946555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2946555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2946555.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c8f-54.dat family_redline behavioral1/memory/4584-56-0x00000000007C0000-0x00000000007F0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3536 y0737340.exe 4472 k2946555.exe 4584 l2430669.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2946555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2946555.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 86ffee32e12f77dc39823f90864230c1d1489dcffedb2838885a99bd4d34c6cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0737340.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86ffee32e12f77dc39823f90864230c1d1489dcffedb2838885a99bd4d34c6cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y0737340.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k2946555.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l2430669.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4472 k2946555.exe 4472 k2946555.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4472 k2946555.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4220 wrote to memory of 3536 4220 86ffee32e12f77dc39823f90864230c1d1489dcffedb2838885a99bd4d34c6cf.exe 83 PID 4220 wrote to memory of 3536 4220 86ffee32e12f77dc39823f90864230c1d1489dcffedb2838885a99bd4d34c6cf.exe 83 PID 4220 wrote to memory of 3536 4220 86ffee32e12f77dc39823f90864230c1d1489dcffedb2838885a99bd4d34c6cf.exe 83 PID 3536 wrote to memory of 4472 3536 y0737340.exe 84 PID 3536 wrote to memory of 4472 3536 y0737340.exe 84 PID 3536 wrote to memory of 4472 3536 y0737340.exe 84 PID 3536 wrote to memory of 4584 3536 y0737340.exe 99 PID 3536 wrote to memory of 4584 3536 y0737340.exe 99 PID 3536 wrote to memory of 4584 3536 y0737340.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\86ffee32e12f77dc39823f90864230c1d1489dcffedb2838885a99bd4d34c6cf.exe"C:\Users\Admin\AppData\Local\Temp\86ffee32e12f77dc39823f90864230c1d1489dcffedb2838885a99bd4d34c6cf.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0737340.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0737340.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2946555.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2946555.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2430669.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2430669.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4584
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD55e5febdf3a00761bd393133a20e3f502
SHA1fa164c6a2c887c3da107ca95959619b4ef8e2194
SHA2561f5d62836893b8721f1e60ba32dec3e071d6931a25926c0c0931244e9888e39b
SHA512c464fc604b2c1e6303a4c2cbe6ba791c753dfd1f5762f5555aab707a560a6e3e38764263cf92a717fa718627e2190839f39b9dc7e6dac992b3e9e29799b3942f
-
Filesize
180KB
MD5c75e86ecf09068e65e7f2c039323b94c
SHA18edd1641722d26da52372a25deec88c01491ce9b
SHA2560fb37fb207dd2d0eef14a0e6df28987187c77ce5e3e59fcf9bef5fee1c7f3c6b
SHA512b35ef05f8bbaae04d23d657377297231313e1fb1bdf938a62bec92f71c1cc81d90f6090aa104e6eeebb0e0e9f86e061477bbf6b62d1d793e75055d1f8ba492d4
-
Filesize
168KB
MD5fae6eceef11d48e4e7de0827fbf014d3
SHA1b468eda26f3f04c9004d55c02eb4c78a9f86bfef
SHA2567a04c8d0126aef6bc25a517b7c3bbbf146d6356a5b8b88d6792ba377033b504c
SHA512b35c963650dbc1de9a7f595142da878af4e96af02908526e35776b1e272c05fd2b7fdb836ec0626aa53f016ea0c01680e5b40a0d007432b7b279854a703299aa