Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:47
Static task
static1
Behavioral task
behavioral1
Sample
909d3ed537981f9266817686e7c12946afef17fe8451be2b9bc8fc53ce28d659.exe
Resource
win10v2004-20241007-en
General
-
Target
909d3ed537981f9266817686e7c12946afef17fe8451be2b9bc8fc53ce28d659.exe
-
Size
1.5MB
-
MD5
7ffd2c1647ca5e17db464660f01bbeed
-
SHA1
20419abbdb24e7970e3761a425bccb97172e9d0b
-
SHA256
909d3ed537981f9266817686e7c12946afef17fe8451be2b9bc8fc53ce28d659
-
SHA512
7a760ac53acb304293364a44c8883b73e37dea6754ad6b643f2736736b03f0e9d6d9687ec242892c1ede58aac7222dd8b0be9c7504415fbc56f72f6fdcf4c1ad
-
SSDEEP
24576:ZyTxZuXJPU0gZABtcNvJ4D9BClj3DaJT0D7wIR2Vlo6jfYF:MTx+ByZKSDsbo
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/436-36-0x00000000027F0000-0x000000000280A000-memory.dmp healer behavioral1/memory/436-38-0x0000000002880000-0x0000000002898000-memory.dmp healer behavioral1/memory/436-40-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/436-66-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/436-64-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/436-62-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/436-60-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/436-39-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/436-58-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/436-56-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/436-54-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/436-52-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/436-50-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/436-48-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/436-46-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/436-44-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/436-42-0x0000000002880000-0x0000000002892000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1043271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1043271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1043271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1043271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1043271.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a1043271.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b7b-71.dat family_redline behavioral1/memory/1412-73-0x0000000000080000-0x00000000000B0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 1708 v7702848.exe 4716 v5822742.exe 2208 v2477554.exe 1668 v7574571.exe 436 a1043271.exe 1412 b5834279.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1043271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1043271.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 909d3ed537981f9266817686e7c12946afef17fe8451be2b9bc8fc53ce28d659.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7702848.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5822742.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v2477554.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v7574571.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1868 436 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v7574571.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1043271.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5834279.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 909d3ed537981f9266817686e7c12946afef17fe8451be2b9bc8fc53ce28d659.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v7702848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v5822742.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2477554.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 436 a1043271.exe 436 a1043271.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 436 a1043271.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4492 wrote to memory of 1708 4492 909d3ed537981f9266817686e7c12946afef17fe8451be2b9bc8fc53ce28d659.exe 84 PID 4492 wrote to memory of 1708 4492 909d3ed537981f9266817686e7c12946afef17fe8451be2b9bc8fc53ce28d659.exe 84 PID 4492 wrote to memory of 1708 4492 909d3ed537981f9266817686e7c12946afef17fe8451be2b9bc8fc53ce28d659.exe 84 PID 1708 wrote to memory of 4716 1708 v7702848.exe 86 PID 1708 wrote to memory of 4716 1708 v7702848.exe 86 PID 1708 wrote to memory of 4716 1708 v7702848.exe 86 PID 4716 wrote to memory of 2208 4716 v5822742.exe 88 PID 4716 wrote to memory of 2208 4716 v5822742.exe 88 PID 4716 wrote to memory of 2208 4716 v5822742.exe 88 PID 2208 wrote to memory of 1668 2208 v2477554.exe 89 PID 2208 wrote to memory of 1668 2208 v2477554.exe 89 PID 2208 wrote to memory of 1668 2208 v2477554.exe 89 PID 1668 wrote to memory of 436 1668 v7574571.exe 90 PID 1668 wrote to memory of 436 1668 v7574571.exe 90 PID 1668 wrote to memory of 436 1668 v7574571.exe 90 PID 1668 wrote to memory of 1412 1668 v7574571.exe 98 PID 1668 wrote to memory of 1412 1668 v7574571.exe 98 PID 1668 wrote to memory of 1412 1668 v7574571.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\909d3ed537981f9266817686e7c12946afef17fe8451be2b9bc8fc53ce28d659.exe"C:\Users\Admin\AppData\Local\Temp\909d3ed537981f9266817686e7c12946afef17fe8451be2b9bc8fc53ce28d659.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7702848.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7702848.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5822742.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5822742.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2477554.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2477554.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7574571.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7574571.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1043271.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1043271.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 10807⤵
- Program crash
PID:1868
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5834279.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5834279.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1412
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 436 -ip 4361⤵PID:536
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5dc93639950a5136a15303216df3e9422
SHA1f942242ec224975a1bb3c1f113d30cdc9fe3ff08
SHA256c9cbd6776581193421a08993700768528562e40cb0ac27bdf7a819bfaf0eb372
SHA512326a6e8e820267bf388eb44c51ad1b527c218a4364861dbae5aa94305e465ff6ee7b0cd12ec0538afab48c838b59a6f89b0191a055e77dbeeb8b40630dae1927
-
Filesize
911KB
MD5936f0ea3b18d1b450c86dab234715ac9
SHA151d9840996fe71fb6366c4f982aa4d1e8ab4632d
SHA256dd2049241d7376d6db59552ba4f23b195b5f0f47e4aa276e2c63035d3574fb4d
SHA512ee7363ac856238dae5a8e204d4ffb4bc7bae1db0096f3823e12cef03ebd0fc05d95fb7bf01fd01b3785d7eb4edb7871764d3dadfbe48d49b664b793428c4a284
-
Filesize
707KB
MD591331356b3801a9e2a1176ec19a72c89
SHA10e1e699833e137de4b870d96c77320204d428333
SHA25612edbbaf0874ee05ec52ffe3870c33d127355efe8bbb05000112e9a8bbc54e60
SHA5125f0e571c970fd9ddb09c9496ce8ba7db9e006d51439a2ca73c8afc4832b5c388fd376e253bcd9d55973c3ef8d977eec1f465c8a4b3610895d75df032bd1000ef
-
Filesize
416KB
MD57a15b725346a478062589f35e9065449
SHA145c5599ccc51f5f2001625ffb81b9ef301877547
SHA256ca1d4774765e9845aee4f90fdc5ef657a3149cf5e4b1d567186744e969e376ba
SHA5123e17410269ba08443842eb6ea1c2dd66cca50b137766aefcced2de09424fd4a05dd96e2de720b12257bbdf9ff645835f07d7b2598bdb7f904e48312743dab8d5
-
Filesize
360KB
MD57567b2dcb4ccf91b0cd47a393a9f046a
SHA1eacd738a5f282255faf116e3cc9bc592c780e7df
SHA256446be43177cb0fee97a94dfc78fb871fdf48488832845a0b3fb6ccda9dfd01b6
SHA5122ef86034ec878d66f3746861282104523b166b40f9bf752d9367937f756a53f73802a28570d7fef57abf69e49e8bd8fbbb4c78e3c334308816fd38185e9b6298
-
Filesize
168KB
MD535a38808f7c5ee942631feb48edee4eb
SHA1344db1b1c3dd5320cdd782c18fceddec098086ad
SHA256e3c2e4087a4673f11aadf45894c08ca90133002227e555220db0fd7807b69684
SHA5129faeca0d4b8d6d9c6531f649c9d10261790fa9a706eb4155b5adf91ea6f3310e49d587d860d408d52f50599a3585c240068eb3e7f84546dd963e6984ba5fc263