Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93.exe
Resource
win10v2004-20241007-en
General
-
Target
843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93.exe
-
Size
923KB
-
MD5
72cf1dc37983d701fde1828685e7ba26
-
SHA1
06714b38824dc8744c3964bc1730fc53c64a8604
-
SHA256
843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93
-
SHA512
0e5390f8d81cc050f84ff822756711149ad121262849d9f4542e317c16f535c3f2880f9c71090be3cdfccc8b50410daa2336ce262ffa7628ab951a1184b93a78
-
SSDEEP
24576:0yIwdD1NTAts+HhM0VbTGKIgeh19t1NhKnI5huH:DIwdJNTAZH7Tc19fyo
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb6-19.dat healer behavioral1/memory/5092-22-0x0000000000650000-0x000000000065A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it519881.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it519881.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it519881.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it519881.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it519881.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it519881.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4716-28-0x0000000004D50000-0x0000000004D8C000-memory.dmp family_redline behavioral1/memory/4716-30-0x0000000004E10000-0x0000000004E4A000-memory.dmp family_redline behavioral1/memory/4716-38-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-42-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-40-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-84-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-68-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-50-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-36-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-34-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-32-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-31-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-94-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-92-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-90-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-88-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-86-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-82-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-80-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-78-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-76-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-74-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-72-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-70-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-66-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-64-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-62-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-60-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-58-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-56-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-54-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-52-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-48-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-46-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/4716-44-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 3596 ziig5419.exe 2252 zitl4482.exe 5092 it519881.exe 4716 jr863012.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it519881.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziig5419.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zitl4482.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziig5419.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zitl4482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr863012.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5092 it519881.exe 5092 it519881.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5092 it519881.exe Token: SeDebugPrivilege 4716 jr863012.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2396 wrote to memory of 3596 2396 843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93.exe 83 PID 2396 wrote to memory of 3596 2396 843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93.exe 83 PID 2396 wrote to memory of 3596 2396 843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93.exe 83 PID 3596 wrote to memory of 2252 3596 ziig5419.exe 84 PID 3596 wrote to memory of 2252 3596 ziig5419.exe 84 PID 3596 wrote to memory of 2252 3596 ziig5419.exe 84 PID 2252 wrote to memory of 5092 2252 zitl4482.exe 85 PID 2252 wrote to memory of 5092 2252 zitl4482.exe 85 PID 2252 wrote to memory of 4716 2252 zitl4482.exe 98 PID 2252 wrote to memory of 4716 2252 zitl4482.exe 98 PID 2252 wrote to memory of 4716 2252 zitl4482.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93.exe"C:\Users\Admin\AppData\Local\Temp\843eea09532a09aadb7b58e5a408e953cd485b40b9af25924f32a339276d2b93.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziig5419.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziig5419.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zitl4482.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zitl4482.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it519881.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it519881.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr863012.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr863012.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
617KB
MD5c7141a516bc91b6a182b1473e8d3fc29
SHA19a93ccc77002676902407c78cc47a09c02d1bfc9
SHA2563e5719eb8490292f8a957c729831080f7bfda843eec21c3c31c3a8d9ab93ede6
SHA512e696b9cf8f7631d3687a61e785242abc17abdc46584fe39e786f51ee1bc6e3b60067a7c3e32eea7f88eeb4a6ac35fd36170c5936d8bef1e14d898d464c1e18ea
-
Filesize
462KB
MD56561e337526c27a78c3440bb948fd389
SHA13958680e4eb820b5284c7eb83a4ad867a8333f41
SHA25647f2eeb26e1c63f078b9c05831347cd58f82926506ca06def5de63f9884a18c9
SHA51259d1c1f563a51340aa2dd9f2ec103d4de298eb85418ea95881e556057c3ced465d0ddc098e32d2f888ebfc013295ccea629b88c043dede0dd1f93e8e6e58f783
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
474KB
MD5cec4fc0d63c0d41c2e86e69c04c4294d
SHA1940e195e54ee85b2baa9c93eade7b624e2b25309
SHA2563243a50fd31162f60547e6a146ef4da84f2bcd2236671bfa7a6ee5ba78e5fbff
SHA512de4bc976e24d636a60da117e06e076e8d648e8a1249df66fa3fc1ed399c4d4232a4d2ea91a272402bc45c1b7fb0a2071257be089ede3eff3943f36867a692cd0