Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
e7bdcb175ffbc260a4ba845b1790fdfc813da9114df9e7a0be125b5b76ab7d3b.exe
Resource
win10v2004-20241007-en
General
-
Target
e7bdcb175ffbc260a4ba845b1790fdfc813da9114df9e7a0be125b5b76ab7d3b.exe
-
Size
1.5MB
-
MD5
7d28bb24f5ed66aa5107d78a628e5c32
-
SHA1
d911365981f74628ba0e91924e110b0607f8a4a9
-
SHA256
e7bdcb175ffbc260a4ba845b1790fdfc813da9114df9e7a0be125b5b76ab7d3b
-
SHA512
a459a3e78e2bd37b6348b6edfcf8e3db7a8cf650f58d839cceada6594a56ac2a8f54839d5793ef8f28002f4a82eb71b58d29b950742d5396a0d70fa57886e19c
-
SSDEEP
24576:DyNTcCSyxjHCCxv1PpOhHy2TK3WOI2vIvDfVHTyHjZAbDPz8O3wdLL4+QY8:WNgr0pey2TYC2vIxuHgDwO3wOY
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4844-36-0x0000000002740000-0x000000000275A000-memory.dmp healer behavioral1/memory/4844-38-0x00000000053B0000-0x00000000053C8000-memory.dmp healer behavioral1/memory/4844-66-0x00000000053B0000-0x00000000053C2000-memory.dmp healer behavioral1/memory/4844-64-0x00000000053B0000-0x00000000053C2000-memory.dmp healer behavioral1/memory/4844-62-0x00000000053B0000-0x00000000053C2000-memory.dmp healer behavioral1/memory/4844-60-0x00000000053B0000-0x00000000053C2000-memory.dmp healer behavioral1/memory/4844-58-0x00000000053B0000-0x00000000053C2000-memory.dmp healer behavioral1/memory/4844-56-0x00000000053B0000-0x00000000053C2000-memory.dmp healer behavioral1/memory/4844-54-0x00000000053B0000-0x00000000053C2000-memory.dmp healer behavioral1/memory/4844-52-0x00000000053B0000-0x00000000053C2000-memory.dmp healer behavioral1/memory/4844-50-0x00000000053B0000-0x00000000053C2000-memory.dmp healer behavioral1/memory/4844-48-0x00000000053B0000-0x00000000053C2000-memory.dmp healer behavioral1/memory/4844-46-0x00000000053B0000-0x00000000053C2000-memory.dmp healer behavioral1/memory/4844-44-0x00000000053B0000-0x00000000053C2000-memory.dmp healer behavioral1/memory/4844-42-0x00000000053B0000-0x00000000053C2000-memory.dmp healer behavioral1/memory/4844-40-0x00000000053B0000-0x00000000053C2000-memory.dmp healer behavioral1/memory/4844-39-0x00000000053B0000-0x00000000053C2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1884509.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a1884509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1884509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1884509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1884509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1884509.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023ba3-71.dat family_redline behavioral1/memory/1980-73-0x0000000000DC0000-0x0000000000DF0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 1624 v4807341.exe 2996 v3491829.exe 5064 v8701139.exe 5016 v2832128.exe 4844 a1884509.exe 1980 b4254184.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1884509.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1884509.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3491829.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8701139.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v2832128.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e7bdcb175ffbc260a4ba845b1790fdfc813da9114df9e7a0be125b5b76ab7d3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4807341.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1544 4844 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3491829.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8701139.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2832128.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1884509.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4254184.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7bdcb175ffbc260a4ba845b1790fdfc813da9114df9e7a0be125b5b76ab7d3b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4807341.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4844 a1884509.exe 4844 a1884509.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4844 a1884509.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1624 1168 e7bdcb175ffbc260a4ba845b1790fdfc813da9114df9e7a0be125b5b76ab7d3b.exe 84 PID 1168 wrote to memory of 1624 1168 e7bdcb175ffbc260a4ba845b1790fdfc813da9114df9e7a0be125b5b76ab7d3b.exe 84 PID 1168 wrote to memory of 1624 1168 e7bdcb175ffbc260a4ba845b1790fdfc813da9114df9e7a0be125b5b76ab7d3b.exe 84 PID 1624 wrote to memory of 2996 1624 v4807341.exe 86 PID 1624 wrote to memory of 2996 1624 v4807341.exe 86 PID 1624 wrote to memory of 2996 1624 v4807341.exe 86 PID 2996 wrote to memory of 5064 2996 v3491829.exe 87 PID 2996 wrote to memory of 5064 2996 v3491829.exe 87 PID 2996 wrote to memory of 5064 2996 v3491829.exe 87 PID 5064 wrote to memory of 5016 5064 v8701139.exe 89 PID 5064 wrote to memory of 5016 5064 v8701139.exe 89 PID 5064 wrote to memory of 5016 5064 v8701139.exe 89 PID 5016 wrote to memory of 4844 5016 v2832128.exe 90 PID 5016 wrote to memory of 4844 5016 v2832128.exe 90 PID 5016 wrote to memory of 4844 5016 v2832128.exe 90 PID 5016 wrote to memory of 1980 5016 v2832128.exe 102 PID 5016 wrote to memory of 1980 5016 v2832128.exe 102 PID 5016 wrote to memory of 1980 5016 v2832128.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7bdcb175ffbc260a4ba845b1790fdfc813da9114df9e7a0be125b5b76ab7d3b.exe"C:\Users\Admin\AppData\Local\Temp\e7bdcb175ffbc260a4ba845b1790fdfc813da9114df9e7a0be125b5b76ab7d3b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4807341.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4807341.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3491829.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3491829.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8701139.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8701139.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2832128.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2832128.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1884509.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1884509.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 10807⤵
- Program crash
PID:1544
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4254184.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4254184.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1980
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4844 -ip 48441⤵PID:1348
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5d94d139cd72192aff26778b05ed60915
SHA17ae3dd48ccc42cdec8782b30903603ce30d98811
SHA256564765c9ade645064488f83c3f103053ddb91a2fe1edef1feb10b16281224504
SHA512857b54a5b62cbd868d0af25cf1d0349a0b58e5e0e67f4195383d2cdf32b92af163045e6966e4df33ba14c7609514d59f260d21f80ab462b87808cd15fcbf9295
-
Filesize
915KB
MD58568764d9aff1a1b7ee0d71e718032f3
SHA12ae3f7bccf64326101854beb220e2095a53d9449
SHA25663b1ad751f3feeae91727d01b3d8617aa6a8f50f594121133402ca32c2a2531a
SHA5129528acd28221c2b614722193956eb5a1fdc17f4efb98185a4e4440f00b72034bcb2b0f1226cfab8169825e8fbd12086e971f03f6187a7e0521773214d2a2bc89
-
Filesize
711KB
MD579f47a015f10e3e0a5b7b549fd798fd9
SHA1bea36fb96a93ae7db95a80a21f3826cf597ef3a8
SHA2567970f8c4118314fe7daced7ed9a4b0916ea3a2accd91e30969314f2a55854a7d
SHA51253522a4cb688d692b7e73617a6318856acbb08afd21f560641724ad7f0d0515ac756fba11bf1bc7850f02023148bb57e75e10155193ea18123bd277a2ee2bacc
-
Filesize
416KB
MD5090a5c3e442ae9a6cac0f4e6008efd67
SHA12761105eaee5e25680aeb49eeb5072ce24ab3c98
SHA256c90f487b61b6a956c967ab3a5c3c6f177088d4de76bd9781f99ec6b490835830
SHA5127e02267722da8a7c56c77c62650beae9837bd82debdf61437fccd4f5def911dd89ba3a3a7739911758372485c3a61f9c5f6e88ee1d32f7b74f294b6e9848f5c5
-
Filesize
360KB
MD5ebbe7de53b1332e39680cb9938a11913
SHA18ce26e10b93d3abf691357a6ff7e47d61997d1a6
SHA25658156223c8c997347b54677c67f2732f702b559b182b660c430f2b59f48a2d5e
SHA51263328c2a5b486d54ead37bbc1d5b80966d8ee2ba2630a9bd10de62824b1410cee2ce9478812d052d3682d3d9111c0f90def9e503bd19c7f4d3448ff375c5694c
-
Filesize
168KB
MD503bfeebd34d2fbf0b08b849ffc8e6720
SHA1ef69f91fc137b437c9d5e5a14d9f898e32d68d26
SHA256baad7c7d4078c3bf8347f843bb8d8ceadb0c20a2d8baa595da61a1a8e947da90
SHA5127c362588de9968ac83eed401035af75097c35e02abf6cbec11c3dc9a1ed75efd7a1b5bbe1b9e179938207d940dfdf1035593131dfbe16f8da3e1e27c7c83f278