Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
224bf64173af479725343817ef989c6e68d31ce9b47a1facdf47a77c3e8ab205.exe
Resource
win10v2004-20241007-en
General
-
Target
224bf64173af479725343817ef989c6e68d31ce9b47a1facdf47a77c3e8ab205.exe
-
Size
936KB
-
MD5
12b4da69f02e581834eb2e4eff4f77f0
-
SHA1
2896d7431de844c2c09bf2e8dd9ac91ba4b86d3c
-
SHA256
224bf64173af479725343817ef989c6e68d31ce9b47a1facdf47a77c3e8ab205
-
SHA512
233631f891f0c2ed87213eda4a41cdcc736df95cef066b2cd03a15ec83c89e33422a273e89183d462ef17e8a121a450b13d2c1873177fc571aeedb94d9d9bb5e
-
SSDEEP
24576:WyWSgKhaPxtiwUIyl/GQ1LU9dQiLljMzVa:lWpUapt1yl/YdQqli
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb1-19.dat healer behavioral1/memory/2040-22-0x0000000000FA0000-0x0000000000FAA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it576591.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it576591.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it576591.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it576591.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it576591.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it576591.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1464-29-0x0000000002920000-0x000000000295C000-memory.dmp family_redline behavioral1/memory/1464-31-0x0000000002AF0000-0x0000000002B2A000-memory.dmp family_redline behavioral1/memory/1464-41-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-55-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-95-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-93-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-91-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-87-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-85-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-83-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-81-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-77-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-75-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-73-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-71-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-69-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-65-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-63-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-61-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-59-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-57-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-53-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-51-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-49-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-47-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-45-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-43-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-89-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-79-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-67-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-39-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-37-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-35-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-33-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline behavioral1/memory/1464-32-0x0000000002AF0000-0x0000000002B25000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 1668 zibj8258.exe 2208 zite8117.exe 2040 it576591.exe 1464 jr590391.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it576591.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zite8117.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 224bf64173af479725343817ef989c6e68d31ce9b47a1facdf47a77c3e8ab205.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zibj8258.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 224bf64173af479725343817ef989c6e68d31ce9b47a1facdf47a77c3e8ab205.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zibj8258.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zite8117.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr590391.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2040 it576591.exe 2040 it576591.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2040 it576591.exe Token: SeDebugPrivilege 1464 jr590391.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4564 wrote to memory of 1668 4564 224bf64173af479725343817ef989c6e68d31ce9b47a1facdf47a77c3e8ab205.exe 83 PID 4564 wrote to memory of 1668 4564 224bf64173af479725343817ef989c6e68d31ce9b47a1facdf47a77c3e8ab205.exe 83 PID 4564 wrote to memory of 1668 4564 224bf64173af479725343817ef989c6e68d31ce9b47a1facdf47a77c3e8ab205.exe 83 PID 1668 wrote to memory of 2208 1668 zibj8258.exe 84 PID 1668 wrote to memory of 2208 1668 zibj8258.exe 84 PID 1668 wrote to memory of 2208 1668 zibj8258.exe 84 PID 2208 wrote to memory of 2040 2208 zite8117.exe 85 PID 2208 wrote to memory of 2040 2208 zite8117.exe 85 PID 2208 wrote to memory of 1464 2208 zite8117.exe 97 PID 2208 wrote to memory of 1464 2208 zite8117.exe 97 PID 2208 wrote to memory of 1464 2208 zite8117.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\224bf64173af479725343817ef989c6e68d31ce9b47a1facdf47a77c3e8ab205.exe"C:\Users\Admin\AppData\Local\Temp\224bf64173af479725343817ef989c6e68d31ce9b47a1facdf47a77c3e8ab205.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibj8258.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibj8258.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zite8117.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zite8117.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it576591.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it576591.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr590391.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr590391.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
623KB
MD5e593323da9867243d207a4998cadcd66
SHA1eb6b396f99696105d19d7d6e1c122eaa812290f0
SHA256a87cfbc678ce985f49b73eef80710b222a0cf66b0e41fde416a879bce314d73e
SHA5123e4faec71f30d760b1e6559e201161818dee23447183646ee10cf97df6336432cc17d91ceb431f64b19a1477c7d3568d7ae2667bd12ad5570eed305d24ee442f
-
Filesize
468KB
MD597f1222e3ce69720390398acb604f26a
SHA17b5462732dee3bb9258f4edfe292c06ec745eaac
SHA25665625fef19312e48a11ed3582cefd95351b0c1a66c17fb31bc134b409c2d4d2d
SHA512ab171f1b91c6187503d088b2bcadcfa6179ff887ce45a3bd0cf3f41acb3393ecd6b012bdbe0c681eee10f0a8bff6a8849d8bd77fc9517eb89b30a7c09854fac3
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
485KB
MD52f10ccaffc3edb98b5194d152d77ef6f
SHA1ea097524106cadfeacdc4637c828f07d001d1ee6
SHA2564dda3380d0cef5477b450190d985080406b78116865bf590d7d18793bc92d584
SHA512e99b8aeb55421b0aa0896948505adf420f58c5404780cae5ae743dabb5c652b73457fbab5243972505a2d68749109073d94697eaac24577f197f5a33e2033d14