Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119.exe
Resource
win10v2004-20241007-en
General
-
Target
9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119.exe
-
Size
477KB
-
MD5
aa7b3fe90b2d477b5db2afa25388554d
-
SHA1
67da7669d32ada781633e2e347f369ad090b1dbb
-
SHA256
9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119
-
SHA512
f7bd5c45583545edd171bfcf91ebef189d8f101851e8f22966b565aaf78551d7be560742908f43252659c98fa31d30888662a80ccdbfa5e7a190a61009da2f0f
-
SSDEEP
6144:KCy+bnr+vp0yN90QE3PKapC3UBzsDY+4CbYfIHSkY7Vt19IqoAHNxb0K48rVBhSc:KMr3y90kapxAXSkWV7GT24YKs
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1160-19-0x0000000000880000-0x000000000089A000-memory.dmp healer behavioral1/memory/1160-21-0x0000000002670000-0x0000000002688000-memory.dmp healer behavioral1/memory/1160-22-0x0000000002670000-0x0000000002682000-memory.dmp healer behavioral1/memory/1160-43-0x0000000002670000-0x0000000002682000-memory.dmp healer behavioral1/memory/1160-49-0x0000000002670000-0x0000000002682000-memory.dmp healer behavioral1/memory/1160-47-0x0000000002670000-0x0000000002682000-memory.dmp healer behavioral1/memory/1160-45-0x0000000002670000-0x0000000002682000-memory.dmp healer behavioral1/memory/1160-41-0x0000000002670000-0x0000000002682000-memory.dmp healer behavioral1/memory/1160-39-0x0000000002670000-0x0000000002682000-memory.dmp healer behavioral1/memory/1160-37-0x0000000002670000-0x0000000002682000-memory.dmp healer behavioral1/memory/1160-35-0x0000000002670000-0x0000000002682000-memory.dmp healer behavioral1/memory/1160-33-0x0000000002670000-0x0000000002682000-memory.dmp healer behavioral1/memory/1160-31-0x0000000002670000-0x0000000002682000-memory.dmp healer behavioral1/memory/1160-29-0x0000000002670000-0x0000000002682000-memory.dmp healer behavioral1/memory/1160-27-0x0000000002670000-0x0000000002682000-memory.dmp healer behavioral1/memory/1160-25-0x0000000002670000-0x0000000002682000-memory.dmp healer behavioral1/memory/1160-23-0x0000000002670000-0x0000000002682000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection bBf74SI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bBf74SI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bBf74SI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bBf74SI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bBf74SI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bBf74SI.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023ccd-58.dat family_redline behavioral1/memory/3832-60-0x0000000000D70000-0x0000000000DA2000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 5016 niU17lL.exe 1160 bBf74SI.exe 3832 dkI93iR.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features bBf74SI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" bBf74SI.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niU17lL.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3488 1160 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bBf74SI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dkI93iR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niU17lL.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1160 bBf74SI.exe 1160 bBf74SI.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1160 bBf74SI.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1480 wrote to memory of 5016 1480 9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119.exe 83 PID 1480 wrote to memory of 5016 1480 9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119.exe 83 PID 1480 wrote to memory of 5016 1480 9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119.exe 83 PID 5016 wrote to memory of 1160 5016 niU17lL.exe 84 PID 5016 wrote to memory of 1160 5016 niU17lL.exe 84 PID 5016 wrote to memory of 1160 5016 niU17lL.exe 84 PID 5016 wrote to memory of 3832 5016 niU17lL.exe 105 PID 5016 wrote to memory of 3832 5016 niU17lL.exe 105 PID 5016 wrote to memory of 3832 5016 niU17lL.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119.exe"C:\Users\Admin\AppData\Local\Temp\9a003bb8413be27626963e886326cbea7a4fd7ef693648c59a881e6b277ac119.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niU17lL.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niU17lL.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bBf74SI.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bBf74SI.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 10844⤵
- Program crash
PID:3488
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dkI93iR.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dkI93iR.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1160 -ip 11601⤵PID:3360
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD583679410574c7ae0bea6b8649e51328c
SHA1ab3199f7b73585287c30d44ccdf2ba931f9da2b9
SHA2560b8d1c563b76d61ad0a975153aa2fcd58df6db8a31f6ec93a10a300ed20215f2
SHA512d4d9340228b481178b15dba1dc11b10769130bc1d1316a3d1f696836194f921308d0772f22336a178b8c0526be5ffbe8e12ee35d0114d22566960198e94c1104
-
Filesize
235KB
MD510ebdbd3b97101647f579e816a624c0b
SHA1504e3a11a4ae58dbf156627cee7f49e89502d489
SHA2560eae82f040db8b8af792d3e005b0486093320f12601be24065e7e5569e1f8c2c
SHA51275d837bf685f529671c3be97702956de890d2a3c9f61f81c51a569363c6bedcbe367e5381f9636c78d5e96b286b77bcc8927fad4490517c80b30652ec67ec392
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec