Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897.exe
Resource
win10v2004-20241007-en
General
-
Target
21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897.exe
-
Size
481KB
-
MD5
38d57e10b67fe30c6c3147eb71875a19
-
SHA1
55323f67468cb22f6aab48f77c836a6476e18352
-
SHA256
21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897
-
SHA512
fdef86d3cf86bc07ea7239cc5e2e96ce9be096251b04a7ec719aba16bd9dd00dd476c2fd5819ed6ed1e4e5ec5e1f2959b859930c1ec0520a30302633595647c4
-
SSDEEP
12288:XMr3y90ilbYaL5zD+uzb2Wrs6L6IvHW64B5sjDE:cypLx+umos6L6Ivx4B5sM
Malware Config
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4136-15-0x0000000002340000-0x000000000235A000-memory.dmp healer behavioral1/memory/4136-18-0x0000000002530000-0x0000000002548000-memory.dmp healer behavioral1/memory/4136-48-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4136-46-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4136-44-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4136-42-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4136-40-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4136-38-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4136-36-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4136-34-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4136-32-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4136-30-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4136-28-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4136-26-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4136-24-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4136-22-0x0000000002530000-0x0000000002542000-memory.dmp healer behavioral1/memory/4136-21-0x0000000002530000-0x0000000002542000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4163964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4163964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4163964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4163964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4163964.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4163964.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c70-54.dat family_redline behavioral1/memory/2820-56-0x0000000000E70000-0x0000000000EA0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3304 v3869172.exe 4136 a4163964.exe 2820 b8065386.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4163964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4163964.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3869172.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4163964.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8065386.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3869172.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4136 a4163964.exe 4136 a4163964.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4136 a4163964.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1204 wrote to memory of 3304 1204 21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897.exe 84 PID 1204 wrote to memory of 3304 1204 21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897.exe 84 PID 1204 wrote to memory of 3304 1204 21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897.exe 84 PID 3304 wrote to memory of 4136 3304 v3869172.exe 85 PID 3304 wrote to memory of 4136 3304 v3869172.exe 85 PID 3304 wrote to memory of 4136 3304 v3869172.exe 85 PID 3304 wrote to memory of 2820 3304 v3869172.exe 100 PID 3304 wrote to memory of 2820 3304 v3869172.exe 100 PID 3304 wrote to memory of 2820 3304 v3869172.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897.exe"C:\Users\Admin\AppData\Local\Temp\21cf498ec77b55821528c40fd933f2ad3ee6a5dbf38c6ceb1392bc29f8258897.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3869172.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3869172.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4163964.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4163964.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8065386.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8065386.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2820
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD5aab53cf28ab9ab32d1956295438e27bd
SHA1ff11cb8590d34a5da04ed177f6fc0d7e177db7e2
SHA2562b3cc309a9cb44911f344c63e102db544bde190fdfd8e85e562f0bbf731d5721
SHA5126655146683de64b4f35570b5f02682583f0c363002a05c442e4f7bd92fcd22a4cb6285a80df676fef36526181c3d21a3dfa8b5b823776033df50316e36dbe017
-
Filesize
180KB
MD57fc367ce2a58fc58fa5508db8e2187fa
SHA1e5bdcec8774ee89ab6fe1c616bc8d7cda1355174
SHA256bc4a197e5ad46f277e0e8a916df4e4f76a526ab0da5b4dfce6b241cb95888d45
SHA512710363d8a307b2593c37e4be723589071a4684f769e86128c89450075e0ff1f0035c183a45781c2d42945156dba1efb953b83ef2c23d3a489d44e55ea260a66a
-
Filesize
168KB
MD5cb411cd1939d5455226749447643ec25
SHA17ff3a5b6dade2e246b96f66ba9f3aa5e5a5799de
SHA2561db17cffb6312565ec2c004b35705b9af92f0484216cc1e9ca52156ede06e742
SHA5122aa6207e0d763165bc34425ea585091302b2ce819874acef9e2f37f46cb1b067dfd6cb6a957a8e6f3f8dd79daa4a5af253828080d9b86125670d75d88feb0bac