Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:32
Static task
static1
Behavioral task
behavioral1
Sample
b5e8a5f20e77a8bc077e288404f86da8baf19f886d0f1aa4a4dfdd60ebbe1bed.exe
Resource
win10v2004-20241007-en
General
-
Target
b5e8a5f20e77a8bc077e288404f86da8baf19f886d0f1aa4a4dfdd60ebbe1bed.exe
-
Size
923KB
-
MD5
45937a9b8701bdbffecc6b2129056c06
-
SHA1
1c4ccc3b4691c9ba628694411f4f1e9346358125
-
SHA256
b5e8a5f20e77a8bc077e288404f86da8baf19f886d0f1aa4a4dfdd60ebbe1bed
-
SHA512
3041ec34901280604cbc14782aa7561980846bf2a5271aa1fa9f8a879a80706922795cc0a98085bee97d0999fa18c104ed24cfd74d617b8ea6b5ff762e753b88
-
SSDEEP
12288:Ky90r7LWa8tcKfkga4de8ZhlBU0DU9os5HighXdDv6SpjMJWao0BHe4S:KyBuwL00DU95HhXdFMJWaRB+/
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b8d-19.dat healer behavioral1/memory/732-22-0x0000000000560000-0x000000000056A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it220064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it220064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it220064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it220064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it220064.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it220064.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1640-28-0x0000000002900000-0x000000000293C000-memory.dmp family_redline behavioral1/memory/1640-30-0x0000000004F50000-0x0000000004F8A000-memory.dmp family_redline behavioral1/memory/1640-82-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-58-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-54-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-46-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-34-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-32-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-31-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-94-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-92-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-90-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-88-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-86-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-84-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-80-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-78-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-77-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-74-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-72-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-70-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-68-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-66-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-64-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-62-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-60-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-56-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-52-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-50-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-48-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-44-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-42-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-40-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-38-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline behavioral1/memory/1640-36-0x0000000004F50000-0x0000000004F85000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 864 ziqX4721.exe 3504 ziLB4865.exe 732 it220064.exe 1640 jr677045.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it220064.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b5e8a5f20e77a8bc077e288404f86da8baf19f886d0f1aa4a4dfdd60ebbe1bed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziqX4721.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziLB4865.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr677045.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5e8a5f20e77a8bc077e288404f86da8baf19f886d0f1aa4a4dfdd60ebbe1bed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziqX4721.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziLB4865.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 732 it220064.exe 732 it220064.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 732 it220064.exe Token: SeDebugPrivilege 1640 jr677045.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4420 wrote to memory of 864 4420 b5e8a5f20e77a8bc077e288404f86da8baf19f886d0f1aa4a4dfdd60ebbe1bed.exe 83 PID 4420 wrote to memory of 864 4420 b5e8a5f20e77a8bc077e288404f86da8baf19f886d0f1aa4a4dfdd60ebbe1bed.exe 83 PID 4420 wrote to memory of 864 4420 b5e8a5f20e77a8bc077e288404f86da8baf19f886d0f1aa4a4dfdd60ebbe1bed.exe 83 PID 864 wrote to memory of 3504 864 ziqX4721.exe 84 PID 864 wrote to memory of 3504 864 ziqX4721.exe 84 PID 864 wrote to memory of 3504 864 ziqX4721.exe 84 PID 3504 wrote to memory of 732 3504 ziLB4865.exe 86 PID 3504 wrote to memory of 732 3504 ziLB4865.exe 86 PID 3504 wrote to memory of 1640 3504 ziLB4865.exe 91 PID 3504 wrote to memory of 1640 3504 ziLB4865.exe 91 PID 3504 wrote to memory of 1640 3504 ziLB4865.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5e8a5f20e77a8bc077e288404f86da8baf19f886d0f1aa4a4dfdd60ebbe1bed.exe"C:\Users\Admin\AppData\Local\Temp\b5e8a5f20e77a8bc077e288404f86da8baf19f886d0f1aa4a4dfdd60ebbe1bed.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqX4721.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqX4721.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziLB4865.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziLB4865.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it220064.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it220064.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:732
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr677045.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr677045.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
616KB
MD51e4b142b4c3d32ee0c97095192d0a086
SHA1fc76d3791cf698bef6656913539f994261e5412e
SHA256f4c90775aa02e049d23f363b4a2d739b64d3c0d22866e8d49bd806822c2b9996
SHA512e2c163bf2f0a7dd49a01cc3b5793687d5fa14dfc83245b9cc316f0c54c6d22b3540be8f1cd861faf4f869ca806a6fffb1617c1d1971a61de1b0c325bd7818356
-
Filesize
462KB
MD53068495351ce5a5bd42e9b090e2341f6
SHA14c789f98ecf484c526b559d64a052984b35b78fd
SHA256ed8516ece7a51b77b4268fd8807175266ee82b74429e0119c24a20c61d6ecf9e
SHA51248163cd73e6ce20e42291c1acaf90ee1791846aac959f42b83a5bac620a271c5ebd460aab0d8f8f547fe82818c6bb5c20f240d56613d937a1396711ff4c4be72
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
474KB
MD503250f88acd83864238dd010f32f97a4
SHA1904bc71b2ed87da4d02a0df9082b4efacbff72cf
SHA256c3fa6b87ce29ba2478f421c2608552b1b83e13891e6f2a7c2fa636415bdde0db
SHA512ee02756b16952f8c4b46b97892ebd86c02d210c2cb9b798d61859597da50d630f71f1964bf07266fab6c533270d7e60f8147cb77d7fd43b2bfbd47fcf7e5a2d0