Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
f25cff028f7ce8ccce8306b93b3d880620c451a5de27dbbd6a4467174c7513b4.exe
Resource
win10v2004-20241007-en
General
-
Target
f25cff028f7ce8ccce8306b93b3d880620c451a5de27dbbd6a4467174c7513b4.exe
-
Size
479KB
-
MD5
d49ee99c9e0c6c81b8bade073114e99b
-
SHA1
7aa399c0820c6149b7a37a7c6807e75afb6365cd
-
SHA256
f25cff028f7ce8ccce8306b93b3d880620c451a5de27dbbd6a4467174c7513b4
-
SHA512
f79dd40145f440b51a08507bc58e01ca462390a9d85ff63af6aad0fa40387f880fb70adb0c92040b686913e214ca23a49df25c68f947272c4740e222c255caf6
-
SSDEEP
12288:ZMrIy90Tu8fJy+fvSWwUYeenfsTCVb9pCBmDv3YG2IHEBmEP:hyAu8fVfKWwUQfvbvdDv3YGlEBjP
Malware Config
Extracted
redline
maher
217.196.96.101:4132
-
auth_value
c57763165f68aabcf4874e661a1ffbac
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1324-15-0x0000000002450000-0x000000000246A000-memory.dmp healer behavioral1/memory/1324-18-0x0000000004980000-0x0000000004998000-memory.dmp healer behavioral1/memory/1324-47-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1324-45-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1324-43-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1324-41-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1324-39-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1324-37-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1324-35-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1324-33-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1324-31-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1324-29-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1324-27-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1324-25-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1324-23-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1324-21-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1324-20-0x0000000004980000-0x0000000004992000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8937561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8937561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8937561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8937561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8937561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8937561.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000e000000023bd7-53.dat family_redline behavioral1/memory/456-55-0x0000000000B30000-0x0000000000B60000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3488 v8586207.exe 1324 a8937561.exe 456 b0232377.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8937561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8937561.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8586207.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f25cff028f7ce8ccce8306b93b3d880620c451a5de27dbbd6a4467174c7513b4.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f25cff028f7ce8ccce8306b93b3d880620c451a5de27dbbd6a4467174c7513b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8586207.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8937561.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0232377.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1324 a8937561.exe 1324 a8937561.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1324 a8937561.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3956 wrote to memory of 3488 3956 f25cff028f7ce8ccce8306b93b3d880620c451a5de27dbbd6a4467174c7513b4.exe 83 PID 3956 wrote to memory of 3488 3956 f25cff028f7ce8ccce8306b93b3d880620c451a5de27dbbd6a4467174c7513b4.exe 83 PID 3956 wrote to memory of 3488 3956 f25cff028f7ce8ccce8306b93b3d880620c451a5de27dbbd6a4467174c7513b4.exe 83 PID 3488 wrote to memory of 1324 3488 v8586207.exe 84 PID 3488 wrote to memory of 1324 3488 v8586207.exe 84 PID 3488 wrote to memory of 1324 3488 v8586207.exe 84 PID 3488 wrote to memory of 456 3488 v8586207.exe 93 PID 3488 wrote to memory of 456 3488 v8586207.exe 93 PID 3488 wrote to memory of 456 3488 v8586207.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f25cff028f7ce8ccce8306b93b3d880620c451a5de27dbbd6a4467174c7513b4.exe"C:\Users\Admin\AppData\Local\Temp\f25cff028f7ce8ccce8306b93b3d880620c451a5de27dbbd6a4467174c7513b4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8586207.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8586207.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8937561.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8937561.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0232377.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0232377.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:456
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD59231b52bf277e450ff8cf62e23a3fca7
SHA13b1ff2ba0a0bcf8574ff3e88a9c34b68397ef82b
SHA25648edf350b5424a0ab19ab7f32ea3b0459ed82a191d281d09cebaae4262d13f98
SHA512ac75f01a223f823547e54498d51bd58dca938d95c8d3bc84bf583162b6448e32090f1044416e3290b55bd0d5281cb1114b8078ed207a6228b4a0f80829e8bd65
-
Filesize
179KB
MD5c113d6d9c32cd214fdfb2a89273eaca6
SHA106bd3e9999940d2faead75f2d9000bbd53317ed9
SHA256320f9fc821bb8a260e88dc05dc628137fd0e2a08c534a9fe2293d4d9e6b7b3e9
SHA5122481ae41c61fe5cc2334642dd193e4e02420bc6f4601e4d9568b8e28386e2724c559d158a1ee04a969e94b303d9e0e470240a284ccd1171a3844879e46d4da24
-
Filesize
168KB
MD522d731fd1cfec69d96a8eebcfbd32c69
SHA1c96a83314f30b8e8534ed44ab8607d6f3fc5f362
SHA256beac1c7bc092feb55f0e8c4ba37f103a07cdda90c42624379f80524f43d308c2
SHA512636426a2377816325012b96a54e1b48c2d54c5bd52f557eec548812b27d599092eeb8f074915b9a42302ea5405cd9e748d3772dca7fbb9eb6ea670bea9d7281d