Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:05
Static task
static1
Behavioral task
behavioral1
Sample
0ce8f99c384f10b0fdc300e89677a1f944024e95fb74c11f628645c0795994de.exe
Resource
win10v2004-20241007-en
General
-
Target
0ce8f99c384f10b0fdc300e89677a1f944024e95fb74c11f628645c0795994de.exe
-
Size
479KB
-
MD5
57325662b5f6cfef6b7dd78f1329b237
-
SHA1
7d065455e03bcd4657c4f65b1c57d19158e930ae
-
SHA256
0ce8f99c384f10b0fdc300e89677a1f944024e95fb74c11f628645c0795994de
-
SHA512
e49e8318e111f97ecc2498ebed02e19f7093f8e98d9831382595e3aca878d4178cee2da5ef1dd2351f28f5651aa27fe209352dd0ea3184e870ff0f2494529fde
-
SSDEEP
12288:aMrxy90aW5zg05c1u31wTpwxl2yiSrmBc8OE:jyKztXeT22ycOE
Malware Config
Extracted
redline
maher
217.196.96.101:4132
-
auth_value
c57763165f68aabcf4874e661a1ffbac
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2084-15-0x0000000000900000-0x000000000091A000-memory.dmp healer behavioral1/memory/2084-18-0x0000000004F40000-0x0000000004F58000-memory.dmp healer behavioral1/memory/2084-22-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/2084-48-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/2084-46-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/2084-44-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/2084-42-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/2084-40-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/2084-38-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/2084-36-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/2084-34-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/2084-32-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/2084-30-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/2084-28-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/2084-26-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/2084-24-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/2084-21-0x0000000004F40000-0x0000000004F52000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2896078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2896078.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a2896078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2896078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2896078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2896078.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c76-54.dat family_redline behavioral1/memory/456-56-0x00000000000B0000-0x00000000000E0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2836 v8121248.exe 2084 a2896078.exe 456 b5076537.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2896078.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2896078.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0ce8f99c384f10b0fdc300e89677a1f944024e95fb74c11f628645c0795994de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8121248.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ce8f99c384f10b0fdc300e89677a1f944024e95fb74c11f628645c0795994de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8121248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2896078.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5076537.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2084 a2896078.exe 2084 a2896078.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2084 a2896078.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2836 2820 0ce8f99c384f10b0fdc300e89677a1f944024e95fb74c11f628645c0795994de.exe 86 PID 2820 wrote to memory of 2836 2820 0ce8f99c384f10b0fdc300e89677a1f944024e95fb74c11f628645c0795994de.exe 86 PID 2820 wrote to memory of 2836 2820 0ce8f99c384f10b0fdc300e89677a1f944024e95fb74c11f628645c0795994de.exe 86 PID 2836 wrote to memory of 2084 2836 v8121248.exe 87 PID 2836 wrote to memory of 2084 2836 v8121248.exe 87 PID 2836 wrote to memory of 2084 2836 v8121248.exe 87 PID 2836 wrote to memory of 456 2836 v8121248.exe 92 PID 2836 wrote to memory of 456 2836 v8121248.exe 92 PID 2836 wrote to memory of 456 2836 v8121248.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ce8f99c384f10b0fdc300e89677a1f944024e95fb74c11f628645c0795994de.exe"C:\Users\Admin\AppData\Local\Temp\0ce8f99c384f10b0fdc300e89677a1f944024e95fb74c11f628645c0795994de.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8121248.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8121248.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2896078.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2896078.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5076537.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5076537.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:456
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD58395add47332cb271e6fa268c7943c12
SHA18ead99e1839e1d5988ea8bbdf3bde7fadc896869
SHA256ac3046d253ae37e8b566bc4e9107471c61ce1c154cc5f815daf7d1b50f0bc49d
SHA512a9800f783645eac09e9a8eb02e36f9b724256380fd19282b75d4d1efea2accdbe270ccac491e0b9fd6f242f26d859c6da3d8f85d4a2fafbc5c2ee0a98bbe71f2
-
Filesize
179KB
MD5a2d8b3aa695e2183bd044feb4bde31ed
SHA18fd243cc3c390e30fb710fd1d97543ace653bcf0
SHA256a36fbbf222665b8709aabfe2bebf679a12b30f2f3949f5b17608a5a4f4379978
SHA512ca065037791c2d37a38692e99799b891c6cb2affe531370933355f8f12154e290fd06f7898366f5793b20072efd50f5f1196c397f0833640b44246cd365817ba
-
Filesize
168KB
MD5b4f8f6861ef6ef61a22282dac140fc20
SHA1e9b8c3d1ae59e233fe12e62cbb85a8f5d842795f
SHA2562f32ef64d6e050c9940428f9436e2c5f133c800f17497ba4ff4dd7efbe5136f4
SHA51266470aeb24cd1717c2c57261d48c68f63f9900fc30c4e7387b226c19d11b84df04e4792a50efcb013b46693db04a764abceea62a10ea38cfe11fd22200271a84