Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:09
Static task
static1
Behavioral task
behavioral1
Sample
62e2dba4a53c3401ef02505c0d16691951f71d25112c9140237e6d082cd9287a.exe
Resource
win10v2004-20241007-en
General
-
Target
62e2dba4a53c3401ef02505c0d16691951f71d25112c9140237e6d082cd9287a.exe
-
Size
559KB
-
MD5
d9f378d198a6fabb024be8ffc1376a22
-
SHA1
50d8362660a60672c25c04dacd66d2e11823abef
-
SHA256
62e2dba4a53c3401ef02505c0d16691951f71d25112c9140237e6d082cd9287a
-
SHA512
56af6272e75873f708d3377d3d9c54eae1a8daf7011c22d58556cda098b0507dd775ca4ffcbcebb3bbf8b62dd9784934b1bbc7c00899f0553e2fd1816b5f6fe4
-
SSDEEP
12288:Iy90uEE1UGfgBioqO+Ps126useEc+/gYMCL0Dom:IynEE1XfrhsXusjDX05
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cbf-12.dat healer behavioral1/memory/3928-15-0x0000000000DB0000-0x0000000000DBA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it456070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it456070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it456070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it456070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it456070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it456070.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2356-22-0x0000000004B30000-0x0000000004B6C000-memory.dmp family_redline behavioral1/memory/2356-24-0x0000000004EE0000-0x0000000004F1A000-memory.dmp family_redline behavioral1/memory/2356-38-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-36-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-34-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-74-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-50-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-32-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-30-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-28-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-26-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-25-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-88-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-86-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-84-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-82-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-81-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-78-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-76-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-72-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-70-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-68-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-66-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-64-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-62-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-60-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-58-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-56-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-54-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-52-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-48-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-46-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-44-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-42-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline behavioral1/memory/2356-40-0x0000000004EE0000-0x0000000004F15000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1112 ziiF5500.exe 3928 it456070.exe 2356 kp515192.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it456070.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 62e2dba4a53c3401ef02505c0d16691951f71d25112c9140237e6d082cd9287a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziiF5500.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3976 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62e2dba4a53c3401ef02505c0d16691951f71d25112c9140237e6d082cd9287a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziiF5500.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp515192.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3928 it456070.exe 3928 it456070.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3928 it456070.exe Token: SeDebugPrivilege 2356 kp515192.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1112 1160 62e2dba4a53c3401ef02505c0d16691951f71d25112c9140237e6d082cd9287a.exe 86 PID 1160 wrote to memory of 1112 1160 62e2dba4a53c3401ef02505c0d16691951f71d25112c9140237e6d082cd9287a.exe 86 PID 1160 wrote to memory of 1112 1160 62e2dba4a53c3401ef02505c0d16691951f71d25112c9140237e6d082cd9287a.exe 86 PID 1112 wrote to memory of 3928 1112 ziiF5500.exe 87 PID 1112 wrote to memory of 3928 1112 ziiF5500.exe 87 PID 1112 wrote to memory of 2356 1112 ziiF5500.exe 93 PID 1112 wrote to memory of 2356 1112 ziiF5500.exe 93 PID 1112 wrote to memory of 2356 1112 ziiF5500.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\62e2dba4a53c3401ef02505c0d16691951f71d25112c9140237e6d082cd9287a.exe"C:\Users\Admin\AppData\Local\Temp\62e2dba4a53c3401ef02505c0d16691951f71d25112c9140237e6d082cd9287a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiF5500.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiF5500.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it456070.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it456070.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp515192.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp515192.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405KB
MD527da09592bcba15aa3ad5a07c4ca9950
SHA1b48520a97b8ef980ca60a4aa698d34f676d2e4e5
SHA256cab80674faed572161b69af753f3642294fb29c2ff64e28ba805888f34523d57
SHA5123ccb2ad446c9137e35fc230ccedd1a7b2d8e37a92861e86fc85469686b74cc615aedec9b88eed989a0fa9337d00f8f47712a44deb789823425d4bef429bbccc2
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
351KB
MD5082748670b77b62e227998c334af2f52
SHA15cc3b059d55a57a4347d502455ac63ad5697ddab
SHA256c45d67e47d19f43c04d607761385f88d55df2d61ca352f80edced9670b642ad0
SHA512344e3f5fffcbce2954f261968743f0a6a5d287199f489ec1c3e7e1ac2817f6e689b3137cd471cd3e4b6330242eda38aebba69e77ab73a063ead636fb28a24ac8