Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:33
Static task
static1
Behavioral task
behavioral1
Sample
97bd6488eb5aab7395c75d5ffbc612d828fadec8551a1607420792265fe41ff0.exe
Resource
win10v2004-20241007-en
General
-
Target
97bd6488eb5aab7395c75d5ffbc612d828fadec8551a1607420792265fe41ff0.exe
-
Size
752KB
-
MD5
8e459628cf950d1f8ff67104b7761c11
-
SHA1
b6209e546b9b62b56e4bb65ccc2782c974a15615
-
SHA256
97bd6488eb5aab7395c75d5ffbc612d828fadec8551a1607420792265fe41ff0
-
SHA512
fbea3bd029729431f0537d91e3bfbb9f244eaef3a151ea16edf77be58c45c3a52e046890bc410a06b2156480bdebc6704695c12b38058acc205058aca1f71e3e
-
SSDEEP
12288:uy90tbRe+ZUY8dVi7GOho04hSV2S09veplxdPrEWo6VDtdQsjIh:uyd+ZEmSJhlHMRJrkC4s8h
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1008-19-0x00000000025A0000-0x00000000025BA000-memory.dmp healer behavioral1/memory/1008-21-0x00000000026E0000-0x00000000026F8000-memory.dmp healer behavioral1/memory/1008-49-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/1008-22-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/1008-47-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/1008-45-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/1008-43-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/1008-42-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/1008-40-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/1008-37-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/1008-35-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/1008-33-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/1008-31-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/1008-29-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/1008-27-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/1008-25-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/1008-23-0x00000000026E0000-0x00000000026F2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 50855216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 50855216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 50855216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 50855216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 50855216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 50855216.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2280-61-0x0000000002720000-0x000000000275C000-memory.dmp family_redline behavioral1/memory/2280-62-0x00000000029D0000-0x0000000002A0A000-memory.dmp family_redline behavioral1/memory/2280-70-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-78-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-76-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-74-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-72-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-96-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-68-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-66-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-64-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-63-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-94-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-92-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-90-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-89-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-86-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-84-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-82-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline behavioral1/memory/2280-80-0x00000000029D0000-0x0000000002A05000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4312 un359752.exe 1008 50855216.exe 2280 rk256886.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 50855216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 50855216.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 97bd6488eb5aab7395c75d5ffbc612d828fadec8551a1607420792265fe41ff0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un359752.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97bd6488eb5aab7395c75d5ffbc612d828fadec8551a1607420792265fe41ff0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un359752.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 50855216.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk256886.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1008 50855216.exe 1008 50855216.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1008 50855216.exe Token: SeDebugPrivilege 2280 rk256886.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4556 wrote to memory of 4312 4556 97bd6488eb5aab7395c75d5ffbc612d828fadec8551a1607420792265fe41ff0.exe 83 PID 4556 wrote to memory of 4312 4556 97bd6488eb5aab7395c75d5ffbc612d828fadec8551a1607420792265fe41ff0.exe 83 PID 4556 wrote to memory of 4312 4556 97bd6488eb5aab7395c75d5ffbc612d828fadec8551a1607420792265fe41ff0.exe 83 PID 4312 wrote to memory of 1008 4312 un359752.exe 84 PID 4312 wrote to memory of 1008 4312 un359752.exe 84 PID 4312 wrote to memory of 1008 4312 un359752.exe 84 PID 4312 wrote to memory of 2280 4312 un359752.exe 92 PID 4312 wrote to memory of 2280 4312 un359752.exe 92 PID 4312 wrote to memory of 2280 4312 un359752.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\97bd6488eb5aab7395c75d5ffbc612d828fadec8551a1607420792265fe41ff0.exe"C:\Users\Admin\AppData\Local\Temp\97bd6488eb5aab7395c75d5ffbc612d828fadec8551a1607420792265fe41ff0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un359752.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un359752.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\50855216.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\50855216.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk256886.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk256886.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD56ddfaae0bc70f704cb65e6be074b38c0
SHA1163296e601297144e94a04d67c710d4c334c94ac
SHA256469bd3698d37477230e88516d6120acbdea8f0c012f75a84c369c0482d5fa012
SHA512e0e2134e9f8d6c47847cad400c05049ae754ffda7e6e929f06e49f95b1fc59ac7f0255ac6d5edf02f2c33a9d7ff997474be7d5e5b894b54d0bfd7d9540801d56
-
Filesize
390KB
MD5b134bb3d3bcf8442cfa8534125e180eb
SHA17e57eec67b2751c48c88f97a9b9e3f85c2c04c8f
SHA2560b37e55f6da658077e23d0268c326331fc56e3198d87fca087a627f1934ca9ff
SHA5129d9b9cdd60574ef04dfab192c5c5cae6038c23462a626a2dc306d95c383924f8ceadc904a1729f6b5ca2be22d55eb77cf4095df95b3abe5e6905da29b09ba592
-
Filesize
473KB
MD5c49b2d75164212995d965ffae9731703
SHA1e400ac81bbb12c4a4d8455a8bf926712b7e3b2d3
SHA256b0dd5d0f126a62a940e06334a0909daa7149317a029551d21f3fd930368f950a
SHA51219763cf627b7359e61ff1293edb00640f32a9fa43cbe1bfe32e000bc27ec2c48560441743951cd4a15e77dcb84aed2f8ec5d10b4853ac11b848e6e93b74c6cf0