Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
062ff4e9d95c6aec47fed228667eb31fe349288f6d99708c32bb7cf7d462063e.exe
Resource
win10v2004-20241007-en
General
-
Target
062ff4e9d95c6aec47fed228667eb31fe349288f6d99708c32bb7cf7d462063e.exe
-
Size
481KB
-
MD5
c2cc8672da4238fe88decba6d3310bbe
-
SHA1
9f4cb4df278b3f1e02cafcdc67f344a232650f2b
-
SHA256
062ff4e9d95c6aec47fed228667eb31fe349288f6d99708c32bb7cf7d462063e
-
SHA512
8bdd2e37ed2fb89d32e80dfd4e85b7807a9b246cf446f6f52b050f2053d9b9e7eaf30b173f123869f5355233412b1ff6bde03b634d511b3367b24f72cd424200
-
SSDEEP
12288:VMrjy902SvGGTtpEMZ12HP2LDO/8y7MapLO0/p:SyGG6mfHaDO/8y7M2//p
Malware Config
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1268-15-0x0000000002360000-0x000000000237A000-memory.dmp healer behavioral1/memory/1268-18-0x0000000004F40000-0x0000000004F58000-memory.dmp healer behavioral1/memory/1268-33-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/1268-47-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/1268-45-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/1268-43-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/1268-41-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/1268-39-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/1268-37-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/1268-35-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/1268-31-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/1268-29-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/1268-27-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/1268-25-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/1268-23-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/1268-21-0x0000000004F40000-0x0000000004F52000-memory.dmp healer behavioral1/memory/1268-20-0x0000000004F40000-0x0000000004F52000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7163452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7163452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7163452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7163452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7163452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7163452.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b67-54.dat family_redline behavioral1/memory/1872-56-0x00000000009A0000-0x00000000009D0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3732 v2079672.exe 1268 a7163452.exe 1872 b6822095.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7163452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7163452.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 062ff4e9d95c6aec47fed228667eb31fe349288f6d99708c32bb7cf7d462063e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2079672.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6822095.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 062ff4e9d95c6aec47fed228667eb31fe349288f6d99708c32bb7cf7d462063e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2079672.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7163452.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1268 a7163452.exe 1268 a7163452.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1268 a7163452.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1444 wrote to memory of 3732 1444 062ff4e9d95c6aec47fed228667eb31fe349288f6d99708c32bb7cf7d462063e.exe 84 PID 1444 wrote to memory of 3732 1444 062ff4e9d95c6aec47fed228667eb31fe349288f6d99708c32bb7cf7d462063e.exe 84 PID 1444 wrote to memory of 3732 1444 062ff4e9d95c6aec47fed228667eb31fe349288f6d99708c32bb7cf7d462063e.exe 84 PID 3732 wrote to memory of 1268 3732 v2079672.exe 85 PID 3732 wrote to memory of 1268 3732 v2079672.exe 85 PID 3732 wrote to memory of 1268 3732 v2079672.exe 85 PID 3732 wrote to memory of 1872 3732 v2079672.exe 95 PID 3732 wrote to memory of 1872 3732 v2079672.exe 95 PID 3732 wrote to memory of 1872 3732 v2079672.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\062ff4e9d95c6aec47fed228667eb31fe349288f6d99708c32bb7cf7d462063e.exe"C:\Users\Admin\AppData\Local\Temp\062ff4e9d95c6aec47fed228667eb31fe349288f6d99708c32bb7cf7d462063e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2079672.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2079672.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7163452.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7163452.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6822095.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6822095.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1872
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD501fcd7a27d7a52c5ccefde1ff4c15df9
SHA145e01767922f7ff8ab6c34f17f428301939e461b
SHA256614c11fae98929bb5c8ae46b3fb3217ff964b7748e6754e9561e0e9eea419644
SHA51287a71d46659208778af77c5cd51e782ef3d652eb68802dd035723eea63ab18e9f16ef33867ec23600b593f293b960d8656829383847efbcfe9f489f57539fa4c
-
Filesize
179KB
MD54682eaff79cff6e8efe4603d97d7efa2
SHA15dc5c18f48c3e39e29f26ce00518d777252be057
SHA2567eb6d8cf1fbdbe5ee871a73659a105a3643b20c176310b036eaf0b437bdb2ce9
SHA51203e431fb059e19335a05e686fcc8a09a5051f508b93412fc345165608ec28c8432a74017b18c787c7b43ed5516f69adbdc97fd496958a9e58c468f65424ca881
-
Filesize
168KB
MD5bc27238936db9fb9c061f3e581fb1a5f
SHA1778c0ac2f5b76403691aff9a0ff08f919cdc1a6f
SHA2561a2d58c15e28d694de166976220982bbea37c8ab07d3befac5d6621ce0d68acc
SHA512895739bc842a4ee234002ed3e563f2881ee1a45be4a35d441ef6743bb882e9fa94cd1f8817cffc2a03ede54d9b4d65465417597b84480cf5ea97fe44e1595af9