Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe
Resource
win10v2004-20241007-en
General
-
Target
db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe
-
Size
642KB
-
MD5
2970144e68a0affa649b571c9d555ec8
-
SHA1
578fe9a657c5103e01c1996a7bb848a2318837ad
-
SHA256
db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836
-
SHA512
3a7cb96f9a9621bf3f244a41e9b4f18f2b2819b15008849d2ea37fd96591fe36495df3576ff473b61156af486daadd11ccf97596fcfb8908734e2d35dca55575
-
SSDEEP
12288:/y90D2KUA2tWHhRj9nYlVtB1JiXvlHqWW6jI1qbPK3A+1UQS+VRC:/yC2KhtHfj+b1Evt66jI1qbPorUQJVRC
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1864-15-0x00000000049F0000-0x0000000004A0A000-memory.dmp healer behavioral1/memory/1864-19-0x0000000004AC0000-0x0000000004AD8000-memory.dmp healer behavioral1/memory/1864-26-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1864-48-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1864-46-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1864-44-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1864-42-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1864-40-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1864-38-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1864-36-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1864-34-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1864-32-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1864-30-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1864-28-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1864-24-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1864-22-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/1864-21-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 26504028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 26504028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 26504028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 26504028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 26504028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 26504028.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/1036-57-0x0000000004D20000-0x0000000004D5C000-memory.dmp family_redline behavioral1/memory/1036-58-0x0000000007220000-0x000000000725A000-memory.dmp family_redline behavioral1/memory/1036-64-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-72-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-70-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-68-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-66-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-90-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-94-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-92-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-88-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-86-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-85-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-80-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-78-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-77-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-74-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-82-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-62-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-60-0x0000000007220000-0x0000000007255000-memory.dmp family_redline behavioral1/memory/1036-59-0x0000000007220000-0x0000000007255000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3220 st995672.exe 1864 26504028.exe 1036 kp968585.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 26504028.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 26504028.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st995672.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language st995672.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26504028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp968585.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1864 26504028.exe 1864 26504028.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1864 26504028.exe Token: SeDebugPrivilege 1036 kp968585.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 316 wrote to memory of 3220 316 db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe 83 PID 316 wrote to memory of 3220 316 db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe 83 PID 316 wrote to memory of 3220 316 db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe 83 PID 3220 wrote to memory of 1864 3220 st995672.exe 84 PID 3220 wrote to memory of 1864 3220 st995672.exe 84 PID 3220 wrote to memory of 1864 3220 st995672.exe 84 PID 3220 wrote to memory of 1036 3220 st995672.exe 92 PID 3220 wrote to memory of 1036 3220 st995672.exe 92 PID 3220 wrote to memory of 1036 3220 st995672.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe"C:\Users\Admin\AppData\Local\Temp\db5e0a7d7dda10e8498b04b515ea83beffdd8d8a991347a4295d4e4a18864836.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st995672.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st995672.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26504028.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26504028.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp968585.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp968585.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD5b018fc31e779cdd4b1e8bf87e875b593
SHA1d30a128cf0be7bb8bad4c73f83f40b4997622835
SHA2567cc3b9aab5cd44e57863fe0556a78194f901e7df3e2b38e6726b4b8afed98495
SHA5125ea57b88aa1049957c245c8049d2cb92e6253c523ad487d7a9d0aa65ab05b80eb69ecd17f910bd234e6c6371df171a664d1411ab42ff3c3b38a0409fc3a8a9f8
-
Filesize
176KB
MD52b71f4b18ac8214a2bff547b6ce2f64f
SHA1b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5
SHA256f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc
SHA51233518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177
-
Filesize
340KB
MD549b8c19408a2059b3ef04d26cbd66be5
SHA16827abafa907293098a1f0a3fbb6935429313a05
SHA2563d7cdeb453f6e77e2ce65ee7626ed458196dc4ee5963b2f514f7abb075c350cb
SHA512f4801ef61dbdaa57e597f41cef99f34f6dea082be7ad271a590a8b7902f7b0a107a95b9fa6ba545ce4ad3455fa3e03fc332ac9b5eaa4b736a906af70ad861236