Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
9527be4d5a558190ea4aeb8ab94397f1e2e80729eec028e80ddd3d8cad46bc4b.exe
Resource
win10v2004-20241007-en
General
-
Target
9527be4d5a558190ea4aeb8ab94397f1e2e80729eec028e80ddd3d8cad46bc4b.exe
-
Size
827KB
-
MD5
c24b9215589f2a237c6708146d04a31d
-
SHA1
8760b44c21e912dc51f0b02760ba9df8cee477fa
-
SHA256
9527be4d5a558190ea4aeb8ab94397f1e2e80729eec028e80ddd3d8cad46bc4b
-
SHA512
40f29c64ca4f2255db2985101f1070ce024cc11eb85376e90e90f5de923aa9cfcb8bec912c32b7b1bb61b5ae09b3c6d24c8f3f7ebec63641227ad1b1bdfcc70a
-
SSDEEP
12288:Wy90cgSp2KeyOVYTtExL4o6V9zrFiFyOen7N+NI3G+XhnpihIZ5pO:Wyw+2K/yYeJ4DoFyJn82XhCIvpO
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c78-19.dat healer behavioral1/memory/3988-22-0x0000000000FD0000-0x0000000000FDA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it001302.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it001302.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it001302.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it001302.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it001302.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it001302.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1940-29-0x0000000004E10000-0x0000000004E4C000-memory.dmp family_redline behavioral1/memory/1940-31-0x00000000078D0000-0x000000000790A000-memory.dmp family_redline behavioral1/memory/1940-41-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-39-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-95-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-93-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-91-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-89-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-87-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-85-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-83-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-81-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-79-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-77-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-75-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-73-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-71-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-69-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-67-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-65-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-61-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-59-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-57-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-55-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-53-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-51-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-49-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-47-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-45-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-43-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-63-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-37-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-35-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-33-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral1/memory/1940-32-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 2256 ziir9995.exe 1504 ziqr2408.exe 3988 it001302.exe 1940 jr017087.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it001302.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9527be4d5a558190ea4aeb8ab94397f1e2e80729eec028e80ddd3d8cad46bc4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziir9995.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziqr2408.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziqr2408.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr017087.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9527be4d5a558190ea4aeb8ab94397f1e2e80729eec028e80ddd3d8cad46bc4b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziir9995.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3988 it001302.exe 3988 it001302.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3988 it001302.exe Token: SeDebugPrivilege 1940 jr017087.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2256 2936 9527be4d5a558190ea4aeb8ab94397f1e2e80729eec028e80ddd3d8cad46bc4b.exe 83 PID 2936 wrote to memory of 2256 2936 9527be4d5a558190ea4aeb8ab94397f1e2e80729eec028e80ddd3d8cad46bc4b.exe 83 PID 2936 wrote to memory of 2256 2936 9527be4d5a558190ea4aeb8ab94397f1e2e80729eec028e80ddd3d8cad46bc4b.exe 83 PID 2256 wrote to memory of 1504 2256 ziir9995.exe 84 PID 2256 wrote to memory of 1504 2256 ziir9995.exe 84 PID 2256 wrote to memory of 1504 2256 ziir9995.exe 84 PID 1504 wrote to memory of 3988 1504 ziqr2408.exe 85 PID 1504 wrote to memory of 3988 1504 ziqr2408.exe 85 PID 1504 wrote to memory of 1940 1504 ziqr2408.exe 96 PID 1504 wrote to memory of 1940 1504 ziqr2408.exe 96 PID 1504 wrote to memory of 1940 1504 ziqr2408.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\9527be4d5a558190ea4aeb8ab94397f1e2e80729eec028e80ddd3d8cad46bc4b.exe"C:\Users\Admin\AppData\Local\Temp\9527be4d5a558190ea4aeb8ab94397f1e2e80729eec028e80ddd3d8cad46bc4b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziir9995.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziir9995.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziqr2408.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziqr2408.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it001302.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it001302.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr017087.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr017087.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
568KB
MD5b1c2b192940f5e32f6a3571acb20dd06
SHA1f02aa3c8629d30ac437b11d4de4740ae7e7e339a
SHA25661ef4f2825039593fc033badf904874ad1f267eb13d41fdab90fa6b03972363a
SHA5125063214beb7f8a9042be8e14404a5f125aa40de8d63d0b155d46784d8036379987adbd5e36282994055813af826c9a2be00b7353560f64a9e493c62a74277771
-
Filesize
414KB
MD5dbb00aaea2cd4318546c240d2c9bcee6
SHA13f4d8ba9cf88517d885ff754fa562b015468caa7
SHA2562f71fd5464da7b07bfb28059b7420f9d58138ed6bced0371bf4d79e19565e956
SHA5129d47d13ea9de64ae49395c86f42e2d7de2e1af9c2f985527b51f456848cc74076d00ebd4f1b3fe6f9dfe01668feb06f2304d2b708948a3596cedd8f92cddb4ab
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
381KB
MD58b238d5de240f54a5f4e2ec73630ac77
SHA1f0135a30f35ae13825c490f8df800d453ae1792b
SHA25676d45928d31df9f21759974122af43e335448bd442707515e03022cf2ddf0a01
SHA512b74929d67f074f2f986beafd099b1d81c61cb3822bc4f1fb1607f6ccd2d58adcada0e2cc5a2d6646ed282c5ddb04704a70610efa68e1da8e0f75288fca2f1856