Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
6303b8ac7b417dd568c53fa51713029aeba39a76b18a0cd7bf8865e9cf1283a4.exe
Resource
win10v2004-20241007-en
General
-
Target
6303b8ac7b417dd568c53fa51713029aeba39a76b18a0cd7bf8865e9cf1283a4.exe
-
Size
1.5MB
-
MD5
f17d59006472c72a9532b57c3c0ded5b
-
SHA1
1cf962c0880c0940f310c3507e3be5fcdcb1a3ef
-
SHA256
6303b8ac7b417dd568c53fa51713029aeba39a76b18a0cd7bf8865e9cf1283a4
-
SHA512
e720b5034c42ce1bb6bc1d82ff3620d3a79b5f4c3be66ad7081e673e7f06b3aae1c663b32a91f7905dfe48fefb9fd26c60e19dfb5b68abbc49e6f9d3749bc656
-
SSDEEP
24576:MyG3z4/LZxMMk2jlk+pF/5Ep3K5sRB69BT4V4IpasHCIckjA:7T/LZGr2jlBKPR0r4uIp/iIr
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c7d-33.dat healer behavioral1/memory/212-35-0x0000000000A50000-0x0000000000A5A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az732685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az732685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az732685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az732685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az732685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az732685.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/5056-41-0x00000000026F0000-0x000000000272C000-memory.dmp family_redline behavioral1/memory/5056-43-0x0000000004DF0000-0x0000000004E2A000-memory.dmp family_redline behavioral1/memory/5056-107-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-105-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-103-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-101-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-99-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-97-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-95-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-93-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-91-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-87-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-85-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-83-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-81-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-79-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-75-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-73-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-71-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-70-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-67-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-66-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-63-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-61-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-57-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-55-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-53-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-51-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-89-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-77-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-59-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-49-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-47-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-45-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/5056-44-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 5048 ki960443.exe 2836 ki210290.exe 1772 ki481072.exe 3772 ki711170.exe 212 az732685.exe 5056 bu831218.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az732685.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ki481072.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ki711170.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6303b8ac7b417dd568c53fa51713029aeba39a76b18a0cd7bf8865e9cf1283a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ki960443.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ki210290.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4884 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6303b8ac7b417dd568c53fa51713029aeba39a76b18a0cd7bf8865e9cf1283a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki960443.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki210290.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki481072.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki711170.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bu831218.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 212 az732685.exe 212 az732685.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 212 az732685.exe Token: SeDebugPrivilege 5056 bu831218.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1708 wrote to memory of 5048 1708 6303b8ac7b417dd568c53fa51713029aeba39a76b18a0cd7bf8865e9cf1283a4.exe 85 PID 1708 wrote to memory of 5048 1708 6303b8ac7b417dd568c53fa51713029aeba39a76b18a0cd7bf8865e9cf1283a4.exe 85 PID 1708 wrote to memory of 5048 1708 6303b8ac7b417dd568c53fa51713029aeba39a76b18a0cd7bf8865e9cf1283a4.exe 85 PID 5048 wrote to memory of 2836 5048 ki960443.exe 86 PID 5048 wrote to memory of 2836 5048 ki960443.exe 86 PID 5048 wrote to memory of 2836 5048 ki960443.exe 86 PID 2836 wrote to memory of 1772 2836 ki210290.exe 88 PID 2836 wrote to memory of 1772 2836 ki210290.exe 88 PID 2836 wrote to memory of 1772 2836 ki210290.exe 88 PID 1772 wrote to memory of 3772 1772 ki481072.exe 89 PID 1772 wrote to memory of 3772 1772 ki481072.exe 89 PID 1772 wrote to memory of 3772 1772 ki481072.exe 89 PID 3772 wrote to memory of 212 3772 ki711170.exe 90 PID 3772 wrote to memory of 212 3772 ki711170.exe 90 PID 3772 wrote to memory of 5056 3772 ki711170.exe 96 PID 3772 wrote to memory of 5056 3772 ki711170.exe 96 PID 3772 wrote to memory of 5056 3772 ki711170.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\6303b8ac7b417dd568c53fa51713029aeba39a76b18a0cd7bf8865e9cf1283a4.exe"C:\Users\Admin\AppData\Local\Temp\6303b8ac7b417dd568c53fa51713029aeba39a76b18a0cd7bf8865e9cf1283a4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki960443.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki960443.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki210290.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki210290.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki481072.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki481072.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki711170.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ki711170.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az732685.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\az732685.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu831218.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bu831218.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4884
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5b796e48528e0f434f9dc1c86a7562acf
SHA1ed581043343d1b6222762a356331f8f6f4f1643e
SHA256f524f6899b43b75d2c33034bf44f1be687f0e0aac61d952264f8f454483a9718
SHA5129e7b79b8c89dd427761c0831c992167bfab63764378c12dfe2a556081bfa27887827026701c630019035799609a37c238becddafed46a99614dc358e8392c9d3
-
Filesize
1.0MB
MD5f5709a44cb6b161671d2c58b9d7a6900
SHA10fdfa06a9f2e53ef35283b910a7fb4bf24e1c117
SHA2565f03084d948ec02a4d9054beb3b0bd4b78e5807b72ffd1055bb2e2a0baf12e72
SHA5125c844db27393e6d14bf25c4a5b626e55aac662ce9dd987d4e6fbc1742bfb5f01bbeee9cfb12e3117f0ce8bbcafa12c7066321817294530404a188d6855f07f1a
-
Filesize
787KB
MD59881cc22397cb5dfca472aff856b8ae2
SHA17a9d4cb18172a64a697d1cf25fd85fe389eb77b1
SHA256b9f7b0a2190251b0df4ee95aa79b496f523ad2bf121cc50b31aeda65d70f76d2
SHA5122cea9487616d7a4e1849f2d3cd8175731ce62f5a8001759d8bc80a22978b84afb53307ef1860ecaa1676552233f95902e5bbf396df06c7e24eb80689fb24134f
-
Filesize
460KB
MD516baa912ae823ccf3fd60f509cf0e242
SHA1f7a15dd33c2e83009f17a30e55c338f219561bc2
SHA2561b04d4ac59bc54907d2b2ea4340611549b9f0630df07b047de4013b1a0b3377d
SHA51211b09501c1370bc1e70ae6ca207feb525646fa84092f427a0f543adaa9e8681899fa1201909ea97a7c088c84b4144aca3629f2c7b639051088c543ad08536050
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
472KB
MD578d5914b752ce08f5d39b146f0849a03
SHA1fda17e80b841180490bc5da7ea6d41e03290fd69
SHA2567cda4d1fc6c19bd202ac3a836f11f7064d51aefda1ff7558c48b714efc2d30df
SHA5125b595301b2612c535f6caf93a0ef549f8f8e5ac578f16e7a7627147d80e7084963ddf42ed118d7c1d3b875926d55d37f8c36a20e5dd1ae3a5033fd6b5aadd7f3