Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:47
Static task
static1
Behavioral task
behavioral1
Sample
afc7fb767aa27e8db1d8648b4a08cdd7cc0c8078bb2cc1ff983dd754116c1a68.exe
Resource
win10v2004-20241007-en
General
-
Target
afc7fb767aa27e8db1d8648b4a08cdd7cc0c8078bb2cc1ff983dd754116c1a68.exe
-
Size
479KB
-
MD5
b41e5631df84af8b96a3241fbf98ae19
-
SHA1
267ba75c3cc34575b218b7ce0e36c2a048b71ae4
-
SHA256
afc7fb767aa27e8db1d8648b4a08cdd7cc0c8078bb2cc1ff983dd754116c1a68
-
SHA512
13fbf49dc267cecfe1a57c9c1bbf6690014a4c71a034e09f4617423388c7fee7db34e22318d8a2afe4f6adc123c3dcfc90dc455736af6dfe0babe5c6a340497b
-
SSDEEP
12288:vMrzy90HNeGxaZZhoKYYWo5bpCfO1ZcopQlSk:8yKAZX1z1mopQlJ
Malware Config
Extracted
redline
maher
217.196.96.101:4132
-
auth_value
c57763165f68aabcf4874e661a1ffbac
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3620-15-0x00000000021B0000-0x00000000021CA000-memory.dmp healer behavioral1/memory/3620-19-0x00000000024B0000-0x00000000024C8000-memory.dmp healer behavioral1/memory/3620-44-0x00000000024B0000-0x00000000024C2000-memory.dmp healer behavioral1/memory/3620-48-0x00000000024B0000-0x00000000024C2000-memory.dmp healer behavioral1/memory/3620-46-0x00000000024B0000-0x00000000024C2000-memory.dmp healer behavioral1/memory/3620-42-0x00000000024B0000-0x00000000024C2000-memory.dmp healer behavioral1/memory/3620-40-0x00000000024B0000-0x00000000024C2000-memory.dmp healer behavioral1/memory/3620-36-0x00000000024B0000-0x00000000024C2000-memory.dmp healer behavioral1/memory/3620-34-0x00000000024B0000-0x00000000024C2000-memory.dmp healer behavioral1/memory/3620-32-0x00000000024B0000-0x00000000024C2000-memory.dmp healer behavioral1/memory/3620-30-0x00000000024B0000-0x00000000024C2000-memory.dmp healer behavioral1/memory/3620-28-0x00000000024B0000-0x00000000024C2000-memory.dmp healer behavioral1/memory/3620-26-0x00000000024B0000-0x00000000024C2000-memory.dmp healer behavioral1/memory/3620-24-0x00000000024B0000-0x00000000024C2000-memory.dmp healer behavioral1/memory/3620-22-0x00000000024B0000-0x00000000024C2000-memory.dmp healer behavioral1/memory/3620-21-0x00000000024B0000-0x00000000024C2000-memory.dmp healer behavioral1/memory/3620-38-0x00000000024B0000-0x00000000024C2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7995066.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7995066.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7995066.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7995066.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7995066.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7995066.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c9a-54.dat family_redline behavioral1/memory/3080-56-0x00000000003C0000-0x00000000003F0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3560 v0609381.exe 3620 a7995066.exe 3080 b8795806.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7995066.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7995066.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" afc7fb767aa27e8db1d8648b4a08cdd7cc0c8078bb2cc1ff983dd754116c1a68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0609381.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7995066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8795806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afc7fb767aa27e8db1d8648b4a08cdd7cc0c8078bb2cc1ff983dd754116c1a68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v0609381.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3620 a7995066.exe 3620 a7995066.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3620 a7995066.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1604 wrote to memory of 3560 1604 afc7fb767aa27e8db1d8648b4a08cdd7cc0c8078bb2cc1ff983dd754116c1a68.exe 83 PID 1604 wrote to memory of 3560 1604 afc7fb767aa27e8db1d8648b4a08cdd7cc0c8078bb2cc1ff983dd754116c1a68.exe 83 PID 1604 wrote to memory of 3560 1604 afc7fb767aa27e8db1d8648b4a08cdd7cc0c8078bb2cc1ff983dd754116c1a68.exe 83 PID 3560 wrote to memory of 3620 3560 v0609381.exe 84 PID 3560 wrote to memory of 3620 3560 v0609381.exe 84 PID 3560 wrote to memory of 3620 3560 v0609381.exe 84 PID 3560 wrote to memory of 3080 3560 v0609381.exe 93 PID 3560 wrote to memory of 3080 3560 v0609381.exe 93 PID 3560 wrote to memory of 3080 3560 v0609381.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\afc7fb767aa27e8db1d8648b4a08cdd7cc0c8078bb2cc1ff983dd754116c1a68.exe"C:\Users\Admin\AppData\Local\Temp\afc7fb767aa27e8db1d8648b4a08cdd7cc0c8078bb2cc1ff983dd754116c1a68.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0609381.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0609381.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7995066.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7995066.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8795806.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8795806.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3080
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD55d7dd8ca7a033470c5e146042169ccf4
SHA128c5f215b35249bd2c8bacef7e21c6de20284059
SHA256a7970f339efcb0c7f6e7301eb47a8079d62a07496df5944b850d079a1d07ee3e
SHA51259ba37815d6414de0f5b478351547f9e5c61ab1072f33b25461bd33c3e1f9d1dab4d115b795936b98b02f54971da122810c91fa50fcdbe0f20a2024871c38f50
-
Filesize
179KB
MD5c25c4b193b7217c4dd2e68df28b79e59
SHA112546de7a7b2554d22e88def6334e4d5a9b85de8
SHA25637ee42edfd46d17af09d58707c5f875f8417e4b378ff88b304ff24b49d3b2925
SHA512212dd32fb292f4cb53fb446a4924125d017aa8e24c7cebd19b2ee2c2e8d5ba909a578a005dbb0da65c46b084036a1158151ca6fbcb6917e919575e98f8b1f622
-
Filesize
168KB
MD599c533ee1935d90e8ce3146351472beb
SHA1efa2d55c70340c9a7b2edd1804db67d7ad8e3529
SHA2560281f7ceff567f957d32dc05ddc29325dd807040fbf4b2fcbbf0a983ffdde1b1
SHA512a6d226c934f0a41832e5ed9e35e799312aa061e02eb08d7570f85bf6abfae0c22fca2b4ad70a0a2d631c272eeab5e353c1401b6bda35ead498b33ec23b9b67e2