Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:52
Static task
static1
Behavioral task
behavioral1
Sample
fb9c4be39a500c5512066a16779684c49f2319edd645a10f013066c62257d12e.exe
Resource
win10v2004-20241007-en
General
-
Target
fb9c4be39a500c5512066a16779684c49f2319edd645a10f013066c62257d12e.exe
-
Size
479KB
-
MD5
b79b9d1de5560eed54b7278acd811e1b
-
SHA1
6d11607f8e2dbf0950920afc330b53a1b7f0e40d
-
SHA256
fb9c4be39a500c5512066a16779684c49f2319edd645a10f013066c62257d12e
-
SHA512
7acdfb54e3df68c777e2c9d4bcac2a4d8c7d7b55e14c51b826635725bd7b03705afb4111672bae1cb5a9e768f5234c4ad3a628e7e5542b28cb19669b06e0777a
-
SSDEEP
12288:DMrFy90c8Y84sKtBmbqXJxEELIKr41GWgJzycG6MnbYL:Gyn81BKfeCJKE8x1yzJG6mm
Malware Config
Extracted
redline
ditro
217.196.96.101:4132
-
auth_value
8f24ed370a9b24aa28d3d634ea57912e
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3096-15-0x0000000002280000-0x000000000229A000-memory.dmp healer behavioral1/memory/3096-19-0x0000000002410000-0x0000000002428000-memory.dmp healer behavioral1/memory/3096-47-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/3096-45-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/3096-43-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/3096-41-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/3096-39-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/3096-37-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/3096-35-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/3096-33-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/3096-31-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/3096-29-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/3096-27-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/3096-25-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/3096-23-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/3096-21-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/3096-20-0x0000000002410000-0x0000000002422000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k0899177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0899177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0899177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0899177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0899177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0899177.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b5e-53.dat family_redline behavioral1/memory/3628-55-0x0000000000140000-0x0000000000170000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4468 y1183441.exe 3096 k0899177.exe 3628 l6938896.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k0899177.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0899177.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fb9c4be39a500c5512066a16779684c49f2319edd645a10f013066c62257d12e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1183441.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb9c4be39a500c5512066a16779684c49f2319edd645a10f013066c62257d12e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y1183441.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k0899177.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l6938896.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3096 k0899177.exe 3096 k0899177.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3096 k0899177.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2556 wrote to memory of 4468 2556 fb9c4be39a500c5512066a16779684c49f2319edd645a10f013066c62257d12e.exe 84 PID 2556 wrote to memory of 4468 2556 fb9c4be39a500c5512066a16779684c49f2319edd645a10f013066c62257d12e.exe 84 PID 2556 wrote to memory of 4468 2556 fb9c4be39a500c5512066a16779684c49f2319edd645a10f013066c62257d12e.exe 84 PID 4468 wrote to memory of 3096 4468 y1183441.exe 85 PID 4468 wrote to memory of 3096 4468 y1183441.exe 85 PID 4468 wrote to memory of 3096 4468 y1183441.exe 85 PID 4468 wrote to memory of 3628 4468 y1183441.exe 92 PID 4468 wrote to memory of 3628 4468 y1183441.exe 92 PID 4468 wrote to memory of 3628 4468 y1183441.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb9c4be39a500c5512066a16779684c49f2319edd645a10f013066c62257d12e.exe"C:\Users\Admin\AppData\Local\Temp\fb9c4be39a500c5512066a16779684c49f2319edd645a10f013066c62257d12e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1183441.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1183441.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0899177.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0899177.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6938896.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6938896.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3628
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD58d04a973a4af457e06406fa6cb34b75f
SHA14784cabbbd92ed447385c871ed575537ad7ec6f0
SHA25678f42ed8243412820b71554992006dc018a17646e6c10dd22a585fa5e52897a2
SHA512042b592bebef69060602e7e10841e455b9566b71f86874f1d6453fd8a05af21313bf10a1f18da919b4e12ad58a6b1b550ea14fb8e5c51096f0dafc61068949a9
-
Filesize
178KB
MD53c71166af18204f8e7d5e2e4a4130d0e
SHA15f4b8fb3dcfefde7fa6895f70f6b80deededaa80
SHA2565974d0e0fbd48de1dde06c077b51ea50b1760ace5617f9f11d7fcb833644e0cc
SHA5128b401110fda6e4ecfd46c87d8b148cb94c94542cd90f3f0208ca29b67a8ba02a0b23d9e771f5b66a83589772ba6bb1527314e34fcaca3ed26dd10f29a2ce4de4
-
Filesize
168KB
MD5e7a286dbdd8198118e922ead82e32634
SHA1ad29287c42db68548fc9e44bbd3fc49e4972e6aa
SHA2569917d18e69374418a41dd4e9d129fe7b6a92d5b91c5bc6c0e77d86b9446c48c9
SHA5121ab1d41f1c59fec10552109a98df9cc755558ca5be66927ffab09a8db688d61b4acdf3f0e6bd045ef4933eda0f0f5004e8c89853342135768364fb5da4955db6