Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
108a952611aa819be13863512631a6e7aa94aa5824824dacb1b7c88e7fc5f967.exe
Resource
win10v2004-20241007-en
General
-
Target
108a952611aa819be13863512631a6e7aa94aa5824824dacb1b7c88e7fc5f967.exe
-
Size
479KB
-
MD5
cfcb3b5b973e36f4b6fd4654c2f0e8d7
-
SHA1
362839e94495c414a7bd8b16b2aee04206e3a8c5
-
SHA256
108a952611aa819be13863512631a6e7aa94aa5824824dacb1b7c88e7fc5f967
-
SHA512
ead9bc442a3503a196253e9900a67f216b7f54bbd5dc1e679114ac843ab30ab3147686eb61966b6b216bf18af88dc9eb998d038d7ce963887350f8e694ddf93a
-
SSDEEP
12288:jMrAy90FA0FMlyAp/6Sbyhd4Ae1c8UDCTXEgsgeUGHRj:7y0Ar/6SDO8UDCT7Gxj
Malware Config
Extracted
redline
diwer
217.196.96.101:4132
-
auth_value
42abfa9e4f2e290c8bdbc776fd9bb6ad
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1160-15-0x0000000002210000-0x000000000222A000-memory.dmp healer behavioral1/memory/1160-18-0x0000000004980000-0x0000000004998000-memory.dmp healer behavioral1/memory/1160-44-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1160-46-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1160-42-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1160-38-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1160-36-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1160-34-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1160-32-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1160-30-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1160-29-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1160-26-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1160-24-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1160-22-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1160-20-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1160-19-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/1160-40-0x0000000004980000-0x0000000004992000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k2800525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2800525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2800525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2800525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2800525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2800525.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c69-50.dat family_redline behavioral1/memory/4848-52-0x0000000000370000-0x00000000003A0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4976 y1422160.exe 1160 k2800525.exe 4848 l0689521.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2800525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2800525.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 108a952611aa819be13863512631a6e7aa94aa5824824dacb1b7c88e7fc5f967.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1422160.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3932 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k2800525.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l0689521.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 108a952611aa819be13863512631a6e7aa94aa5824824dacb1b7c88e7fc5f967.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y1422160.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1160 k2800525.exe 1160 k2800525.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1160 k2800525.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4560 wrote to memory of 4976 4560 108a952611aa819be13863512631a6e7aa94aa5824824dacb1b7c88e7fc5f967.exe 83 PID 4560 wrote to memory of 4976 4560 108a952611aa819be13863512631a6e7aa94aa5824824dacb1b7c88e7fc5f967.exe 83 PID 4560 wrote to memory of 4976 4560 108a952611aa819be13863512631a6e7aa94aa5824824dacb1b7c88e7fc5f967.exe 83 PID 4976 wrote to memory of 1160 4976 y1422160.exe 84 PID 4976 wrote to memory of 1160 4976 y1422160.exe 84 PID 4976 wrote to memory of 1160 4976 y1422160.exe 84 PID 4976 wrote to memory of 4848 4976 y1422160.exe 95 PID 4976 wrote to memory of 4848 4976 y1422160.exe 95 PID 4976 wrote to memory of 4848 4976 y1422160.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\108a952611aa819be13863512631a6e7aa94aa5824824dacb1b7c88e7fc5f967.exe"C:\Users\Admin\AppData\Local\Temp\108a952611aa819be13863512631a6e7aa94aa5824824dacb1b7c88e7fc5f967.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1422160.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1422160.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2800525.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2800525.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0689521.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0689521.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4848
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3932
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD54c497bfa4edd61bd994ea66c3285d2c0
SHA1d7de854efd8072f59a22c4779ee3b059c2069987
SHA256829c9746aa88c0542c60a64697ac615759d8ad68bf1d7d1cab7a714b53567d27
SHA51209f1466bcc5881f1456b6d5de3b72699964aeb403f20aca5a99dd5463199e468043f4dd83b91c9e5762692f98fdfb045222fe479992003bf27c6d2cf44f3881f
-
Filesize
177KB
MD5fb703222850b77d739730e4633efc0b0
SHA193c4f3a161c4f47a5d1a27789abca8812b4172df
SHA2566bcb7749bb66ec02ad6711efb4a6951cf87ddd9bef581a94c9d9b3a35d67a829
SHA512d525c29d77b307afc20052168c708ed455053e722d3272cdc507a55577c7d6a83cf0b85d1b7cac615c017467579b4e6bf3369d232f76574b8ed5264d2812d121
-
Filesize
168KB
MD594d0eb5adbb9d2b50891c3e6b2d377ca
SHA1514f510bfc32e7aa2f7fd7704025a0c7681606db
SHA25656bbfeec817eaa26684bc89f296a24acd16fdf551db71648cdbedaa56c7c7f1a
SHA51249817f20d454ee19ce40fe43a192c0d08911b69fac12f5b7b63abfe915a567e50e4f80af44457d509e268f096cca7da31a99d7174b02384107121cf2b63d0f10