Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:00
Static task
static1
Behavioral task
behavioral1
Sample
0997421043ff2a9d00b6020284898f5106c83e8b8eda2d7b5b5323db2f845cba.exe
Resource
win10v2004-20241007-en
General
-
Target
0997421043ff2a9d00b6020284898f5106c83e8b8eda2d7b5b5323db2f845cba.exe
-
Size
479KB
-
MD5
04167692eb09c16a10903de7a611589e
-
SHA1
3dc85ade52f588a9f1d3345534a9ff07d42a3813
-
SHA256
0997421043ff2a9d00b6020284898f5106c83e8b8eda2d7b5b5323db2f845cba
-
SHA512
9ce21c67b1c1423095dcdec6812144807a01aa80bcbb2901eccf8e121d5647d388d07ff7c4e745a9483a3db9144d858856443bdec98781d233f6f0be7181b0b7
-
SSDEEP
12288:dMrIy90uTXdaWv7ONx4tLx8J5plMKQMPuSPNEt0QeKi3:9yf4WvC8inHMKQpSaB2
Malware Config
Extracted
redline
divan
217.196.96.102:4132
-
auth_value
b414986bebd7f5a3ec9aee0341b8e769
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/64-15-0x0000000002380000-0x000000000239A000-memory.dmp healer behavioral1/memory/64-18-0x0000000004900000-0x0000000004918000-memory.dmp healer behavioral1/memory/64-25-0x0000000004900000-0x0000000004912000-memory.dmp healer behavioral1/memory/64-45-0x0000000004900000-0x0000000004912000-memory.dmp healer behavioral1/memory/64-43-0x0000000004900000-0x0000000004912000-memory.dmp healer behavioral1/memory/64-41-0x0000000004900000-0x0000000004912000-memory.dmp healer behavioral1/memory/64-39-0x0000000004900000-0x0000000004912000-memory.dmp healer behavioral1/memory/64-37-0x0000000004900000-0x0000000004912000-memory.dmp healer behavioral1/memory/64-35-0x0000000004900000-0x0000000004912000-memory.dmp healer behavioral1/memory/64-33-0x0000000004900000-0x0000000004912000-memory.dmp healer behavioral1/memory/64-31-0x0000000004900000-0x0000000004912000-memory.dmp healer behavioral1/memory/64-29-0x0000000004900000-0x0000000004912000-memory.dmp healer behavioral1/memory/64-27-0x0000000004900000-0x0000000004912000-memory.dmp healer behavioral1/memory/64-23-0x0000000004900000-0x0000000004912000-memory.dmp healer behavioral1/memory/64-21-0x0000000004900000-0x0000000004912000-memory.dmp healer behavioral1/memory/64-20-0x0000000004900000-0x0000000004912000-memory.dmp healer behavioral1/memory/64-47-0x0000000004900000-0x0000000004912000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7347705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7347705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7347705.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7347705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7347705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7347705.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c94-54.dat family_redline behavioral1/memory/4384-56-0x0000000000AE0000-0x0000000000B0E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3668 y1524305.exe 64 k7347705.exe 4384 l3185702.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7347705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7347705.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0997421043ff2a9d00b6020284898f5106c83e8b8eda2d7b5b5323db2f845cba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1524305.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4056 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y1524305.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k7347705.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l3185702.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0997421043ff2a9d00b6020284898f5106c83e8b8eda2d7b5b5323db2f845cba.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 64 k7347705.exe 64 k7347705.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 64 k7347705.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3628 wrote to memory of 3668 3628 0997421043ff2a9d00b6020284898f5106c83e8b8eda2d7b5b5323db2f845cba.exe 84 PID 3628 wrote to memory of 3668 3628 0997421043ff2a9d00b6020284898f5106c83e8b8eda2d7b5b5323db2f845cba.exe 84 PID 3628 wrote to memory of 3668 3628 0997421043ff2a9d00b6020284898f5106c83e8b8eda2d7b5b5323db2f845cba.exe 84 PID 3668 wrote to memory of 64 3668 y1524305.exe 85 PID 3668 wrote to memory of 64 3668 y1524305.exe 85 PID 3668 wrote to memory of 64 3668 y1524305.exe 85 PID 3668 wrote to memory of 4384 3668 y1524305.exe 93 PID 3668 wrote to memory of 4384 3668 y1524305.exe 93 PID 3668 wrote to memory of 4384 3668 y1524305.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0997421043ff2a9d00b6020284898f5106c83e8b8eda2d7b5b5323db2f845cba.exe"C:\Users\Admin\AppData\Local\Temp\0997421043ff2a9d00b6020284898f5106c83e8b8eda2d7b5b5323db2f845cba.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1524305.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1524305.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7347705.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7347705.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3185702.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3185702.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4384
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4056
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5341152e209e778a9045e8115f2133e31
SHA1db46b8b6a3cbcf3d9663ad91af7b4b0a3c691991
SHA2560b19a5daea3f8b4bf43724750b25b151824e2535b25dc5786cc3ae3bb2f656c6
SHA51223eff5494bd0b5f113406ca3601769d96580d7a2c50dfd0f9829df6c21c982b49fe5572eb669d18c5ef5db7e936d81babaec21b51a99677487f5574b6f6dde6d
-
Filesize
182KB
MD5ad16d0cf4eec397fd85fcfc6a52fef42
SHA1f38889323b3359adb2d03dbbdae0c17f616a39a8
SHA2561e487023710bf2a277650748cce48e86e299fb32cbcf31ae7b276b6fddcb34d2
SHA5129182ebd54f47eab597e0eb5ecc1424b6b713d991a8bdb81fa6481405d614b3407fb26dc400e738f50befcef726dfbfab401470cf2783e5a9bd20b6541bfbc9ce
-
Filesize
168KB
MD5bc08a3a3feb70c2384c0ba1e2b4d50c7
SHA1e7856f103e5f76b07d523985dd3afe9ebdf507c2
SHA25617b65536d9eec8a67d3aca4ef936777e28e422ef524100e49274caa2a1e95c15
SHA512a495f99f29793ff88fe2232b85e608e487dc82403b55089bebc210834df0bd06fe63a49ee301d339c309f9e5e2cc2c38c1adf437e8ea472cc34252520376cb5d