Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:02
Static task
static1
Behavioral task
behavioral1
Sample
03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19.exe
Resource
win10v2004-20241007-en
General
-
Target
03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19.exe
-
Size
479KB
-
MD5
d8aa17a35e7fffa914ee73bffd54fb44
-
SHA1
9a23ae078acf8523ba9b60b60f6366f8d5495cbe
-
SHA256
03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19
-
SHA512
a3cea61ddacd442028dd924e1659df23c5ec5b5f6fc18352033c414dcefa38ada47f9b3c6a8b9559fa2fb445a7d7bd350e1c3139d3e38bda23e8bdf3418f0419
-
SSDEEP
12288:ZMrzy90a/In/YP1qkxgWgl4FGPuHv+D1sVzK:eyXI/YNlTCTlD1qzK
Malware Config
Extracted
redline
murka
217.196.96.101:4132
-
auth_value
878a0681ac6ad0e4eb10ef9db07abdd9
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/428-15-0x0000000002360000-0x000000000237A000-memory.dmp healer behavioral1/memory/428-18-0x0000000004F50000-0x0000000004F68000-memory.dmp healer behavioral1/memory/428-29-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/428-45-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/428-43-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/428-41-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/428-39-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/428-37-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/428-47-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/428-35-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/428-34-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/428-31-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/428-23-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/428-21-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/428-20-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/428-27-0x0000000004F50000-0x0000000004F62000-memory.dmp healer behavioral1/memory/428-25-0x0000000004F50000-0x0000000004F62000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7097525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7097525.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7097525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7097525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7097525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7097525.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cb5-55.dat family_redline behavioral1/memory/4972-56-0x0000000000E90000-0x0000000000EC0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1252 v6225871.exe 428 a7097525.exe 4972 b1928152.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7097525.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7097525.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6225871.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6225871.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7097525.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1928152.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 428 a7097525.exe 428 a7097525.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 428 a7097525.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 644 wrote to memory of 1252 644 03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19.exe 83 PID 644 wrote to memory of 1252 644 03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19.exe 83 PID 644 wrote to memory of 1252 644 03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19.exe 83 PID 1252 wrote to memory of 428 1252 v6225871.exe 85 PID 1252 wrote to memory of 428 1252 v6225871.exe 85 PID 1252 wrote to memory of 428 1252 v6225871.exe 85 PID 1252 wrote to memory of 4972 1252 v6225871.exe 100 PID 1252 wrote to memory of 4972 1252 v6225871.exe 100 PID 1252 wrote to memory of 4972 1252 v6225871.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19.exe"C:\Users\Admin\AppData\Local\Temp\03b972200666e8372e74252e34e7c47a20eeb284d91857a29ab191d810578f19.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6225871.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6225871.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7097525.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7097525.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b1928152.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b1928152.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4972
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD52d1c49c488078cdb7b800adc16db35c8
SHA1cc245314ac52e2d8e55043ca84a0a3117e474f24
SHA2568c76f48b9c69ffa317deadd9ee528bd4c51b4f610ea56a20cf8eec394ccdaea0
SHA512aa04d9f12da2b1e8a0ae7838b10a759fdbcf5e065e293316fffce31196a24b2c2a3e5750324b98bc5074d675824ef7e374fe67a6b6d116268abbc6c9ebba310c
-
Filesize
181KB
MD563d98f55f138a43afcb24260b0665876
SHA14dcfa7272722ee3497965d77b621e4eabac2e4e9
SHA256c14234110b04673dc5e16e5d1851f155ccb623993f906bd7919b023666d53b74
SHA5120db966f4d7ad072a203ab9c05b77fa699f089f507d433f693892032fef470d44a1c934012a0011fc00da59e4b1de6ceb4cef364405116026fe0e9455b4e8a1f9
-
Filesize
168KB
MD5af495c7012f6462d11e520d891a81a47
SHA1d8fc98c76f182941a5d382b2c2d760aafdc3eaf7
SHA256e4eb956356d04ec4c9185678520999fac96a4b82739e1f1ab418bfc7f860e964
SHA51234ac5cc5dbdf0c18450e782d9fcad8bdf3d6ca725b0ce38b725aca367ccf0745b63c37a4eb2e0d888bcdb02eb589f576d4be7f4fd9cab5ac211c24405c3ee800