Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
1a075eec18c52161447b292da5596b7cc899ccb82b35932dc1c6cecbec7c3fde.exe
Resource
win10v2004-20241007-en
General
-
Target
1a075eec18c52161447b292da5596b7cc899ccb82b35932dc1c6cecbec7c3fde.exe
-
Size
936KB
-
MD5
a873a955ae271cc465f8c25b45d8d5f7
-
SHA1
67fa09abae57444e28be4860d28d4493a2126fad
-
SHA256
1a075eec18c52161447b292da5596b7cc899ccb82b35932dc1c6cecbec7c3fde
-
SHA512
847d27ecc6bc5f065197dd06e51ee926e5dd1145e59d0c6d87f5405894401abd07ce11a04e757d6877e39aab5115101e00c4c4806de2124b9bbe2cd25e4bf9ff
-
SSDEEP
24576:Syvddns8HafdsRcKsAGF5QgcY0p0UJfFiByj9px5f2C4t2:5vPsJs2KsAGF+s0TfYgWC4
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b5c-19.dat healer behavioral1/memory/1500-22-0x0000000000150000-0x000000000015A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it973746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it973746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it973746.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it973746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it973746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it973746.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4240-29-0x00000000029D0000-0x0000000002A0C000-memory.dmp family_redline behavioral1/memory/4240-31-0x00000000053B0000-0x00000000053EA000-memory.dmp family_redline behavioral1/memory/4240-44-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-57-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-93-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-91-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-90-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-87-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-85-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-83-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-81-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-79-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-77-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-75-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-71-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-69-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-67-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-65-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-63-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-61-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-55-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-53-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-51-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-49-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-47-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-45-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-41-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-39-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-95-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-73-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-59-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-37-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-35-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-33-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline behavioral1/memory/4240-32-0x00000000053B0000-0x00000000053E5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4012 zirr6721.exe 1556 ziDD0736.exe 1500 it973746.exe 4240 jr236688.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it973746.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1a075eec18c52161447b292da5596b7cc899ccb82b35932dc1c6cecbec7c3fde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zirr6721.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziDD0736.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr236688.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a075eec18c52161447b292da5596b7cc899ccb82b35932dc1c6cecbec7c3fde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zirr6721.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziDD0736.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1500 it973746.exe 1500 it973746.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1500 it973746.exe Token: SeDebugPrivilege 4240 jr236688.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4012 5088 1a075eec18c52161447b292da5596b7cc899ccb82b35932dc1c6cecbec7c3fde.exe 83 PID 5088 wrote to memory of 4012 5088 1a075eec18c52161447b292da5596b7cc899ccb82b35932dc1c6cecbec7c3fde.exe 83 PID 5088 wrote to memory of 4012 5088 1a075eec18c52161447b292da5596b7cc899ccb82b35932dc1c6cecbec7c3fde.exe 83 PID 4012 wrote to memory of 1556 4012 zirr6721.exe 84 PID 4012 wrote to memory of 1556 4012 zirr6721.exe 84 PID 4012 wrote to memory of 1556 4012 zirr6721.exe 84 PID 1556 wrote to memory of 1500 1556 ziDD0736.exe 86 PID 1556 wrote to memory of 1500 1556 ziDD0736.exe 86 PID 1556 wrote to memory of 4240 1556 ziDD0736.exe 94 PID 1556 wrote to memory of 4240 1556 ziDD0736.exe 94 PID 1556 wrote to memory of 4240 1556 ziDD0736.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a075eec18c52161447b292da5596b7cc899ccb82b35932dc1c6cecbec7c3fde.exe"C:\Users\Admin\AppData\Local\Temp\1a075eec18c52161447b292da5596b7cc899ccb82b35932dc1c6cecbec7c3fde.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirr6721.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirr6721.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDD0736.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDD0736.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it973746.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it973746.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr236688.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr236688.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
623KB
MD56f969f58760f88f93546fc0e4b8ea173
SHA1c5263b38c53f9a9aa55afb9b9867287263da9549
SHA256d6fa4e6d4e02302765715a753000459fb353fa31c44a7b9d30c109a18a5d8192
SHA512b9f81fd55331ecdb9c207169939a8ac76b516e4060b11029344ef608bbee8158fd4691b33703fec833da337e4eed1d35cfd19d8dec45c8ad9aea37c20811d1f6
-
Filesize
469KB
MD5ddcb148b13b41345ea737124f2627792
SHA1689186fcf0b0a2d0edbab5f6317487d221ffab05
SHA256ed89c94c4edbd4db6f367b6da5a6a5443a016f6f6d5979e5ac13bc46ea5a6868
SHA512927a0260c9b2c258795a942ba68747d9432a06af63c0bdf14feaac322e1a80e2a6a9c983138569fa1b68d9c707550c6d9b0f1db09f78c3dabd49cdc56357ece4
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
488KB
MD5dde7522af2a3ce333731c23fea81936b
SHA1159bfe97014ba9449e9940002d19a68c8431a919
SHA256b1404b035673f965e75349f331ef45121a36de83f87afeeec0530770e47cb970
SHA512cf1757464ac47ec45a83919a3c9177ebba0d01b4655e484144f3f4c452f65df6e9623e8623415363d9642208eb25d1229db7181b02f07cacfbabecf6c8e83ae4