Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:22
Static task
static1
Behavioral task
behavioral1
Sample
fb7297e7dd8298e88108c00cae41cc97c60da480dcf574783ddb0817771a158e.exe
Resource
win10v2004-20241007-en
General
-
Target
fb7297e7dd8298e88108c00cae41cc97c60da480dcf574783ddb0817771a158e.exe
-
Size
479KB
-
MD5
6b3792139359f7d9605bb1e6171b0b9a
-
SHA1
5b1b48c8ec83cc4a8f656de20a8c9ccffb6c580f
-
SHA256
fb7297e7dd8298e88108c00cae41cc97c60da480dcf574783ddb0817771a158e
-
SHA512
8a04197148c12512931b52f09d41cd58cf45bd3fa5ad009b48c1e8026680d0976e7a57ca2dc9c81ec27f203ef14f62bc12d71c087ffa9c79fe895e4af3a2756b
-
SSDEEP
12288:SMrsy90n/goxj7umVrslY8KlVIBVpCbK1DQP4G:KyqRj7Vrsy8hVsq2d
Malware Config
Extracted
redline
diwer
217.196.96.101:4132
-
auth_value
42abfa9e4f2e290c8bdbc776fd9bb6ad
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4620-15-0x0000000002500000-0x000000000251A000-memory.dmp healer behavioral1/memory/4620-18-0x0000000005080000-0x0000000005098000-memory.dmp healer behavioral1/memory/4620-25-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/4620-47-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/4620-45-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/4620-43-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/4620-39-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/4620-37-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/4620-35-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/4620-33-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/4620-31-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/4620-29-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/4620-27-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/4620-23-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/4620-21-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/4620-20-0x0000000005080000-0x0000000005092000-memory.dmp healer behavioral1/memory/4620-41-0x0000000005080000-0x0000000005092000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7360521.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7360521.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7360521.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7360521.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7360521.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7360521.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c99-53.dat family_redline behavioral1/memory/2704-55-0x00000000007A0000-0x00000000007D0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3536 y5568047.exe 4620 k7360521.exe 2704 l4457948.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7360521.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7360521.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fb7297e7dd8298e88108c00cae41cc97c60da480dcf574783ddb0817771a158e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5568047.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k7360521.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l4457948.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb7297e7dd8298e88108c00cae41cc97c60da480dcf574783ddb0817771a158e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y5568047.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4620 k7360521.exe 4620 k7360521.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4620 k7360521.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3772 wrote to memory of 3536 3772 fb7297e7dd8298e88108c00cae41cc97c60da480dcf574783ddb0817771a158e.exe 83 PID 3772 wrote to memory of 3536 3772 fb7297e7dd8298e88108c00cae41cc97c60da480dcf574783ddb0817771a158e.exe 83 PID 3772 wrote to memory of 3536 3772 fb7297e7dd8298e88108c00cae41cc97c60da480dcf574783ddb0817771a158e.exe 83 PID 3536 wrote to memory of 4620 3536 y5568047.exe 84 PID 3536 wrote to memory of 4620 3536 y5568047.exe 84 PID 3536 wrote to memory of 4620 3536 y5568047.exe 84 PID 3536 wrote to memory of 2704 3536 y5568047.exe 96 PID 3536 wrote to memory of 2704 3536 y5568047.exe 96 PID 3536 wrote to memory of 2704 3536 y5568047.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb7297e7dd8298e88108c00cae41cc97c60da480dcf574783ddb0817771a158e.exe"C:\Users\Admin\AppData\Local\Temp\fb7297e7dd8298e88108c00cae41cc97c60da480dcf574783ddb0817771a158e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5568047.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5568047.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7360521.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7360521.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4457948.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4457948.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5ffe6d5674594c10f17aee66344f712b0
SHA1130efe4560c96bc06a34dbd0f7a5d889b8c91976
SHA256e36d4dc9b891cc713f682ad463bd5e8d0dd783d37247b6f86c969b4d1286f11a
SHA512364f75cb06d37fb6edc03a8144372d38ecb662fe6284e75e3468fa6ec2d2bd848eb24cf3b2925feafc149471e73d26af57c5def2e7c5e757cd331c6ab7be2300
-
Filesize
177KB
MD5f185ae60b09c5cb1d2273c48dcb2f717
SHA1e0b99123ff3b829e31de29a98836a2da9fa7a281
SHA2563be1a21ec321ba25946feebe3bc60ac95a598a5e83fc3346d9aee80f1bf8bbeb
SHA512b6deb3d8bb4e86683fa43a2e20de1495eb713367d8c269ae722a446c4bc8e1adc54d9ee80e544f28230c2b98f95cf500b5ab837b56ecde0581a724a0409ad9c7
-
Filesize
168KB
MD50c6675b7bc04956d59cfb89532bacb40
SHA186052d3137b38bb8c284669f484f0b5bba745294
SHA256123a1bd8af6b8df70bb309740fd1b1cc5853bcc28cc4e4e0eeb9e66c96b5af56
SHA51248915f5787eddc79322899039208c35b3459e2ad127e27b0f88edfb9cdcc6b7dbf8c46034a41d6628e90aa81a329eeb57fef08c62e28bff38364d0a5cb477da1