Analysis
-
max time kernel
101s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:26
Static task
static1
Behavioral task
behavioral1
Sample
18ee136df5e0977627dd92f0bbd0e94f671904f162c510b27e71fe2c5f0ba8d6N.exe
Resource
win10v2004-20241007-en
General
-
Target
18ee136df5e0977627dd92f0bbd0e94f671904f162c510b27e71fe2c5f0ba8d6N.exe
-
Size
503KB
-
MD5
1acc150e9b73a63fd89274e385466e6b
-
SHA1
9ace31944855e18d52e692ef27aefe74a3cdf665
-
SHA256
f88bdf6a99e700557832347e033d4c78c815fa37478a3379fe87bf6539d40934
-
SHA512
a520333a558c3973194c8b856272476c14f74e97fcd326f0387d3be69abff301a763c2ada8c63475916b5b86d6cdfc7789813f70be661151da42cacc64fc56f5
-
SSDEEP
12288:HMrXy90KCMHaYkd+UOkbSPv32aIsz8SyqOGoP:wy5HaYkd+UVbSH32Vs8JGoP
Malware Config
Extracted
redline
lint
193.233.20.28:4125
-
auth_value
0e95262fb78243c67430f3148303e5b7
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023c68-12.dat healer behavioral1/memory/4800-15-0x0000000000ED0000-0x0000000000EDA000-memory.dmp healer behavioral1/memory/4856-22-0x0000000004AC0000-0x0000000004ADA000-memory.dmp healer behavioral1/memory/4856-24-0x0000000004C50000-0x0000000004C68000-memory.dmp healer behavioral1/memory/4856-25-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/4856-28-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/4856-52-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/4856-50-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/4856-48-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/4856-46-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/4856-44-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/4856-40-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/4856-36-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/4856-34-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/4856-32-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/4856-26-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/4856-42-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/4856-39-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/4856-31-0x0000000004C50000-0x0000000004C62000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection ns1114IN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ns1114IN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ns1114IN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ns1114IN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ns1114IN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ns1114IN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection py12EU51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" py12EU51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" py12EU51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" py12EU51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" py12EU51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" py12EU51.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c66-58.dat family_redline behavioral1/memory/4948-59-0x0000000000BD0000-0x0000000000C02000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4384 will2158.exe 4800 ns1114IN.exe 4856 py12EU51.exe 4948 qs5009VR.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" py12EU51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" ns1114IN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features py12EU51.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 18ee136df5e0977627dd92f0bbd0e94f671904f162c510b27e71fe2c5f0ba8d6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" will2158.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3664 4856 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18ee136df5e0977627dd92f0bbd0e94f671904f162c510b27e71fe2c5f0ba8d6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language will2158.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language py12EU51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qs5009VR.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4800 ns1114IN.exe 4800 ns1114IN.exe 4856 py12EU51.exe 4856 py12EU51.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4800 ns1114IN.exe Token: SeDebugPrivilege 4856 py12EU51.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4384 4032 18ee136df5e0977627dd92f0bbd0e94f671904f162c510b27e71fe2c5f0ba8d6N.exe 84 PID 4032 wrote to memory of 4384 4032 18ee136df5e0977627dd92f0bbd0e94f671904f162c510b27e71fe2c5f0ba8d6N.exe 84 PID 4032 wrote to memory of 4384 4032 18ee136df5e0977627dd92f0bbd0e94f671904f162c510b27e71fe2c5f0ba8d6N.exe 84 PID 4384 wrote to memory of 4800 4384 will2158.exe 85 PID 4384 wrote to memory of 4800 4384 will2158.exe 85 PID 4384 wrote to memory of 4856 4384 will2158.exe 96 PID 4384 wrote to memory of 4856 4384 will2158.exe 96 PID 4384 wrote to memory of 4856 4384 will2158.exe 96 PID 4032 wrote to memory of 4948 4032 18ee136df5e0977627dd92f0bbd0e94f671904f162c510b27e71fe2c5f0ba8d6N.exe 101 PID 4032 wrote to memory of 4948 4032 18ee136df5e0977627dd92f0bbd0e94f671904f162c510b27e71fe2c5f0ba8d6N.exe 101 PID 4032 wrote to memory of 4948 4032 18ee136df5e0977627dd92f0bbd0e94f671904f162c510b27e71fe2c5f0ba8d6N.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\18ee136df5e0977627dd92f0bbd0e94f671904f162c510b27e71fe2c5f0ba8d6N.exe"C:\Users\Admin\AppData\Local\Temp\18ee136df5e0977627dd92f0bbd0e94f671904f162c510b27e71fe2c5f0ba8d6N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will2158.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\will2158.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ns1114IN.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ns1114IN.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\py12EU51.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\py12EU51.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 10804⤵
- Program crash
PID:3664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qs5009VR.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qs5009VR.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4856 -ip 48561⤵PID:2912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50ecc8ab62b7278cc6650517251f1543c
SHA1b4273cda193a20d48e83241275ffc34ddad412f2
SHA256b0f1238e54ac8e3534af7ecb4f834bea3223120fedb1eab80f7a1bf00fb5b97a
SHA512c79d266c82b766ca39377fd02b3bc307fce4b59f53936e97c162200de3f8b3f72f6beda2aef2ab9ecd9be669b625c6ed0aaefa157cca7ac11d78b1939f660092
-
Filesize
358KB
MD5e652747f680b83df9d55a54202c41ba9
SHA134c6532805b962a8146bdd6168d154a3f62c2f8a
SHA256ea8495c7321dbad7107b7fbc3cb4e87664a754903b077bb8d376c1e51925fc58
SHA5121cc8f19d67218ba26ca1f8edf8a7154532bc91861a18e0a45e59b7ab69434f2e0feb627c2fe2b22a796dbdb06a446cec509f7f4415617efc29759620d2087414
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
342KB
MD5e3bbb6b3a43ecf667f53d7b9742b6a13
SHA1fc4a70044e9d79f58b855ca92994ebe505eb4a79
SHA256c4a443392b066ff953e7938ff6a0ec8aa581fb9159a0af88969096d7af2c59a5
SHA5120995518615570600e5732636965a3b236a3af97d5bbf354f58bfba045a53474a8126304e06dbc052a4ff2ba21e23efa86d11545eebcf48d34e6228775410f121