Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
4b426510dda7d0e1dada35e1e3b5813c9717d7c8848b0034e402b88df64699bf.exe
Resource
win10v2004-20241007-en
General
-
Target
4b426510dda7d0e1dada35e1e3b5813c9717d7c8848b0034e402b88df64699bf.exe
-
Size
563KB
-
MD5
febd3e18ab923deefa502d29d994d770
-
SHA1
fb0605370ea46af5343a7b44a8ecce8f5389985a
-
SHA256
4b426510dda7d0e1dada35e1e3b5813c9717d7c8848b0034e402b88df64699bf
-
SHA512
75721628f19961feda2b85c93f4a9fb64f5495410fb3570322c141d8502785b825511d02c149cc0d96ecf02fcef79dabbbcfd7a2143d5a1678bc6c9bfd999f25
-
SSDEEP
12288:cy90o2F0XxpI23o4xI2QjLUutM0zbgjljXUC:cyzdBG239xI2Q3Uwwj/
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c79-12.dat healer behavioral1/memory/3472-15-0x0000000000160000-0x000000000016A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it911844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it911844.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it911844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it911844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it911844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it911844.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4556-22-0x00000000070F0000-0x000000000712C000-memory.dmp family_redline behavioral1/memory/4556-24-0x00000000071A0000-0x00000000071DA000-memory.dmp family_redline behavioral1/memory/4556-68-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-76-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-88-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-86-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-84-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-82-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-80-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-78-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-74-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-72-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-70-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-66-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-62-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-60-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-59-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-54-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-52-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-50-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-48-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-46-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-42-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-40-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-38-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-36-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-34-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-64-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-56-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-44-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-32-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-30-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-28-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-26-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4556-25-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2896 ziRw4832.exe 3472 it911844.exe 4556 kp789112.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it911844.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4b426510dda7d0e1dada35e1e3b5813c9717d7c8848b0034e402b88df64699bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziRw4832.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziRw4832.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp789112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b426510dda7d0e1dada35e1e3b5813c9717d7c8848b0034e402b88df64699bf.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3472 it911844.exe 3472 it911844.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3472 it911844.exe Token: SeDebugPrivilege 4556 kp789112.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5100 wrote to memory of 2896 5100 4b426510dda7d0e1dada35e1e3b5813c9717d7c8848b0034e402b88df64699bf.exe 83 PID 5100 wrote to memory of 2896 5100 4b426510dda7d0e1dada35e1e3b5813c9717d7c8848b0034e402b88df64699bf.exe 83 PID 5100 wrote to memory of 2896 5100 4b426510dda7d0e1dada35e1e3b5813c9717d7c8848b0034e402b88df64699bf.exe 83 PID 2896 wrote to memory of 3472 2896 ziRw4832.exe 84 PID 2896 wrote to memory of 3472 2896 ziRw4832.exe 84 PID 2896 wrote to memory of 4556 2896 ziRw4832.exe 101 PID 2896 wrote to memory of 4556 2896 ziRw4832.exe 101 PID 2896 wrote to memory of 4556 2896 ziRw4832.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b426510dda7d0e1dada35e1e3b5813c9717d7c8848b0034e402b88df64699bf.exe"C:\Users\Admin\AppData\Local\Temp\4b426510dda7d0e1dada35e1e3b5813c9717d7c8848b0034e402b88df64699bf.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRw4832.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRw4832.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it911844.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it911844.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp789112.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp789112.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD5a5edd6fd7b08e99d0c77662b2ce65307
SHA164853db775299a6d3a4050242f41f7170642cadc
SHA256bdadbc60654aee9fc889a4d10b0f80b00d5af5e1b12971c20751a2df442ffb6e
SHA512137f56e095253ecc0c7a0422b73abe5899c69644fadc32e06cc7e73c4715684f454a972940e1fc546635938e58d0619dfad6a8d4ab5dd3c069b199b7003ca0f9
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
359KB
MD5c0c860f8f68a88556d1f93cb84e6ac25
SHA187abc795c2914c36b6243ebafe906c519cd7dae0
SHA256d5a133db734cf22eee12f577044325b8901f329ebc1daf65357d163713cbbe57
SHA512815e45226a39a5b9b2ef0a19944f186a4b325540903b950bc043590de72fa87a1cc4a2cdad6b18f3719396ff902736048dcb3c46528409dc851e27b781ecffbb