Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
7b6b5519e9035d4dcbe2f452ece6c81dc6d1668e6dfa3b479871176dc4a5f6f4.exe
Resource
win10v2004-20241007-en
General
-
Target
7b6b5519e9035d4dcbe2f452ece6c81dc6d1668e6dfa3b479871176dc4a5f6f4.exe
-
Size
1.5MB
-
MD5
c25534cce0573ec5a557ac63b6e535bb
-
SHA1
5306ed3a3760e87ad69928b6d7f62f9191514833
-
SHA256
7b6b5519e9035d4dcbe2f452ece6c81dc6d1668e6dfa3b479871176dc4a5f6f4
-
SHA512
0f4b982d75782404810feb3516ad5918b64b3fdd88d001305cf99d167e6a6ba20479e9e16ec674652c2983d4158dcf2ca903e9a6c0568fd94d242ad66ddcbed4
-
SSDEEP
24576:SylsdYbTznSk0HKjOM3/5IdYtVcTKxWcE4Flo6PTyEbNkCXiUd:5lVGTu5fKTKU740IyEZ1
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2080-36-0x00000000025D0000-0x00000000025EA000-memory.dmp healer behavioral1/memory/2080-38-0x0000000002830000-0x0000000002848000-memory.dmp healer behavioral1/memory/2080-60-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2080-66-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2080-64-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2080-62-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2080-59-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2080-56-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2080-55-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2080-52-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2080-50-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2080-48-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2080-46-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2080-44-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2080-42-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2080-40-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/2080-39-0x0000000002830000-0x0000000002842000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a1356055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1356055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1356055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1356055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1356055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1356055.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023ccb-72.dat family_redline behavioral1/memory/2092-73-0x00000000005E0000-0x0000000000610000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 3296 v9228233.exe 2016 v6184766.exe 4392 v3207199.exe 4232 v2642664.exe 2080 a1356055.exe 2092 b0051285.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1356055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1356055.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3207199.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v2642664.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7b6b5519e9035d4dcbe2f452ece6c81dc6d1668e6dfa3b479871176dc4a5f6f4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9228233.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6184766.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 872 2080 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1356055.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0051285.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b6b5519e9035d4dcbe2f452ece6c81dc6d1668e6dfa3b479871176dc4a5f6f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v9228233.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6184766.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3207199.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2642664.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2080 a1356055.exe 2080 a1356055.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2080 a1356055.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 864 wrote to memory of 3296 864 7b6b5519e9035d4dcbe2f452ece6c81dc6d1668e6dfa3b479871176dc4a5f6f4.exe 83 PID 864 wrote to memory of 3296 864 7b6b5519e9035d4dcbe2f452ece6c81dc6d1668e6dfa3b479871176dc4a5f6f4.exe 83 PID 864 wrote to memory of 3296 864 7b6b5519e9035d4dcbe2f452ece6c81dc6d1668e6dfa3b479871176dc4a5f6f4.exe 83 PID 3296 wrote to memory of 2016 3296 v9228233.exe 84 PID 3296 wrote to memory of 2016 3296 v9228233.exe 84 PID 3296 wrote to memory of 2016 3296 v9228233.exe 84 PID 2016 wrote to memory of 4392 2016 v6184766.exe 85 PID 2016 wrote to memory of 4392 2016 v6184766.exe 85 PID 2016 wrote to memory of 4392 2016 v6184766.exe 85 PID 4392 wrote to memory of 4232 4392 v3207199.exe 87 PID 4392 wrote to memory of 4232 4392 v3207199.exe 87 PID 4392 wrote to memory of 4232 4392 v3207199.exe 87 PID 4232 wrote to memory of 2080 4232 v2642664.exe 88 PID 4232 wrote to memory of 2080 4232 v2642664.exe 88 PID 4232 wrote to memory of 2080 4232 v2642664.exe 88 PID 4232 wrote to memory of 2092 4232 v2642664.exe 101 PID 4232 wrote to memory of 2092 4232 v2642664.exe 101 PID 4232 wrote to memory of 2092 4232 v2642664.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b6b5519e9035d4dcbe2f452ece6c81dc6d1668e6dfa3b479871176dc4a5f6f4.exe"C:\Users\Admin\AppData\Local\Temp\7b6b5519e9035d4dcbe2f452ece6c81dc6d1668e6dfa3b479871176dc4a5f6f4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9228233.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9228233.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6184766.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6184766.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3207199.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3207199.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2642664.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2642664.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1356055.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1356055.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 10887⤵
- Program crash
PID:872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0051285.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0051285.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2092
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2080 -ip 20801⤵PID:1520
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5e44efca51331adb3458dfda5f1e5eb50
SHA1b6104eb0a17c71fc07b526a2b7b33a1ec341c3c0
SHA2564f3475b7b25e2071b22881804b3e2075885ade8d16134095e99bd716275c6c0d
SHA512e11fb88c52e38ac91652fa1efa7b1a96e65ffc561ff040612d5a030efec00518b764bc31070d8418e161b87cef8fb4a461f1559e948b9d7630d4a3cca273295f
-
Filesize
915KB
MD58217c4e6e394d51bcdc51860b7e06a17
SHA1611f2d23a2c16d945068a1d0ad23573e8673f0e7
SHA256cff99385e8985a1a483f4c89057360b9478ef54ba3bc04636029fd365914c010
SHA5125b5c026afef7283f748fd4a3946a5d85906fda08b6763b58eae07241effcc105d701f514b2731a947df861d06c4e111f8b1ac2a9d7d89e27d9c3d9947f53f65c
-
Filesize
711KB
MD554bc5fdfa23c18286783474905a059d9
SHA189830f02a949ebf0c64eafbc94d3b5fada92d941
SHA256891d1d4f2d539592f6a2d39e29e035d5288fbcf8b370546ad441a64a371bc230
SHA512c7cf3fa2b8487f2974a66b36f4f26a9bf50a19c8bc39f51a518e44ab424792e3b83d7506f35d20b5b6784ca2317c910dccb05be76501c076a9e681cb4c94ed21
-
Filesize
415KB
MD5fc5a8b2adcd9c4bdf3dc3858c3377599
SHA1244b5e1287b982a71a83108d8fe4b3e1da8f5db9
SHA2565219adccbd4a0e5c91d42a726a47f807fe2be3ed66c7e599069c1a0a9353fa5f
SHA5128f44492a4f1e540e7c9031dabcf7de9a0ebec2ccc4426b6472fcac516447faf9e39c3ce80685a0e3d0d03ad2f9c5ca2c6a67d246fe7039e1c4643074798f2f26
-
Filesize
360KB
MD58fb5674a314713fac5dcbe096b5cf726
SHA1f14d9fad0c9650cd88238e6947356a74c13bea42
SHA256371918bdad6325241f507f7324c2f06cb54d20fcf1e1096e1caebbd4eccde1f5
SHA512d0f899e81b10d76d70031ccfd4d04089fe4772b325845abeb6aa0abcf85c4fdb4508285e024c55ceb996d98911a531955d41739a9b8be99a63274889d9dd7adb
-
Filesize
168KB
MD5ec061b347069bdcee68ac094e5ef6947
SHA1587cc9373b5f7b6e96aea241bc0bd884861ace32
SHA256f64edbe8f86d9645d8c0490b92a40f5cb18f7c687f98bba19e105f3b2bb995aa
SHA512c98719c305e623b9fb49300ae90301a0eb05648ee2681d77954ecdb5048e48cfcaa0e35603cb9299da8cf10a61e3601f5880761562ef24be94f1fad2fe4b8e5e