Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
b40ddde329637a796b0c17f5804384341ee9a7a58145a8ad3308b2e8ece83f43.exe
Resource
win10v2004-20241007-en
General
-
Target
b40ddde329637a796b0c17f5804384341ee9a7a58145a8ad3308b2e8ece83f43.exe
-
Size
480KB
-
MD5
da1cc1c78eac047a2f7c5d90439ff257
-
SHA1
d95e213ff9e2ead10a2dbff2b6724d66d45821c8
-
SHA256
b40ddde329637a796b0c17f5804384341ee9a7a58145a8ad3308b2e8ece83f43
-
SHA512
92b45f8967ed052d1231580bff233928be082a9c83aeb08df0ce792d03cd779994ea6c5523dbc919fe8dbdb1ecdc44548907a0c2ac1729067737ff44599e1b95
-
SSDEEP
6144:K9y+bnr+Kp0yN90QEf6msjeWEvZZIVTQcWw7rtumjGYy+noibNwoU3JQ1xQzZmZp:TMrCy90M7MI2sxumbloQxWoIM
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4736-15-0x0000000002470000-0x000000000248A000-memory.dmp healer behavioral1/memory/4736-18-0x00000000024C0000-0x00000000024D8000-memory.dmp healer behavioral1/memory/4736-38-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4736-46-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4736-44-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4736-48-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4736-42-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4736-40-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4736-36-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4736-34-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4736-32-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4736-26-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4736-24-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4736-22-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4736-21-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4736-30-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4736-28-0x00000000024C0000-0x00000000024D2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4473953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4473953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4473953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4473953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4473953.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k4473953.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c99-54.dat family_redline behavioral1/memory/2136-56-0x0000000000D30000-0x0000000000D5E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2844 y8275696.exe 4736 k4473953.exe 2136 l8683612.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k4473953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k4473953.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b40ddde329637a796b0c17f5804384341ee9a7a58145a8ad3308b2e8ece83f43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8275696.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k4473953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l8683612.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b40ddde329637a796b0c17f5804384341ee9a7a58145a8ad3308b2e8ece83f43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y8275696.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4736 k4473953.exe 4736 k4473953.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4736 k4473953.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1088 wrote to memory of 2844 1088 b40ddde329637a796b0c17f5804384341ee9a7a58145a8ad3308b2e8ece83f43.exe 85 PID 1088 wrote to memory of 2844 1088 b40ddde329637a796b0c17f5804384341ee9a7a58145a8ad3308b2e8ece83f43.exe 85 PID 1088 wrote to memory of 2844 1088 b40ddde329637a796b0c17f5804384341ee9a7a58145a8ad3308b2e8ece83f43.exe 85 PID 2844 wrote to memory of 4736 2844 y8275696.exe 87 PID 2844 wrote to memory of 4736 2844 y8275696.exe 87 PID 2844 wrote to memory of 4736 2844 y8275696.exe 87 PID 2844 wrote to memory of 2136 2844 y8275696.exe 95 PID 2844 wrote to memory of 2136 2844 y8275696.exe 95 PID 2844 wrote to memory of 2136 2844 y8275696.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b40ddde329637a796b0c17f5804384341ee9a7a58145a8ad3308b2e8ece83f43.exe"C:\Users\Admin\AppData\Local\Temp\b40ddde329637a796b0c17f5804384341ee9a7a58145a8ad3308b2e8ece83f43.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8275696.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8275696.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4473953.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4473953.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8683612.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8683612.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2136
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD57608f5ae337a89e6dadd9fd62177a2b5
SHA1f80482685725e34b10d6c66a786316f1bd50a4da
SHA25639672b0e26e4564debe47e8fd29721b993bd0d84278363d98a853d3c670120de
SHA51294fac122e55fa1219a963ae781b1c11d790bf38e427332599a6e79bdc2b09cf74d780539bb82f22bbcff8670effd967ba4f4571197babf82f5eb3d88242d40af
-
Filesize
176KB
MD55ca167bacd561bd6ebfc5c260ee689cb
SHA179490b9137dad1ebdff0ca272be58a82a274c471
SHA256dbaabdb4841f82b1ef0b923cbc021788459298d746757af8e597feae7382cc2e
SHA5120267e2c5993665471e03195df02025d2c26e222de081c863c9173746a543f8370325767dc4d96d2d0ea7ac39376e99e2f88fd9aa96f60c193f09665a2851c802
-
Filesize
168KB
MD5aff4c3c718078930eb822a31fe6e8094
SHA183b0ddd024f9384cb3b0cfc5537aa86056b3e44d
SHA256bfe524f59333ae77b52232740060c639e3948345035627c16eea510cab56161a
SHA51296d800a001f109f40ea000cd653171707142a19874e9cd08d68eb6853cdb0b88dcd46c539b6b3b8874b01be5981f717792560cde92537be7bedc61a5d2464088