Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:50
Static task
static1
Behavioral task
behavioral1
Sample
4a9194be60280415f9a582a8ad20c88b73aeb40040723882d81f3a3311bbc1df.exe
Resource
win10v2004-20241007-en
General
-
Target
4a9194be60280415f9a582a8ad20c88b73aeb40040723882d81f3a3311bbc1df.exe
-
Size
479KB
-
MD5
9c1c65568112376e748a5faab83c3809
-
SHA1
1e9963ab8c1b8743e4bf14f8ebeee29dc13e9c17
-
SHA256
4a9194be60280415f9a582a8ad20c88b73aeb40040723882d81f3a3311bbc1df
-
SHA512
4f6c901b3274015fb4c8822dda8ded4d200e283a938b6bb058767b1e046017f38f618c0f7083ab39a79a2098cf4cf80a65bf2ae80135fb636a2a37c20742616c
-
SSDEEP
12288:tMrey90dK2YdcycZ1XoAaDnOXeltsvffaNmO6EGZ3takx:HyQKXnk1XoAaSX0MfvOGZ38kx
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/448-15-0x00000000022B0000-0x00000000022CA000-memory.dmp healer behavioral1/memory/448-18-0x0000000004980000-0x0000000004998000-memory.dmp healer behavioral1/memory/448-28-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/448-48-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/448-46-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/448-44-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/448-42-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/448-40-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/448-38-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/448-36-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/448-34-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/448-32-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/448-30-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/448-26-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/448-24-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/448-22-0x0000000004980000-0x0000000004992000-memory.dmp healer behavioral1/memory/448-21-0x0000000004980000-0x0000000004992000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k0461320.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0461320.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0461320.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0461320.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0461320.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0461320.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cb7-54.dat family_redline behavioral1/memory/832-56-0x0000000000770000-0x00000000007A0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1300 y3591852.exe 448 k0461320.exe 832 l9132869.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k0461320.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0461320.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a9194be60280415f9a582a8ad20c88b73aeb40040723882d81f3a3311bbc1df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3591852.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a9194be60280415f9a582a8ad20c88b73aeb40040723882d81f3a3311bbc1df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y3591852.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k0461320.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l9132869.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 448 k0461320.exe 448 k0461320.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 448 k0461320.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4432 wrote to memory of 1300 4432 4a9194be60280415f9a582a8ad20c88b73aeb40040723882d81f3a3311bbc1df.exe 83 PID 4432 wrote to memory of 1300 4432 4a9194be60280415f9a582a8ad20c88b73aeb40040723882d81f3a3311bbc1df.exe 83 PID 4432 wrote to memory of 1300 4432 4a9194be60280415f9a582a8ad20c88b73aeb40040723882d81f3a3311bbc1df.exe 83 PID 1300 wrote to memory of 448 1300 y3591852.exe 84 PID 1300 wrote to memory of 448 1300 y3591852.exe 84 PID 1300 wrote to memory of 448 1300 y3591852.exe 84 PID 1300 wrote to memory of 832 1300 y3591852.exe 94 PID 1300 wrote to memory of 832 1300 y3591852.exe 94 PID 1300 wrote to memory of 832 1300 y3591852.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a9194be60280415f9a582a8ad20c88b73aeb40040723882d81f3a3311bbc1df.exe"C:\Users\Admin\AppData\Local\Temp\4a9194be60280415f9a582a8ad20c88b73aeb40040723882d81f3a3311bbc1df.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3591852.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3591852.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0461320.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0461320.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9132869.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9132869.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:832
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5cab9e8cdda709a69ea0a9c9ed7f7ec82
SHA1eb4af60588218283ae396e49e69151e8d19a1b4f
SHA256e620f91abae2938fc8d1c988979fd06c5f3712acd5a0e10725ef4ef59f3acf08
SHA51287b316ea030803b66ccc0e762fa440532b0b08de3bd9d7aa13bbc904be05e4a3694e4b9c1219d8d5971da4882a338052e64be6fe561f51d12c33cea7865889be
-
Filesize
180KB
MD586dbe72c44c75e20a7d26ce7e04bc549
SHA195c4eb58761f21e03edf8d9427f2874eeb4f75b0
SHA2560e09646d0956b86f9e07a57c6923405989a63281b8fdc094a6cfafdd397a8b9f
SHA5127630c6069733bab44f730884bcafc52fb97422455037a58a7a391848ed8bbe3729f8495d7fddd55041e75d7471dfeef45310dfb0d52410760595e6d6338b7d32
-
Filesize
168KB
MD5c1ed5584b42b33e86787d2c20472e373
SHA139bf56f311eea1264526f668d0637b0fe65e8b03
SHA256060e825f89a45615251381b2bf396d6cbe05ca3b0b2ab16d5fc5a37cbb48309c
SHA51270e73b6da3e5058a6efdf0132eea3c188b0cc7f96be0bc3ea9b0a2189fceaaaeeb5448b8a6ef96be1231ee961e6320d510755d8d078d3ebd971d5f581f82a2a8