Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 04:42
Static task
static1
Behavioral task
behavioral1
Sample
d3c5623d2644a566148b8174d5d9cf20bd47414ed6cace85fbc0b066059385c5.exe
Resource
win10v2004-20241007-en
General
-
Target
d3c5623d2644a566148b8174d5d9cf20bd47414ed6cace85fbc0b066059385c5.exe
-
Size
479KB
-
MD5
c78340d8c9abd6a241c84c8a99ddc3fa
-
SHA1
aa92bc4f0be431c73cdaa7ee9a1a909c3e459d80
-
SHA256
d3c5623d2644a566148b8174d5d9cf20bd47414ed6cace85fbc0b066059385c5
-
SHA512
1297be28425635b422fcbc396b35da228e10dd1b83f6d9d710d923eb40de41013d72ff373d67f69b0fea76b640c36cbdc97308e7af211237f77f6f81009fb396
-
SSDEEP
12288:8MrUy90Fs3TZ6RCNY0x95fr0gZwnfLfGkMFqOKH3ht:gyws3TkCN7x9ujD7oKXb
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2216-15-0x0000000002130000-0x000000000214A000-memory.dmp healer behavioral1/memory/2216-19-0x00000000021C0000-0x00000000021D8000-memory.dmp healer behavioral1/memory/2216-46-0x00000000021C0000-0x00000000021D2000-memory.dmp healer behavioral1/memory/2216-48-0x00000000021C0000-0x00000000021D2000-memory.dmp healer behavioral1/memory/2216-44-0x00000000021C0000-0x00000000021D2000-memory.dmp healer behavioral1/memory/2216-42-0x00000000021C0000-0x00000000021D2000-memory.dmp healer behavioral1/memory/2216-40-0x00000000021C0000-0x00000000021D2000-memory.dmp healer behavioral1/memory/2216-38-0x00000000021C0000-0x00000000021D2000-memory.dmp healer behavioral1/memory/2216-36-0x00000000021C0000-0x00000000021D2000-memory.dmp healer behavioral1/memory/2216-34-0x00000000021C0000-0x00000000021D2000-memory.dmp healer behavioral1/memory/2216-32-0x00000000021C0000-0x00000000021D2000-memory.dmp healer behavioral1/memory/2216-30-0x00000000021C0000-0x00000000021D2000-memory.dmp healer behavioral1/memory/2216-28-0x00000000021C0000-0x00000000021D2000-memory.dmp healer behavioral1/memory/2216-26-0x00000000021C0000-0x00000000021D2000-memory.dmp healer behavioral1/memory/2216-24-0x00000000021C0000-0x00000000021D2000-memory.dmp healer behavioral1/memory/2216-22-0x00000000021C0000-0x00000000021D2000-memory.dmp healer behavioral1/memory/2216-21-0x00000000021C0000-0x00000000021D2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2148669.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2148669.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2148669.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k2148669.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2148669.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2148669.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c84-54.dat family_redline behavioral1/memory/2992-56-0x0000000000650000-0x0000000000680000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3712 y2517509.exe 2216 k2148669.exe 2992 l3173278.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2148669.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2148669.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d3c5623d2644a566148b8174d5d9cf20bd47414ed6cace85fbc0b066059385c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2517509.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y2517509.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k2148669.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l3173278.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3c5623d2644a566148b8174d5d9cf20bd47414ed6cace85fbc0b066059385c5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2216 k2148669.exe 2216 k2148669.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2216 k2148669.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2116 wrote to memory of 3712 2116 d3c5623d2644a566148b8174d5d9cf20bd47414ed6cace85fbc0b066059385c5.exe 83 PID 2116 wrote to memory of 3712 2116 d3c5623d2644a566148b8174d5d9cf20bd47414ed6cace85fbc0b066059385c5.exe 83 PID 2116 wrote to memory of 3712 2116 d3c5623d2644a566148b8174d5d9cf20bd47414ed6cace85fbc0b066059385c5.exe 83 PID 3712 wrote to memory of 2216 3712 y2517509.exe 84 PID 3712 wrote to memory of 2216 3712 y2517509.exe 84 PID 3712 wrote to memory of 2216 3712 y2517509.exe 84 PID 3712 wrote to memory of 2992 3712 y2517509.exe 101 PID 3712 wrote to memory of 2992 3712 y2517509.exe 101 PID 3712 wrote to memory of 2992 3712 y2517509.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3c5623d2644a566148b8174d5d9cf20bd47414ed6cace85fbc0b066059385c5.exe"C:\Users\Admin\AppData\Local\Temp\d3c5623d2644a566148b8174d5d9cf20bd47414ed6cace85fbc0b066059385c5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2517509.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2517509.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2148669.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2148669.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3173278.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3173278.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2992
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD51115cbc8b35fddaf9f78eff09637b691
SHA1c1b9523a558c034a46e4021b95f6bc202039392a
SHA2562ae0881b67189e0011c1fc9ec92d55b484e2f597bd84764149901cc534a0c1f2
SHA512fd7ec3d8d52d1614888f65e3a1fac1e6fb8bb70bac07a3cb1da15ac3b70a292fb925370f9def95e626fe1ebf2f769e684cb649546a56b715ee7cc8745df9a38b
-
Filesize
180KB
MD556121f30a7af6beb3c890a1619a794d6
SHA1922672e56bb15acdbe4a2d074efb62ee340b5808
SHA256910684b6f4cf26581e031778e7eb7b90ce832be2493f88f491c5a6e2c023f502
SHA5124f2bc406a8a6394898984a8894f49d42d607157d35ea885cac09b72f7fc8ac2d78386128d7074db14d28d943cb973aee43f7e5bb7306ee7b60b1169ded327cde
-
Filesize
168KB
MD54ef94e5e7e34873a15e5e11f554444ee
SHA1742d52adfcacaa9dcb3b01c7180921c58a04102d
SHA2569475e052ec86ab57f42f42db550b37c5bf1615fc71c3b71e3e4499c81937fb5b
SHA5125fbe5fc7357c36b5e17166b2a08ea9d3e342bc4ce616f67e8a1a9535237ce5eba85d50524b3e20e912b1013f6b7763ebbc58a670769b1ad1b2f2cc4f09ef9647