Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 04:55
Static task
static1
Behavioral task
behavioral1
Sample
6219dd9e450c07bee0e7b33dcf5893b4913460066a404d8b2673810ce3000c64.exe
Resource
win10v2004-20241007-en
General
-
Target
6219dd9e450c07bee0e7b33dcf5893b4913460066a404d8b2673810ce3000c64.exe
-
Size
1.5MB
-
MD5
3c241d63bf293d4054b79996230137c3
-
SHA1
1f842813eaab4e10e1bb0c04414985534c977fc9
-
SHA256
6219dd9e450c07bee0e7b33dcf5893b4913460066a404d8b2673810ce3000c64
-
SHA512
4d5379ecb24dc9ff4d9469da8d7c2032b29f60a76fa5a2ecea805e9060524bff5d4002eef5161c0c473776e63891c4d98e1107e97acc8f7b03faabca9bc7b550
-
SSDEEP
24576:pyrTokxRqObcCOieF6paevRBvQznZInXnsc9u/mzuZZu7GHYcO0PBa1Jf8+:cQkxXcCHfEe8znKXnhu+u8WY1M+B8
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1956-36-0x0000000002700000-0x000000000271A000-memory.dmp healer behavioral1/memory/1956-38-0x00000000027A0000-0x00000000027B8000-memory.dmp healer behavioral1/memory/1956-66-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/1956-64-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/1956-62-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/1956-60-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/1956-59-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/1956-56-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/1956-54-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/1956-52-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/1956-50-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/1956-48-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/1956-46-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/1956-44-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/1956-42-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/1956-40-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/1956-39-0x00000000027A0000-0x00000000027B2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5714722.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5714722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5714722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5714722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5714722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5714722.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023ca8-71.dat family_redline behavioral1/memory/3288-73-0x00000000005F0000-0x0000000000620000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 3756 v4018726.exe 4024 v7973993.exe 1424 v4640015.exe 3528 v6405070.exe 1956 a5714722.exe 3288 b8078636.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5714722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5714722.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4640015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v6405070.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6219dd9e450c07bee0e7b33dcf5893b4913460066a404d8b2673810ce3000c64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4018726.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7973993.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3240 1956 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8078636.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6219dd9e450c07bee0e7b33dcf5893b4913460066a404d8b2673810ce3000c64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4018726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v7973993.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4640015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6405070.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5714722.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1956 a5714722.exe 1956 a5714722.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1956 a5714722.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1692 wrote to memory of 3756 1692 6219dd9e450c07bee0e7b33dcf5893b4913460066a404d8b2673810ce3000c64.exe 83 PID 1692 wrote to memory of 3756 1692 6219dd9e450c07bee0e7b33dcf5893b4913460066a404d8b2673810ce3000c64.exe 83 PID 1692 wrote to memory of 3756 1692 6219dd9e450c07bee0e7b33dcf5893b4913460066a404d8b2673810ce3000c64.exe 83 PID 3756 wrote to memory of 4024 3756 v4018726.exe 86 PID 3756 wrote to memory of 4024 3756 v4018726.exe 86 PID 3756 wrote to memory of 4024 3756 v4018726.exe 86 PID 4024 wrote to memory of 1424 4024 v7973993.exe 87 PID 4024 wrote to memory of 1424 4024 v7973993.exe 87 PID 4024 wrote to memory of 1424 4024 v7973993.exe 87 PID 1424 wrote to memory of 3528 1424 v4640015.exe 89 PID 1424 wrote to memory of 3528 1424 v4640015.exe 89 PID 1424 wrote to memory of 3528 1424 v4640015.exe 89 PID 3528 wrote to memory of 1956 3528 v6405070.exe 90 PID 3528 wrote to memory of 1956 3528 v6405070.exe 90 PID 3528 wrote to memory of 1956 3528 v6405070.exe 90 PID 3528 wrote to memory of 3288 3528 v6405070.exe 101 PID 3528 wrote to memory of 3288 3528 v6405070.exe 101 PID 3528 wrote to memory of 3288 3528 v6405070.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\6219dd9e450c07bee0e7b33dcf5893b4913460066a404d8b2673810ce3000c64.exe"C:\Users\Admin\AppData\Local\Temp\6219dd9e450c07bee0e7b33dcf5893b4913460066a404d8b2673810ce3000c64.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4018726.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4018726.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7973993.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7973993.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4640015.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4640015.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6405070.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6405070.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5714722.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5714722.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 10847⤵
- Program crash
PID:3240
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8078636.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8078636.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3288
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1956 -ip 19561⤵PID:1724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5d0467cdee937f3b01520bcdf2c2f46ac
SHA13896c58a88eb58e86be4662b29134ec80cb7dbe0
SHA2569525753104ffa7d9bc93f1c83eb1da41d0c497448d9c6a8151a63c3504e548d5
SHA512df4fa78bd3eafb4f789548380aeb73fdd262cd6099d82cb09422eb0e1923c4292d839955d8e3c7720c1c050706c14b8197f239cba54d2056e0a7ef6f07564c94
-
Filesize
915KB
MD5479c7b5e46d854c520965d98b294981d
SHA1d5665a5afc08dbcad14eb20a86038c6edb02b855
SHA256c592a5c94eccec562c933f917e099e5e463fceaf3cc65476fa047bdf173c54d9
SHA51240b60b2fa4059538145b945b177ef30e16518d385e0c92b3789542a0f4f452d89853c65aa28c9ed0e41a08ebfcec3c48b11cf81bdc04044118e22b771a558a7c
-
Filesize
711KB
MD5e2ea7baf36f4c8138588198eb482cd27
SHA1663a4e168f563f657390a70a7c74bfdd271cec05
SHA256b3c4b164651179a95edfb9759c74259238d02049f626be3c3bdd820483395431
SHA5123a6fee68f9ff2f549beba0ffa05591e4d73280a81dd620364098d96e39f9365312b2cc47059808af06f458846e45f610cc9e0786ed2b96511229a3e2f37d7759
-
Filesize
416KB
MD5be8a0e73fbeec214071e9ad411226258
SHA1c2c8aea7ee77c367017322da82bb66414a3d12ae
SHA256648c81134262d2888f8d30f9bcd2f0163aad464251dc5b33034905858949185b
SHA512bdd920343ce322a58529f4395ee236b781f3ce9a1c7a34c41a489c71b6db909220a66275469a1b060a6643d7c5c4848b3c81ee2e0b36c3bcc4aab100903d5595
-
Filesize
360KB
MD58522c984061098c1da961ae848e17f18
SHA186bec4ccc9a1248e58cbefabcac84bfee520f2e0
SHA25666aa10f7ecc7075800ecde2e877b1340a0b998d286ae59daf678a4e83f416f59
SHA5124652a79a726e803dfe0c26169eedeced72a8c224c9b9d02afd40b12dd716623de8e37853de546e56ffc4be8bf6bfcc8e83d2eb4f639e927ddbc2d075aaeadd59
-
Filesize
168KB
MD5194c6565de3877c870a7f3b6dd07fee8
SHA192d296ad375ad897d1226948fb53e8c661d1acba
SHA2564c4366cb24d1cf96085ad4182f67df71765265027e5b3be09bca9aecef7c0804
SHA512621129c9b5d2bef9143cdf6723009ac71baa88fe6d5bff8e4aa6e5ffe97204996f5187f3845741d8a508e7dbaf458bab1f969a2cea6b0b878b4142efaef14760