Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 23:11
Static task
static1
Behavioral task
behavioral1
Sample
7011b0c640e21d79fca606269bc809eb4d2c7dbf8fd61d679ed888a7b1fc13f5.exe
Resource
win10v2004-20241007-en
General
-
Target
7011b0c640e21d79fca606269bc809eb4d2c7dbf8fd61d679ed888a7b1fc13f5.exe
-
Size
662KB
-
MD5
1fa61762654317afa8ad834394448bf6
-
SHA1
8c1952aac3371180a5032db1f26d46b356664394
-
SHA256
7011b0c640e21d79fca606269bc809eb4d2c7dbf8fd61d679ed888a7b1fc13f5
-
SHA512
271f71f7e1b7197a4ddaba70f23072f82f3447f4f2938304a9181079b6bc919e48803748860bb7b7f6f42e73b2d79b5a54e913d9a28899738bccab2029179510
-
SSDEEP
12288:mMr9y906ymk68qV5C9+ly02bRnweKVmcxI8pa9QGoSDukv:7y7yV6/zy/bRM5I2/Goqrv
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2024-19-0x0000000001FC0000-0x0000000001FDA000-memory.dmp healer behavioral1/memory/2024-21-0x00000000023B0000-0x00000000023C8000-memory.dmp healer behavioral1/memory/2024-23-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/2024-49-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/2024-47-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/2024-45-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/2024-43-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/2024-41-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/2024-39-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/2024-37-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/2024-35-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/2024-33-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/2024-31-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/2024-29-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/2024-27-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/2024-25-0x00000000023B0000-0x00000000023C2000-memory.dmp healer behavioral1/memory/2024-22-0x00000000023B0000-0x00000000023C2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8254467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8254467.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8254467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8254467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8254467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8254467.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cb7-57.dat family_redline behavioral1/memory/1140-59-0x0000000000B40000-0x0000000000B70000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2520 v4948061.exe 2024 a8254467.exe 1140 b7674602.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8254467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8254467.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7011b0c640e21d79fca606269bc809eb4d2c7dbf8fd61d679ed888a7b1fc13f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4948061.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4072 2024 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4948061.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8254467.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7674602.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7011b0c640e21d79fca606269bc809eb4d2c7dbf8fd61d679ed888a7b1fc13f5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2024 a8254467.exe 2024 a8254467.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2024 a8254467.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2520 1456 7011b0c640e21d79fca606269bc809eb4d2c7dbf8fd61d679ed888a7b1fc13f5.exe 83 PID 1456 wrote to memory of 2520 1456 7011b0c640e21d79fca606269bc809eb4d2c7dbf8fd61d679ed888a7b1fc13f5.exe 83 PID 1456 wrote to memory of 2520 1456 7011b0c640e21d79fca606269bc809eb4d2c7dbf8fd61d679ed888a7b1fc13f5.exe 83 PID 2520 wrote to memory of 2024 2520 v4948061.exe 84 PID 2520 wrote to memory of 2024 2520 v4948061.exe 84 PID 2520 wrote to memory of 2024 2520 v4948061.exe 84 PID 2520 wrote to memory of 1140 2520 v4948061.exe 95 PID 2520 wrote to memory of 1140 2520 v4948061.exe 95 PID 2520 wrote to memory of 1140 2520 v4948061.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\7011b0c640e21d79fca606269bc809eb4d2c7dbf8fd61d679ed888a7b1fc13f5.exe"C:\Users\Admin\AppData\Local\Temp\7011b0c640e21d79fca606269bc809eb4d2c7dbf8fd61d679ed888a7b1fc13f5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4948061.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4948061.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8254467.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8254467.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 11004⤵
- Program crash
PID:4072
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7674602.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7674602.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2024 -ip 20241⤵PID:3864
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD5f1c68f5e3d78c56d872fad293c6b2395
SHA13caa81861c985ea00af182da25d74bb12ec34207
SHA25611e3edd4251869a9953d906b17a1497673e923b184040406c00ca29b64504dfd
SHA512fa0d6c99b7eb38fba0ade6ffe81fb0f8d38ee52f1c5f27acc6ef0beb0818334415c896e4024ecf5b1750be572ec1f57ae442ab950bed919ae9e99ae761a19d52
-
Filesize
315KB
MD5d7f1b55b011a549af04fb6dcc52dbda0
SHA10743e8eb0cf6e932b3de8530e35b020885adbcd1
SHA256ad125da38f9eb390bcbf613908039a2d26b00037873a5e4a6e132a1b56479c05
SHA512431c7e5b6cf4853447968eade8ddaa40e513c11c8ef8b9f1e8fd583091f0b6e2640a6e0f42028c4b97402dfe5d27233212510310d4903ba1beac5148690c2ea7
-
Filesize
168KB
MD5f8775213293e820b0e90cae9ed2748cf
SHA1015c0e89b55e8b1a7fbbdd56cdd52c54c8f38e01
SHA256ee1174cedf9f40b6bc63bc5702be469346ff32013c5de0c6f51e8c14ae94acac
SHA51267c00b3d1435e4a6af41377b9ce6fc892aa8a2bf77d40a037b12fba59b91fcaa962c7b5884cd56d37460f068552cb48a151f429b17b83c2a15978ce2aaa01d0b