Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
a0c1f17728201ddafb283d1665742883370847a4d5e09406f0015b5d496a0d46.exe
Resource
win10v2004-20241007-en
General
-
Target
a0c1f17728201ddafb283d1665742883370847a4d5e09406f0015b5d496a0d46.exe
-
Size
711KB
-
MD5
cbad7881812af0a19892b86fbabc21e6
-
SHA1
44a357f369e14352cab460dc854201d561df5f31
-
SHA256
a0c1f17728201ddafb283d1665742883370847a4d5e09406f0015b5d496a0d46
-
SHA512
228b4706592fb7d89f86a7d0981836a457d851d7e3140b32d38a5d27d7ed3a86e3855b5e45df1181557476f8787122e84a8e99e10f0ad1b33297e1f1cda3d734
-
SSDEEP
12288:SMr0y90Ky6EE5noOHwtFWMhIBmZUfPE4uz3AMg5v7aq8hXgFQ:ayEgnyWCIBmqPCjAP5v7aqsgFQ
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1748-19-0x0000000002640000-0x000000000265A000-memory.dmp healer behavioral1/memory/1748-21-0x0000000002820000-0x0000000002838000-memory.dmp healer behavioral1/memory/1748-45-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1748-49-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1748-47-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1748-43-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1748-41-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1748-40-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1748-37-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1748-35-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1748-33-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1748-31-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1748-29-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1748-27-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1748-25-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1748-23-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1748-22-0x0000000002820000-0x0000000002832000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3587666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3587666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3587666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3587666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3587666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3587666.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b9b-57.dat family_redline behavioral1/memory/4408-59-0x0000000000C20000-0x0000000000C50000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 540 v3607407.exe 1748 a3587666.exe 4408 b2621950.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3587666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3587666.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a0c1f17728201ddafb283d1665742883370847a4d5e09406f0015b5d496a0d46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3607407.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1648 1748 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0c1f17728201ddafb283d1665742883370847a4d5e09406f0015b5d496a0d46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v3607407.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3587666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2621950.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1748 a3587666.exe 1748 a3587666.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1748 a3587666.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1672 wrote to memory of 540 1672 a0c1f17728201ddafb283d1665742883370847a4d5e09406f0015b5d496a0d46.exe 83 PID 1672 wrote to memory of 540 1672 a0c1f17728201ddafb283d1665742883370847a4d5e09406f0015b5d496a0d46.exe 83 PID 1672 wrote to memory of 540 1672 a0c1f17728201ddafb283d1665742883370847a4d5e09406f0015b5d496a0d46.exe 83 PID 540 wrote to memory of 1748 540 v3607407.exe 85 PID 540 wrote to memory of 1748 540 v3607407.exe 85 PID 540 wrote to memory of 1748 540 v3607407.exe 85 PID 540 wrote to memory of 4408 540 v3607407.exe 95 PID 540 wrote to memory of 4408 540 v3607407.exe 95 PID 540 wrote to memory of 4408 540 v3607407.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0c1f17728201ddafb283d1665742883370847a4d5e09406f0015b5d496a0d46.exe"C:\Users\Admin\AppData\Local\Temp\a0c1f17728201ddafb283d1665742883370847a4d5e09406f0015b5d496a0d46.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3607407.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3607407.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3587666.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3587666.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 10804⤵
- Program crash
PID:1648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2621950.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2621950.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1748 -ip 17481⤵PID:2884
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD5da9351d9cde09d3d48af159a04e07e39
SHA155b8dce09b41afbdaada9fc7acac58b4a9f2ef01
SHA2561a4e70f541f2f8f68be3d2e9767a235e450726182d1792022524ac332b91a958
SHA512d0b222492fd768f346ed93da72a476fcf432aa9dca02351c146bbd2446b387ef42ef9d2aebb62703f9315301c7ff094a6baf4991d4d641841f3d462ae0fc3ed0
-
Filesize
360KB
MD5761aefd42de18bd403f0bdb43fd17086
SHA10c8fdf3540cace65d682ed5418bb1c9b316ed3d3
SHA256d822ddaa8b918f118bab14035e6f31e77c976a628841fce1cdfa600ec50a940a
SHA5125ffad12edd9ec55c2b7de91e213d404882d525e0a10552b4ceca4508bc6098e35a5658c87924e5025f219d35911dd4abe9d2ebdc58f1561f2150b51e75d2c364
-
Filesize
168KB
MD52f152e04a53df1adecec11f01a1ec586
SHA1ec11267d67644fe59152db1178ad932b78af5292
SHA256c7e2dc08570d88f57589392f948f29cbedfd40c8f5d8290d336c51f279d44ec1
SHA5128924fc4f6a8a02c5897a8226f675ff2d76e0cf76709103026526ad1e0951de0f451cae7ff13adb15b7f58fc6be3b88eed8d2a97551f539357dde82f93c6053fe