Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45.exe
Resource
win10v2004-20241007-en
General
-
Target
0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45.exe
-
Size
594KB
-
MD5
032d79225acbd1031400de9102874f7d
-
SHA1
64e51beccb0d4db3341303cb8e59e1ad0a480043
-
SHA256
0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45
-
SHA512
072687df6c3bde38eb90732cb878b2ff4989f9512911d8636a4e3329cb26e7b2bb3a8220e934765ead45a8f86bc64863dc949c00c4bc27bd6023f94db2d6b8c0
-
SSDEEP
12288:Iy90w5Y4/A7f0FRqTzlWtQvNf236EVlbApMRg:Iyl6YFRqdqJ36EbNg
Malware Config
Extracted
redline
maza
185.161.248.73:4164
-
auth_value
474d54c1c2f5291290c53f8378acd684
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4940-15-0x0000000002170000-0x000000000218A000-memory.dmp healer behavioral1/memory/4940-19-0x0000000004AC0000-0x0000000004AD8000-memory.dmp healer behavioral1/memory/4940-48-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4940-46-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4940-44-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4940-42-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4940-40-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4940-38-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4940-36-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4940-34-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4940-32-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4940-30-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4940-28-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4940-26-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4940-24-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4940-22-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4940-21-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a36622036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a36622036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a36622036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a36622036.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a36622036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a36622036.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023c97-54.dat family_redline behavioral1/memory/4340-56-0x0000000000650000-0x000000000067E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4148 i52895746.exe 4940 a36622036.exe 4340 b60328924.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a36622036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a36622036.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i52895746.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4952 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i52895746.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a36622036.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b60328924.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4940 a36622036.exe 4940 a36622036.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4940 a36622036.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 316 wrote to memory of 4148 316 0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45.exe 82 PID 316 wrote to memory of 4148 316 0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45.exe 82 PID 316 wrote to memory of 4148 316 0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45.exe 82 PID 4148 wrote to memory of 4940 4148 i52895746.exe 83 PID 4148 wrote to memory of 4940 4148 i52895746.exe 83 PID 4148 wrote to memory of 4940 4148 i52895746.exe 83 PID 4148 wrote to memory of 4340 4148 i52895746.exe 94 PID 4148 wrote to memory of 4340 4148 i52895746.exe 94 PID 4148 wrote to memory of 4340 4148 i52895746.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45.exe"C:\Users\Admin\AppData\Local\Temp\0da1027d960c54d665fef9eb651d18420bc830296dd43a8469b65c500ed57e45.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i52895746.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i52895746.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a36622036.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a36622036.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b60328924.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b60328924.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4340
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4952
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
310KB
MD592de6d12b5a6c556789b8ca68f4403d1
SHA15baa3ed2d098b74f98967a240beca1719b28997e
SHA256944c9629bf9d7d5bf10db09d44cb04c3e0b372e2625de288817941f27df30cb8
SHA512662b4d65a6351f9ff925a617002b00cbd5c0f5fa68082a56968b55fe85bea735355cfd7be4cce4a1399f050a1159578938a356bacc045f132f7baba7806053ef
-
Filesize
175KB
MD5016d0ceb61814a4175879e8ad5e0e4e7
SHA1866bfb99e81ded3b013adceb458d9d0ff7370be3
SHA256df456344600f8df4efe7d4214c598fef7442f7fa8d8b817ed3f92d6fcfb2c0f4
SHA512a39fded4048781ca568ffae4e5f302ad5fc244254be9e9096223dc73e328e63284077c43c81b76671ef1938b903ebce4858bb1ff5bd2b50d9759d13ba87229b4
-
Filesize
168KB
MD5cf7d7ce5511495118ab0bde5b779dce1
SHA11f770ebe6141808f4fcd817a0e6cc6b8a6348ee6
SHA256839d6bf6937fa962ecec4c3cec2c2848ec5b402464c957fdd7d53138602a49fb
SHA51217ba5e2581efb94cf97067bf0e8dbdbd1ba14476494c4fa67a7d1bec67c99a9b6d211f512b11a4c6e04da412e75b975f8d7a186002d1865b4d346dddcb49aa7a