Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3N.exe
Resource
win10v2004-20241007-en
General
-
Target
f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3N.exe
-
Size
568KB
-
MD5
c1e00e230e2cfa778c59c9cdf12419d0
-
SHA1
f6a9181eeba6acdc3dd2692801ad8187e064543b
-
SHA256
f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3
-
SHA512
a23b7362d0d864fcb6a7983db396fa10087647f771cab03f3fcd6ba6e17b6dc77136a87fc3fdc62dea04c2ebebb4200afbc43538797cfe99589250b44be739ef
-
SSDEEP
12288:1y90bxCpGQ6/E/TMT7/IwGxGH9zbPVJnAo/:1yaU/sOTq7XRAa
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c9d-13.dat healer behavioral1/memory/4552-15-0x0000000000380000-0x000000000038A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it654350.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it654350.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it654350.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it654350.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it654350.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it654350.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3408-22-0x0000000004A80000-0x0000000004ABC000-memory.dmp family_redline behavioral1/memory/3408-24-0x00000000071A0000-0x00000000071DA000-memory.dmp family_redline behavioral1/memory/3408-28-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-36-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-34-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-32-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-30-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-68-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-51-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-46-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-26-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-25-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-89-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-86-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-84-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-82-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-80-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-78-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-76-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-74-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-72-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-70-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-66-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-64-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-62-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-60-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-58-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-56-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-54-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-52-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-49-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-44-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-42-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-40-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/3408-38-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2712 ziSM7092.exe 4552 it654350.exe 3408 jr486565.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it654350.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziSM7092.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziSM7092.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr486565.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4552 it654350.exe 4552 it654350.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4552 it654350.exe Token: SeDebugPrivilege 3408 jr486565.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 212 wrote to memory of 2712 212 f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3N.exe 83 PID 212 wrote to memory of 2712 212 f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3N.exe 83 PID 212 wrote to memory of 2712 212 f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3N.exe 83 PID 2712 wrote to memory of 4552 2712 ziSM7092.exe 84 PID 2712 wrote to memory of 4552 2712 ziSM7092.exe 84 PID 2712 wrote to memory of 3408 2712 ziSM7092.exe 89 PID 2712 wrote to memory of 3408 2712 ziSM7092.exe 89 PID 2712 wrote to memory of 3408 2712 ziSM7092.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3N.exe"C:\Users\Admin\AppData\Local\Temp\f309f3124c3f9c1a8a73b06413b5d8a849026096709dd5ef1ac894cccc05e4c3N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSM7092.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSM7092.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it654350.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it654350.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486565.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486565.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD5f5b8d7385a6b2a6d37ec98382213cefa
SHA10f2e43c0a2babfb2dfd90d8701ab5db2bf31be26
SHA2560dfcd3bbf21dfbc57f0e24e36cdf1c6480adb03bf56f370a645fe2317b362ad4
SHA51224f4c730bb1874060388c9dd3b683dbb3f9b77f30c747472196bf6c8f2e78f01421d50def0853e3eeb3906c16ca58dc97d45e24e70cd1973fa037167ef18a77e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
359KB
MD57beb7d475c090c3421f5fba5f66412fc
SHA176a9cfbec000aa9ba732afbd4d155b45b17c761d
SHA256820082936d89d59ffcddedfc170f5acbaee26d11a6538d64c8045c70aaa2e2bc
SHA512e74df4e133b0117b74c163c37ab5b4fd5aaa69692dc5233b36d6a76ca6230cd6a5229fcce0394365fa52f7b98b6ea33ab2bcf2a0b77e18936663554b6c94a89c