Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
e99be9a6e1a7468ee3f36f3e4bb7b12e6c2be4ae031e984707287f8552090b21N.exe
Resource
win10v2004-20241007-en
General
-
Target
e99be9a6e1a7468ee3f36f3e4bb7b12e6c2be4ae031e984707287f8552090b21N.exe
-
Size
543KB
-
MD5
e5020e807d5eb316fe7ac44a4b6fe570
-
SHA1
dc5ceeaa1ed5143a58753e9bd58aee736d8a1f16
-
SHA256
e99be9a6e1a7468ee3f36f3e4bb7b12e6c2be4ae031e984707287f8552090b21
-
SHA512
cf8ac1254aa5ba2498db82022f836730e9c48399dea891996318876c633e944e69871948df385698acb34749977b12eae5d68fe0dc065082afc089d4565cf59b
-
SSDEEP
12288:lMruy90TXgsTUP01ezulj5ESwwsLwd66jSeqpoR:7yQNpeuJ6SwwsL9PeqpM
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3932-11-0x0000000004950000-0x000000000496A000-memory.dmp healer behavioral1/memory/3932-13-0x0000000007700000-0x0000000007718000-memory.dmp healer behavioral1/memory/3932-20-0x0000000007700000-0x0000000007712000-memory.dmp healer behavioral1/memory/3932-42-0x0000000007700000-0x0000000007712000-memory.dmp healer behavioral1/memory/3932-40-0x0000000007700000-0x0000000007712000-memory.dmp healer behavioral1/memory/3932-38-0x0000000007700000-0x0000000007712000-memory.dmp healer behavioral1/memory/3932-36-0x0000000007700000-0x0000000007712000-memory.dmp healer behavioral1/memory/3932-26-0x0000000007700000-0x0000000007712000-memory.dmp healer behavioral1/memory/3932-24-0x0000000007700000-0x0000000007712000-memory.dmp healer behavioral1/memory/3932-22-0x0000000007700000-0x0000000007712000-memory.dmp healer behavioral1/memory/3932-18-0x0000000007700000-0x0000000007712000-memory.dmp healer behavioral1/memory/3932-16-0x0000000007700000-0x0000000007712000-memory.dmp healer behavioral1/memory/3932-15-0x0000000007700000-0x0000000007712000-memory.dmp healer behavioral1/memory/3932-34-0x0000000007700000-0x0000000007712000-memory.dmp healer behavioral1/memory/3932-32-0x0000000007700000-0x0000000007712000-memory.dmp healer behavioral1/memory/3932-30-0x0000000007700000-0x0000000007712000-memory.dmp healer behavioral1/memory/3932-28-0x0000000007700000-0x0000000007712000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9633.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9633.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1404-56-0x0000000007790000-0x00000000077D4000-memory.dmp family_redline behavioral1/memory/1404-55-0x00000000070F0000-0x0000000007136000-memory.dmp family_redline behavioral1/memory/1404-58-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-84-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-90-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-88-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-86-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-82-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-80-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-78-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-76-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-74-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-72-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-68-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-66-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-64-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-62-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-60-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-70-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline behavioral1/memory/1404-57-0x0000000007790000-0x00000000077CE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 3932 pro9633.exe 1404 qu7551.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9633.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e99be9a6e1a7468ee3f36f3e4bb7b12e6c2be4ae031e984707287f8552090b21N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e99be9a6e1a7468ee3f36f3e4bb7b12e6c2be4ae031e984707287f8552090b21N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9633.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7551.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3932 pro9633.exe 3932 pro9633.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3932 pro9633.exe Token: SeDebugPrivilege 1404 qu7551.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1272 wrote to memory of 3932 1272 e99be9a6e1a7468ee3f36f3e4bb7b12e6c2be4ae031e984707287f8552090b21N.exe 84 PID 1272 wrote to memory of 3932 1272 e99be9a6e1a7468ee3f36f3e4bb7b12e6c2be4ae031e984707287f8552090b21N.exe 84 PID 1272 wrote to memory of 3932 1272 e99be9a6e1a7468ee3f36f3e4bb7b12e6c2be4ae031e984707287f8552090b21N.exe 84 PID 1272 wrote to memory of 1404 1272 e99be9a6e1a7468ee3f36f3e4bb7b12e6c2be4ae031e984707287f8552090b21N.exe 92 PID 1272 wrote to memory of 1404 1272 e99be9a6e1a7468ee3f36f3e4bb7b12e6c2be4ae031e984707287f8552090b21N.exe 92 PID 1272 wrote to memory of 1404 1272 e99be9a6e1a7468ee3f36f3e4bb7b12e6c2be4ae031e984707287f8552090b21N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\e99be9a6e1a7468ee3f36f3e4bb7b12e6c2be4ae031e984707287f8552090b21N.exe"C:\Users\Admin\AppData\Local\Temp\e99be9a6e1a7468ee3f36f3e4bb7b12e6c2be4ae031e984707287f8552090b21N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pro9633.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pro9633.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu7551.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qu7551.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322KB
MD5b60690116e2f1ed9a449dbd66164de20
SHA1e8a3f1b5a0693e257f2cc125a6e85e8eaaa3cc12
SHA256f38015b548cb00ab02ff4dbcfd395ccf6538713291e19178ef87a998d76202b1
SHA512fa4f612f1207adba95c4457a3577f8ed0d41680572e004698c44ed9bdb85fe0e8ee0e4d8df4d726e143ccc067aa49082766c7084c65df0ffeae3b5a932ee367a
-
Filesize
379KB
MD5b9aaf42096e466205a1a62f7c0635a7a
SHA17ac050d2f8331aa16031bf422571ee4108cd0161
SHA256d7c7b38e576d944a6443a27e528058a82d306a30b39c20310a49b94a971c1874
SHA51297364c056c3f435001699742de6dd3b1b81bb5dc222b88a972eba56da4bc6e3278902b0fbb4a14e3462c544db4cb0a6fcac8fa939d18fced5b15e197f19a8ca6