Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 23:47
Static task
static1
Behavioral task
behavioral1
Sample
a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1.exe
Resource
win10v2004-20241007-en
General
-
Target
a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1.exe
-
Size
624KB
-
MD5
f756114c10e1dab6d849d093be908ec7
-
SHA1
ab0568908db1dac74f0ed39ababdc649825b8890
-
SHA256
a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1
-
SHA512
ee473042e8c6ab45aa0e17eb6ecf0f6acbcd3473909051ccd6b79257d475162cefd823b581a02e35c2fa9d0d30f2639e6e7109bc27fbf9502aa93256bed7cf3d
-
SSDEEP
12288:by90dURK+tGLQo5N5ekRJh3NDNsPYAkkmASvKpMGSHxv+eYKzysRG6tdM:byIURKlp3TJV9kZSCfSRxzyKdM
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c79-12.dat healer behavioral1/memory/3936-15-0x00000000008C0000-0x00000000008CA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it709630.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it709630.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it709630.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it709630.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it709630.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it709630.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2424-22-0x0000000002910000-0x000000000294C000-memory.dmp family_redline behavioral1/memory/2424-24-0x0000000004E60000-0x0000000004E9A000-memory.dmp family_redline behavioral1/memory/2424-32-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-30-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-28-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-88-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-86-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-84-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-82-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-80-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-78-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-76-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-74-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-72-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-70-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-68-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-66-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-64-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-62-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-60-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-58-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-54-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-52-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-50-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-48-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-46-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-44-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-42-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-40-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-38-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-36-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-56-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-34-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-26-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/2424-25-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4356 ziUJ3649.exe 3936 it709630.exe 2424 jr061604.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it709630.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziUJ3649.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziUJ3649.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr061604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3936 it709630.exe 3936 it709630.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3936 it709630.exe Token: SeDebugPrivilege 2424 jr061604.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 536 wrote to memory of 4356 536 a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1.exe 83 PID 536 wrote to memory of 4356 536 a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1.exe 83 PID 536 wrote to memory of 4356 536 a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1.exe 83 PID 4356 wrote to memory of 3936 4356 ziUJ3649.exe 84 PID 4356 wrote to memory of 3936 4356 ziUJ3649.exe 84 PID 4356 wrote to memory of 2424 4356 ziUJ3649.exe 96 PID 4356 wrote to memory of 2424 4356 ziUJ3649.exe 96 PID 4356 wrote to memory of 2424 4356 ziUJ3649.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1.exe"C:\Users\Admin\AppData\Local\Temp\a8f1e30b4a28e65b2da97177e2492026a2fbed992889cf5863e52208ac9359c1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUJ3649.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUJ3649.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it709630.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it709630.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr061604.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr061604.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
469KB
MD50438d06c88065758284ad011ef08a020
SHA1d51550a6e16dff0a392c87522ff8a6e0767818f8
SHA256b5bd8e06a45c95e4388fe859814322fe36946d654b2433402c3a0036205fa750
SHA512f6fd94a4bb0ff3cb17ee5e4879e33bdb8fd8b19630c75f3aff2eb27d16591041f4cd76119bfd603dafe9badba269d9793a3f01fc5ab9214414dfe6fd07dc22fc
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
485KB
MD516c477ea7b435eabe70ede0e6f3708b4
SHA116091f04fb576c525c449454d9622bf6edb2828e
SHA25692c39015fa3230f6b46b1a6c88685e09eed7ca9dd49b8d0207eb14b5dcd70bb6
SHA512968ac210bc1afcd5f628a3743850a2cc553f34bace88d0c4ee2c7db91e03b660b6170626533a2ff577e842e0500c4e77db94382503c9e059c004845a8fc40bfc