Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
5133c72b126ee1a0cde662582b1d64de1318adc8ea8b269c05e50d9a21bf4d4aN.exe
Resource
win10v2004-20241007-en
General
-
Target
5133c72b126ee1a0cde662582b1d64de1318adc8ea8b269c05e50d9a21bf4d4aN.exe
-
Size
931KB
-
MD5
ec29f8f17396692617d98b9c59b2fc70
-
SHA1
6f07033036d41a0c36320588a01f1f5f9c61e093
-
SHA256
5133c72b126ee1a0cde662582b1d64de1318adc8ea8b269c05e50d9a21bf4d4a
-
SHA512
e9c8f65fc919332652f5b455f42b018df7a5030fb87e5c9060c8f4de9ce64a4362ca3c14ee0ab01ffd72c4e2e07077c61bc25952bea46b0e4e78948b5fd8509a
-
SSDEEP
24576:lyOWcp/bklaVRdmt+5ajThH3qNJDqquyDWBZZg:AfksUDap3qNJDqqTDWB
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b82-19.dat healer behavioral1/memory/3576-22-0x0000000000630000-0x000000000063A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az803916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az803916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az803916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az803916.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az803916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az803916.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1900-29-0x0000000007100000-0x000000000713C000-memory.dmp family_redline behavioral1/memory/1900-31-0x0000000007750000-0x000000000778A000-memory.dmp family_redline behavioral1/memory/1900-37-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-49-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-96-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-93-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-91-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-89-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-87-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-85-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-83-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-81-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-80-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-77-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-75-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-73-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-71-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-70-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-67-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-65-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-63-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-61-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-59-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-57-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-55-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-53-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-47-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-45-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-43-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-41-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-39-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-51-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-35-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-33-0x0000000007750000-0x0000000007785000-memory.dmp family_redline behavioral1/memory/1900-32-0x0000000007750000-0x0000000007785000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 1580 ki686712.exe 2588 ki498772.exe 3576 az803916.exe 1900 bu103693.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az803916.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5133c72b126ee1a0cde662582b1d64de1318adc8ea8b269c05e50d9a21bf4d4aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ki686712.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ki498772.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5133c72b126ee1a0cde662582b1d64de1318adc8ea8b269c05e50d9a21bf4d4aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki686712.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki498772.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bu103693.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3576 az803916.exe 3576 az803916.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3576 az803916.exe Token: SeDebugPrivilege 1900 bu103693.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 468 wrote to memory of 1580 468 5133c72b126ee1a0cde662582b1d64de1318adc8ea8b269c05e50d9a21bf4d4aN.exe 83 PID 468 wrote to memory of 1580 468 5133c72b126ee1a0cde662582b1d64de1318adc8ea8b269c05e50d9a21bf4d4aN.exe 83 PID 468 wrote to memory of 1580 468 5133c72b126ee1a0cde662582b1d64de1318adc8ea8b269c05e50d9a21bf4d4aN.exe 83 PID 1580 wrote to memory of 2588 1580 ki686712.exe 86 PID 1580 wrote to memory of 2588 1580 ki686712.exe 86 PID 1580 wrote to memory of 2588 1580 ki686712.exe 86 PID 2588 wrote to memory of 3576 2588 ki498772.exe 87 PID 2588 wrote to memory of 3576 2588 ki498772.exe 87 PID 2588 wrote to memory of 1900 2588 ki498772.exe 94 PID 2588 wrote to memory of 1900 2588 ki498772.exe 94 PID 2588 wrote to memory of 1900 2588 ki498772.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\5133c72b126ee1a0cde662582b1d64de1318adc8ea8b269c05e50d9a21bf4d4aN.exe"C:\Users\Admin\AppData\Local\Temp\5133c72b126ee1a0cde662582b1d64de1318adc8ea8b269c05e50d9a21bf4d4aN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki686712.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki686712.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki498772.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki498772.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\az803916.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\az803916.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bu103693.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bu103693.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD5a205a45c2542663667e99f21467d3fa9
SHA17689e3fc35f3e908bd25bfa7a5cb2a1e62d3e970
SHA2569b9b18c444df20c82d355ad5b2307c6ca60633a1c68c4ecbcf39431aa49736d6
SHA51213e98cc71187d36e5d2dc67f7cc3b2cd10a437824019a42259a373ca1ba173ecc42403a261d75c389105e609bdbe059086bde16966749629caebb0bbe723d8f2
-
Filesize
415KB
MD538008c6058bad07d61bdceeda4d63f4b
SHA1f725bc40cc4e364a23fdd42ed7d3c2b67e43ca62
SHA256a5876d959675b0df348b8cb93c8030c35deefee7ae77a837389b26c3ad9a95ae
SHA5122c99508b3ae60a4a6926ad1b53df4f5d5db531ce0ca3c45594dd2566c52a8f6c8ac3f717c7776d68120b5e9bf8f1be3708f616043ec23f1cbec41290edeecd97
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD5ab0d27b5dd5d2f31d9bfd069a8090dc8
SHA196ac29a4a37ad9ff201d57e95f8214f474f84ddb
SHA25675db0398721e0a9127744ec665deeb5b07f0b19ece75ffa0885d6041dd15c504
SHA512f7ad0a73fc5cd3d0fb98c528fb2e0a1c8334f72257ecb6faa02eaf9e2d631a823ee3d27bb1d5ba2146d657ba3379fa90a0bda7486961e2305676802e33855bbf