Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 12:22
Static task
static1
Behavioral task
behavioral1
Sample
be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484.exe
Resource
win10v2004-20241007-en
General
-
Target
be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484.exe
-
Size
568KB
-
MD5
390fdbe6132a241f23ec6cb32a966d8e
-
SHA1
5ee957da19ec2d9e7fb59631d60aeb5a93fb08b0
-
SHA256
be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484
-
SHA512
21d7cce293ed54564d47f28cfe13860a2dcd2ae0b01a6f002a9deff2611712fce5ee64f16e65c486b43731e0a13dad43c0de8889c397482f998224a39709bb56
-
SSDEEP
12288:1y90bxCpGQ6/E/TMT7/IwGxGH9zbPVJnAo/H:1yaU/sOTq7XRAaH
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cbb-12.dat healer behavioral1/memory/4884-15-0x0000000000940000-0x000000000094A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it654350.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it654350.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it654350.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it654350.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it654350.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it654350.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3896-21-0x0000000004B50000-0x0000000004B8C000-memory.dmp family_redline behavioral1/memory/3896-23-0x00000000077B0000-0x00000000077EA000-memory.dmp family_redline behavioral1/memory/3896-27-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-35-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-85-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-83-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-82-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-79-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-77-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-75-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-71-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-69-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-67-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-65-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-63-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-61-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-57-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-55-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-54-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-51-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-49-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-47-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-45-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-43-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-41-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-39-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-37-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-33-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-31-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-29-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-87-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-73-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-59-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-25-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline behavioral1/memory/3896-24-0x00000000077B0000-0x00000000077E5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2700 ziSM7092.exe 4884 it654350.exe 3896 jr486565.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it654350.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziSM7092.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr486565.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziSM7092.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4884 it654350.exe 4884 it654350.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4884 it654350.exe Token: SeDebugPrivilege 3896 jr486565.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2700 2128 be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484.exe 83 PID 2128 wrote to memory of 2700 2128 be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484.exe 83 PID 2128 wrote to memory of 2700 2128 be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484.exe 83 PID 2700 wrote to memory of 4884 2700 ziSM7092.exe 84 PID 2700 wrote to memory of 4884 2700 ziSM7092.exe 84 PID 2700 wrote to memory of 3896 2700 ziSM7092.exe 95 PID 2700 wrote to memory of 3896 2700 ziSM7092.exe 95 PID 2700 wrote to memory of 3896 2700 ziSM7092.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484.exe"C:\Users\Admin\AppData\Local\Temp\be81a27c72bc53b07769dca709535b2bd090062c2ba6a6364c473b21a754f484.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSM7092.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSM7092.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it654350.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it654350.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486565.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486565.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD5f5b8d7385a6b2a6d37ec98382213cefa
SHA10f2e43c0a2babfb2dfd90d8701ab5db2bf31be26
SHA2560dfcd3bbf21dfbc57f0e24e36cdf1c6480adb03bf56f370a645fe2317b362ad4
SHA51224f4c730bb1874060388c9dd3b683dbb3f9b77f30c747472196bf6c8f2e78f01421d50def0853e3eeb3906c16ca58dc97d45e24e70cd1973fa037167ef18a77e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
359KB
MD57beb7d475c090c3421f5fba5f66412fc
SHA176a9cfbec000aa9ba732afbd4d155b45b17c761d
SHA256820082936d89d59ffcddedfc170f5acbaee26d11a6538d64c8045c70aaa2e2bc
SHA512e74df4e133b0117b74c163c37ab5b4fd5aaa69692dc5233b36d6a76ca6230cd6a5229fcce0394365fa52f7b98b6ea33ab2bcf2a0b77e18936663554b6c94a89c