Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 13:25
Static task
static1
Behavioral task
behavioral1
Sample
567c2ab1eeeed12dead682bafde8507e1c87b196944f82e8a0fe41cf9c44302e.exe
Resource
win10v2004-20241007-en
General
-
Target
567c2ab1eeeed12dead682bafde8507e1c87b196944f82e8a0fe41cf9c44302e.exe
-
Size
1.2MB
-
MD5
ff7f6e28c50f781cec366fb192eb882b
-
SHA1
1c8a9e73301d9712ad5801cbecf32cb4e0405c0c
-
SHA256
567c2ab1eeeed12dead682bafde8507e1c87b196944f82e8a0fe41cf9c44302e
-
SHA512
1b56ce5062a5cd675dc770487837ac9557e71dec6a779d9cc75c671fc0570b0c892a3005d1270320f9183cda0638f6f4634fb6ffd04122281f21f7878b70a6ce
-
SSDEEP
24576:BymlYIvwuciefKoR9s6GgcOedcHQUOzL30XE0i0:0MhvEicGgjedwLeL3GbX
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c90-26.dat healer behavioral1/memory/744-28-0x0000000000700000-0x000000000070A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az497544.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az497544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az497544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az497544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az497544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az497544.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4864-34-0x0000000002720000-0x000000000275C000-memory.dmp family_redline behavioral1/memory/4864-36-0x0000000004DF0000-0x0000000004E2A000-memory.dmp family_redline behavioral1/memory/4864-42-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-94-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-72-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-60-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-48-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-40-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-38-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-37-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-100-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-98-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-96-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-92-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-90-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-88-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-86-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-84-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-82-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-80-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-78-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-76-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-74-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-70-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-68-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-66-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-64-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-62-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-58-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-56-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-54-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-52-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-50-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-46-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline behavioral1/memory/4864-44-0x0000000004DF0000-0x0000000004E25000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 3648 ki926604.exe 1460 ki855669.exe 4488 ki469893.exe 744 az497544.exe 4864 bu130948.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az497544.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 567c2ab1eeeed12dead682bafde8507e1c87b196944f82e8a0fe41cf9c44302e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ki926604.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ki855669.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ki469893.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki855669.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki469893.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bu130948.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 567c2ab1eeeed12dead682bafde8507e1c87b196944f82e8a0fe41cf9c44302e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki926604.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 744 az497544.exe 744 az497544.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 744 az497544.exe Token: SeDebugPrivilege 4864 bu130948.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3540 wrote to memory of 3648 3540 567c2ab1eeeed12dead682bafde8507e1c87b196944f82e8a0fe41cf9c44302e.exe 84 PID 3540 wrote to memory of 3648 3540 567c2ab1eeeed12dead682bafde8507e1c87b196944f82e8a0fe41cf9c44302e.exe 84 PID 3540 wrote to memory of 3648 3540 567c2ab1eeeed12dead682bafde8507e1c87b196944f82e8a0fe41cf9c44302e.exe 84 PID 3648 wrote to memory of 1460 3648 ki926604.exe 85 PID 3648 wrote to memory of 1460 3648 ki926604.exe 85 PID 3648 wrote to memory of 1460 3648 ki926604.exe 85 PID 1460 wrote to memory of 4488 1460 ki855669.exe 86 PID 1460 wrote to memory of 4488 1460 ki855669.exe 86 PID 1460 wrote to memory of 4488 1460 ki855669.exe 86 PID 4488 wrote to memory of 744 4488 ki469893.exe 87 PID 4488 wrote to memory of 744 4488 ki469893.exe 87 PID 4488 wrote to memory of 4864 4488 ki469893.exe 100 PID 4488 wrote to memory of 4864 4488 ki469893.exe 100 PID 4488 wrote to memory of 4864 4488 ki469893.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\567c2ab1eeeed12dead682bafde8507e1c87b196944f82e8a0fe41cf9c44302e.exe"C:\Users\Admin\AppData\Local\Temp\567c2ab1eeeed12dead682bafde8507e1c87b196944f82e8a0fe41cf9c44302e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki926604.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki926604.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki855669.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki855669.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki469893.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki469893.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az497544.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az497544.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu130948.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu130948.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53d6013a18df2d7c20f5e3c88a783744a
SHA180c13ad8ad5d3afc37960b4898a306da7f665e5b
SHA2568964176a3dfda5740258046dfafd35a688784206a1605e0191a31d2037d4e3db
SHA512883de2ab0073e7b1e71a0e140217fbb0992cf8630a263f357571e1418b07381d268b511d2422cd1ccb1614cdaf9e519040e869c8fd244809dcbf8ef078563a32
-
Filesize
806KB
MD54b8945a2aa8d7819341b780eee26b552
SHA13514f8afbfd234b6c64261afb0174e2b27fe1126
SHA256903fa2df752525b0b35d11726af3cac7d8cbf6a4bbd68ee864b6d1d9a068b6ec
SHA5121a4d3bc3955ebb05c7d3e90f7eba0100167bb760d464d0e88cf0a2ccd3654efc73bd9dffabe5802b0c99b54b8bcbae9958adcae9f67c2128b71714e6cacf1d24
-
Filesize
470KB
MD509f98df348ba735c38bdff6605490181
SHA1c57a2b01cc9d26286c16a8712038150e0463e79c
SHA25689abf9c528f7deea1464adffdc540d1b92b1279ec38e8437fb8d3cb860debdbb
SHA512cb580ae6c5392414c16bab2a418d4d4fb80c152a78980a0a8b41db6a36ee161b42d550b9ad99be936189f31827dc0c7793b0a63564b3290b86ae7129ac3bb481
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
486KB
MD56363374e957fbf9180fd3a59aa0c7903
SHA12f638a15c4037787047146c77b8698b24a0a94a5
SHA25698f3b640f1e76b2a49c5cef7625b2e0f540d1501cfa38f0b20cd38452296d096
SHA512743e91eefb7fb843ca3e8a7c42a7d3728aa5fae7fc99315d7bf636355e0e9944d20ce4061575f0834c44b6385f7ac1746d7d1b34a581c865f9d45821992e5e13