Analysis
-
max time kernel
116s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
be0acc69829c9a8717ce82d479f831dd8035bfdc27658804c935d019a2b9cfbcN.exe
Resource
win10v2004-20241007-en
General
-
Target
be0acc69829c9a8717ce82d479f831dd8035bfdc27658804c935d019a2b9cfbcN.exe
-
Size
848KB
-
MD5
4713b5bf0aeaaa3e55b97e4187367830
-
SHA1
aca8935697aaa69fa6b1ecb418d4df8cebe0faf6
-
SHA256
be0acc69829c9a8717ce82d479f831dd8035bfdc27658804c935d019a2b9cfbc
-
SHA512
9ed7a96596f391081960fc5415a81bf3869db1ba84961c43543d243f21af5fd80b99beaba9a42a8bdbcdd4710ef6df27edf399b3b93bd560ab666489cd508723
-
SSDEEP
24576:FypHbVgZ6Gl/SqOGIiokddVXz5cFFhd4C3cApMYS:gpHbkxlMiobFbd4C
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4828-25-0x0000000002160000-0x000000000217A000-memory.dmp healer behavioral1/memory/4828-27-0x0000000004A10000-0x0000000004A28000-memory.dmp healer behavioral1/memory/4828-28-0x0000000004A10000-0x0000000004A22000-memory.dmp healer behavioral1/memory/4828-35-0x0000000004A10000-0x0000000004A22000-memory.dmp healer behavioral1/memory/4828-55-0x0000000004A10000-0x0000000004A22000-memory.dmp healer behavioral1/memory/4828-53-0x0000000004A10000-0x0000000004A22000-memory.dmp healer behavioral1/memory/4828-51-0x0000000004A10000-0x0000000004A22000-memory.dmp healer behavioral1/memory/4828-49-0x0000000004A10000-0x0000000004A22000-memory.dmp healer behavioral1/memory/4828-47-0x0000000004A10000-0x0000000004A22000-memory.dmp healer behavioral1/memory/4828-45-0x0000000004A10000-0x0000000004A22000-memory.dmp healer behavioral1/memory/4828-43-0x0000000004A10000-0x0000000004A22000-memory.dmp healer behavioral1/memory/4828-41-0x0000000004A10000-0x0000000004A22000-memory.dmp healer behavioral1/memory/4828-39-0x0000000004A10000-0x0000000004A22000-memory.dmp healer behavioral1/memory/4828-37-0x0000000004A10000-0x0000000004A22000-memory.dmp healer behavioral1/memory/4828-33-0x0000000004A10000-0x0000000004A22000-memory.dmp healer behavioral1/memory/4828-31-0x0000000004A10000-0x0000000004A22000-memory.dmp healer behavioral1/memory/4828-29-0x0000000004A10000-0x0000000004A22000-memory.dmp healer -
Healer family
-
Processes:
a4355789.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4355789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4355789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4355789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4355789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4355789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4355789.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1621089.exe family_redline behavioral1/memory/1940-66-0x0000000000CC0000-0x0000000000CF0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
v6346460.exev4286225.exea4355789.exeb1621089.exepid process 3900 v6346460.exe 1692 v4286225.exe 4828 a4355789.exe 1940 b1621089.exe -
Processes:
a4355789.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4355789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4355789.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
be0acc69829c9a8717ce82d479f831dd8035bfdc27658804c935d019a2b9cfbcN.exev6346460.exev4286225.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" be0acc69829c9a8717ce82d479f831dd8035bfdc27658804c935d019a2b9cfbcN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6346460.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4286225.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3384 4828 WerFault.exe a4355789.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b1621089.exebe0acc69829c9a8717ce82d479f831dd8035bfdc27658804c935d019a2b9cfbcN.exev6346460.exev4286225.exea4355789.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1621089.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be0acc69829c9a8717ce82d479f831dd8035bfdc27658804c935d019a2b9cfbcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6346460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v4286225.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4355789.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a4355789.exepid process 4828 a4355789.exe 4828 a4355789.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a4355789.exedescription pid process Token: SeDebugPrivilege 4828 a4355789.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
be0acc69829c9a8717ce82d479f831dd8035bfdc27658804c935d019a2b9cfbcN.exev6346460.exev4286225.exedescription pid process target process PID 3284 wrote to memory of 3900 3284 be0acc69829c9a8717ce82d479f831dd8035bfdc27658804c935d019a2b9cfbcN.exe v6346460.exe PID 3284 wrote to memory of 3900 3284 be0acc69829c9a8717ce82d479f831dd8035bfdc27658804c935d019a2b9cfbcN.exe v6346460.exe PID 3284 wrote to memory of 3900 3284 be0acc69829c9a8717ce82d479f831dd8035bfdc27658804c935d019a2b9cfbcN.exe v6346460.exe PID 3900 wrote to memory of 1692 3900 v6346460.exe v4286225.exe PID 3900 wrote to memory of 1692 3900 v6346460.exe v4286225.exe PID 3900 wrote to memory of 1692 3900 v6346460.exe v4286225.exe PID 1692 wrote to memory of 4828 1692 v4286225.exe a4355789.exe PID 1692 wrote to memory of 4828 1692 v4286225.exe a4355789.exe PID 1692 wrote to memory of 4828 1692 v4286225.exe a4355789.exe PID 1692 wrote to memory of 1940 1692 v4286225.exe b1621089.exe PID 1692 wrote to memory of 1940 1692 v4286225.exe b1621089.exe PID 1692 wrote to memory of 1940 1692 v4286225.exe b1621089.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be0acc69829c9a8717ce82d479f831dd8035bfdc27658804c935d019a2b9cfbcN.exe"C:\Users\Admin\AppData\Local\Temp\be0acc69829c9a8717ce82d479f831dd8035bfdc27658804c935d019a2b9cfbcN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6346460.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6346460.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4286225.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4286225.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4355789.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4355789.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 10805⤵
- Program crash
PID:3384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1621089.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1621089.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1940
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4828 -ip 48281⤵PID:1132
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
644KB
MD5fa168db84d9c0e439d937e1790104d9d
SHA17d2813c55a7f90eeddb6d752953178ab124c3c56
SHA256e4f5163b3f309a1b7ff1a87b9b6a92b2be62560665d9ecf13311b0ab1c35cd74
SHA512bac3c747db94b7d1221fc779f7c3f9d09e1820544fdbc4847fad8abfc7b272eb6834e0e12b7be4fcffc302c9094720a67cc0d7a28fdea50121bbb9e10d710241
-
Filesize
384KB
MD579fd0e46e825c073b4ee57a7fb93137a
SHA1de7ebe71a890c6b5be58fd8887afbb7c28801637
SHA25674d4ca2026a891db3563c1dcd8a26491f5fff5cf51a9cafd4cce8f14b3488f77
SHA51222176bab9204d49a75b84cf88ea06625fa2d672ce2dc9b9cffab5db0b854fb41ecbd7fe4ccda735c798672b27c5f6ea8583831abe79db40c3c279686e875cb0e
-
Filesize
291KB
MD5f1888e049ab494a37ac7030e37e3333b
SHA1dd3747ebf2e95978ef25634efee29f7e0a95fc8e
SHA256f3053ab1474120a7230da3733c3e1a88d459b9ee8e5e99a88cd37a4a3d4d00ed
SHA512346acbc1e2e5538a0b5c2503adbff9f48f11d92f5a7e18b2c713e5ffa8b179564171fe1f40f92ce260a00650ab46636cc2846c88faf0fff511622c2757742489
-
Filesize
168KB
MD535620838686248db8ec364009af4c40e
SHA1a7e01f11d69c785d0a68ba9a0e7acca777a967ea
SHA256fc01213ffbddc50a452fe272f8ea8f3313946f651c4db174eb8efa180c9bf225
SHA51257e0a8c3d211dac115a308b06b69d3354d36f264929964280b23d365cdbc7d119b1b4ce5420be77eef6739cdfdb17fc9c375ffd2edc5f8aa82700cc388849f4e