Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 17:54
Static task
static1
Behavioral task
behavioral1
Sample
89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exe
Resource
win10v2004-20241007-en
General
-
Target
89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exe
-
Size
416KB
-
MD5
f314945ba5cabaccd4c4acb946a872fa
-
SHA1
505ca7cfa8e5bc469876ae87d64d0e8a13fa3816
-
SHA256
89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56
-
SHA512
bc928223d600dc35a34e34ef9dbba6b0d6f2c7bcdd4d990d2af3fead8152480219ba4f299be7f70969eb684b678a2f59e1b86d7a898d6d2d49ed145c38b1ebe6
-
SSDEEP
6144:Kdy+bnr+xp0yN90QEYUEqyJZSMLJpKWDOp2MkLpG4yzkovUmjPjQaxdEHJf:XMrhy90mNAWpKWqpJaG4qdHQaqJf
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3476-12-0x00000000024C0000-0x00000000024DA000-memory.dmp healer behavioral1/memory/3476-14-0x0000000002830000-0x0000000002848000-memory.dmp healer behavioral1/memory/3476-26-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/3476-42-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/3476-40-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/3476-38-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/3476-36-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/3476-34-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/3476-32-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/3476-30-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/3476-28-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/3476-24-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/3476-22-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/3476-20-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/3476-18-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/3476-16-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/3476-15-0x0000000002830000-0x0000000002842000-memory.dmp healer -
Healer family
-
Processes:
a8687614.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8687614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8687614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8687614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8687614.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8687614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8687614.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b9467585.exe family_redline behavioral1/memory/1172-54-0x0000000000D40000-0x0000000000D70000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
Processes:
a8687614.exeb9467585.exepid process 3476 a8687614.exe 1172 b9467585.exe -
Processes:
a8687614.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8687614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8687614.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 808 3476 WerFault.exe a8687614.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exea8687614.exeb9467585.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8687614.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9467585.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a8687614.exepid process 3476 a8687614.exe 3476 a8687614.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a8687614.exedescription pid process Token: SeDebugPrivilege 3476 a8687614.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exedescription pid process target process PID 4408 wrote to memory of 3476 4408 89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exe a8687614.exe PID 4408 wrote to memory of 3476 4408 89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exe a8687614.exe PID 4408 wrote to memory of 3476 4408 89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exe a8687614.exe PID 4408 wrote to memory of 1172 4408 89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exe b9467585.exe PID 4408 wrote to memory of 1172 4408 89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exe b9467585.exe PID 4408 wrote to memory of 1172 4408 89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exe b9467585.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exe"C:\Users\Admin\AppData\Local\Temp\89439bb80275493e43a4ca18adfa69911ef2c03a592680a4fb08c3d853a48d56.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a8687614.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a8687614.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 10803⤵
- Program crash
PID:808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b9467585.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b9467585.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3476 -ip 34761⤵PID:4072
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD596900966e55098397dda005e7ca5593c
SHA1c194a51790a99bfded36d24d313eb4f07caa18ed
SHA256a351511bd5d04d83e4bf8167e4bbc5f6599e2a272092597bd82e9391855cf21a
SHA512e62f0e49b44c36e848a90e5f67feee0c551e69466e8adad9d58d011e4a1cf3822ad9da56c8e36e92accffa602ca8f930eda96a190c69f9473a7442f05899e3c4
-
Filesize
168KB
MD5fb8500178b1fa09cc6b1a5e55f3cfff5
SHA1fcefde90989fa8e4227023f74ba0a6a398ac7c79
SHA25619bf8d5b5ab47011dcb4847708e71f8c7456f867ca7209a52e162daa1ca2c358
SHA5120942dacfc4904be9dc7d237a19060f3552bb4f5399781ce6b3aeaaa8bce227833ff62962f0f305ec904806fa9cbbf31122afdfefce2b81ffb267e544815a008f