Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
8c15502d0695900af97a105f335a12abf4bb2b1ac0dda5219e0689f0585c3850.exe
Resource
win10v2004-20241007-en
General
-
Target
8c15502d0695900af97a105f335a12abf4bb2b1ac0dda5219e0689f0585c3850.exe
-
Size
569KB
-
MD5
708ea47536d313e368916e66e1499c7c
-
SHA1
6ef18031f7f5d2ffa575e5435a659a0a27ca84cd
-
SHA256
8c15502d0695900af97a105f335a12abf4bb2b1ac0dda5219e0689f0585c3850
-
SHA512
29a9c6131594cd3a51c7a0ecea16b84ab9177766921bdd089b5f6a3ae30f2484a0c2a2a93b90ff04ab9915b256b43708329e22cb214cdcc0d3aee0566eaa9ad7
-
SSDEEP
12288:8y90R4F3Z6H2Mod62y1k8mUOe8HIAY083E:8y3F3Z6dQ6L1kZUOe8HFSU
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it321464.exe healer behavioral1/memory/2996-15-0x0000000000EF0000-0x0000000000EFA000-memory.dmp healer -
Healer family
-
Processes:
it321464.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it321464.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it321464.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it321464.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it321464.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it321464.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it321464.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2804-22-0x00000000049F0000-0x0000000004A2C000-memory.dmp family_redline behavioral1/memory/2804-24-0x00000000071A0000-0x00000000071DA000-memory.dmp family_redline behavioral1/memory/2804-30-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-40-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-88-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-86-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-84-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-82-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-78-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-76-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-75-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-70-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-68-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-66-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-64-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-62-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-60-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-58-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-56-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-54-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-52-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-48-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-46-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-45-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-42-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-38-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-36-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-34-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-32-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-80-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-72-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-50-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-28-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-26-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/2804-25-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziQR8111.exeit321464.exejr827991.exepid process 732 ziQR8111.exe 2996 it321464.exe 2804 jr827991.exe -
Processes:
it321464.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it321464.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
8c15502d0695900af97a105f335a12abf4bb2b1ac0dda5219e0689f0585c3850.exeziQR8111.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8c15502d0695900af97a105f335a12abf4bb2b1ac0dda5219e0689f0585c3850.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziQR8111.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8c15502d0695900af97a105f335a12abf4bb2b1ac0dda5219e0689f0585c3850.exeziQR8111.exejr827991.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c15502d0695900af97a105f335a12abf4bb2b1ac0dda5219e0689f0585c3850.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziQR8111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr827991.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
it321464.exepid process 2996 it321464.exe 2996 it321464.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
it321464.exejr827991.exedescription pid process Token: SeDebugPrivilege 2996 it321464.exe Token: SeDebugPrivilege 2804 jr827991.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8c15502d0695900af97a105f335a12abf4bb2b1ac0dda5219e0689f0585c3850.exeziQR8111.exedescription pid process target process PID 1708 wrote to memory of 732 1708 8c15502d0695900af97a105f335a12abf4bb2b1ac0dda5219e0689f0585c3850.exe ziQR8111.exe PID 1708 wrote to memory of 732 1708 8c15502d0695900af97a105f335a12abf4bb2b1ac0dda5219e0689f0585c3850.exe ziQR8111.exe PID 1708 wrote to memory of 732 1708 8c15502d0695900af97a105f335a12abf4bb2b1ac0dda5219e0689f0585c3850.exe ziQR8111.exe PID 732 wrote to memory of 2996 732 ziQR8111.exe it321464.exe PID 732 wrote to memory of 2996 732 ziQR8111.exe it321464.exe PID 732 wrote to memory of 2804 732 ziQR8111.exe jr827991.exe PID 732 wrote to memory of 2804 732 ziQR8111.exe jr827991.exe PID 732 wrote to memory of 2804 732 ziQR8111.exe jr827991.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c15502d0695900af97a105f335a12abf4bb2b1ac0dda5219e0689f0585c3850.exe"C:\Users\Admin\AppData\Local\Temp\8c15502d0695900af97a105f335a12abf4bb2b1ac0dda5219e0689f0585c3850.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQR8111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQR8111.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it321464.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it321464.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr827991.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr827991.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
415KB
MD5cf7650d1d03a2b586eee4a48ad4ef504
SHA164255f91aab1a10489bdcfd7c00ce32d32910a18
SHA2562b176b4cd0797c1bfe4863b742279f66ffc65a65eed8c181a4d303bbcf059dfc
SHA5123bd07720dcfcbce41504b822b628cd15c2471e9e98df73e7ed058ed20bd65030de74cb199b6d0cec13a1ffd95c5152a47597689ff509f807f1401b098ca126d5
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD5dc52f7be6920ff9d540304735031a64e
SHA13a2799a5025593b90419ef47ec7200ccae5e1f00
SHA256672baea5f9a5331ce034c6066f9e34b8f116f139082497d865d04b7076b8eeaa
SHA5121cd2e6f6087a7d4a602d6709808876a2d9e95a4a70ae25191e700961a3bbb7646fd4efffbb38109bf3af52bc0bd16df811d6b0be6e113d54528a992e563dec1f