Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
8118956954cd4c55aec70898805a5ec8df3d95dee51478129e34b249856f9d36.exe
Resource
win10v2004-20241007-en
General
-
Target
8118956954cd4c55aec70898805a5ec8df3d95dee51478129e34b249856f9d36.exe
-
Size
1.1MB
-
MD5
61b01d32cff96028325c3796a83ec98f
-
SHA1
160e8ae834d9a3a2f8b63b7bf2e27efeba7e47b0
-
SHA256
8118956954cd4c55aec70898805a5ec8df3d95dee51478129e34b249856f9d36
-
SHA512
99f3ed9889b2b5c2b7e3fe8dd9585a09930852a5498b54c555ecab8feeeec3785d48ae276c7327eb72a251534adbe83cb57944a21a671599c008a89a915c8fb6
-
SSDEEP
24576:KyrHaRryJ1kVpZgkPRFioaBuGbcE0T/SwwxLyomI4T:RTaRrsqPhaBFbxo/Zwx/+
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023ba6-26.dat healer behavioral1/memory/1984-28-0x0000000000D20000-0x0000000000D2A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az599829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az599829.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az599829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az599829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az599829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az599829.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4724-34-0x0000000007230000-0x000000000726C000-memory.dmp family_redline behavioral1/memory/4724-36-0x00000000072D0000-0x000000000730A000-memory.dmp family_redline behavioral1/memory/4724-50-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-52-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-100-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-98-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-96-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-94-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-92-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-90-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-88-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-84-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-82-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-80-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-78-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-76-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-74-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-72-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-70-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-68-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-64-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-62-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-60-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-58-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-56-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-54-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-48-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-46-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-44-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-86-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-66-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-42-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-40-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-38-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline behavioral1/memory/4724-37-0x00000000072D0000-0x0000000007305000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 4748 ki195872.exe 5044 ki410094.exe 2180 ki660904.exe 1984 az599829.exe 4724 bu716515.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az599829.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8118956954cd4c55aec70898805a5ec8df3d95dee51478129e34b249856f9d36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ki195872.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ki410094.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ki660904.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki410094.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki660904.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bu716515.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8118956954cd4c55aec70898805a5ec8df3d95dee51478129e34b249856f9d36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki195872.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1984 az599829.exe 1984 az599829.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1984 az599829.exe Token: SeDebugPrivilege 4724 bu716515.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4764 wrote to memory of 4748 4764 8118956954cd4c55aec70898805a5ec8df3d95dee51478129e34b249856f9d36.exe 82 PID 4764 wrote to memory of 4748 4764 8118956954cd4c55aec70898805a5ec8df3d95dee51478129e34b249856f9d36.exe 82 PID 4764 wrote to memory of 4748 4764 8118956954cd4c55aec70898805a5ec8df3d95dee51478129e34b249856f9d36.exe 82 PID 4748 wrote to memory of 5044 4748 ki195872.exe 83 PID 4748 wrote to memory of 5044 4748 ki195872.exe 83 PID 4748 wrote to memory of 5044 4748 ki195872.exe 83 PID 5044 wrote to memory of 2180 5044 ki410094.exe 84 PID 5044 wrote to memory of 2180 5044 ki410094.exe 84 PID 5044 wrote to memory of 2180 5044 ki410094.exe 84 PID 2180 wrote to memory of 1984 2180 ki660904.exe 85 PID 2180 wrote to memory of 1984 2180 ki660904.exe 85 PID 2180 wrote to memory of 4724 2180 ki660904.exe 91 PID 2180 wrote to memory of 4724 2180 ki660904.exe 91 PID 2180 wrote to memory of 4724 2180 ki660904.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8118956954cd4c55aec70898805a5ec8df3d95dee51478129e34b249856f9d36.exe"C:\Users\Admin\AppData\Local\Temp\8118956954cd4c55aec70898805a5ec8df3d95dee51478129e34b249856f9d36.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki195872.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki195872.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki410094.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ki410094.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki660904.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ki660904.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az599829.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az599829.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu716515.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu716515.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
917KB
MD5497ccb7b7085505719051421edbf03ab
SHA166fd6b9a3826f24d329d432f50a572fc3b2a2513
SHA256cf9fc6a445beac1d2028d287ce434bee3e79cfe89ea96cc221fa972db47beb74
SHA512c5d099e874a73d446ff7f39f9f8603a4ba70dc2adb14650e9617593578e73dc90b8fed7dc6bedeb96bc3a85bc489769c381b7d3c1d745da48ff96148145c689d
-
Filesize
695KB
MD584b02872c543f94c4b2c4a7411229aa1
SHA1a339d0ccd38aaf7b065b94b9864d3a224dd8ac81
SHA2560534263b0c947bfc913ae6a07c39fc5d09e811903530ce3ca767b23bb145e131
SHA512a64880df1905a428f4b09e2b1fd939007bd9e2475f9c8db941d7960f294b3744f02374d971f3d3a6244523d664ff1b92e5c3cd50766f0998cdae20aa0a0eedfa
-
Filesize
414KB
MD5b26e403ee4499b493a9af18b0cfef7a9
SHA14a665812fae380d2ce6c76b3773710db19c00f60
SHA2564feb078d78f6ec894fb122baaf8eac045bd481da4e13ee1a86490ef3817fa24a
SHA512b6ab55b2d11bb155914bf7ea0057565b669b072a09715c987384d0235c1df9ad96b917490272a5747d5c909194368a1effc3cde3f15d41ccf23a70b1a3e8c5eb
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
359KB
MD563fc8942108c8f797d9881ac152fba74
SHA14e7aee490248bdc6b62cd53c8a2aa98d6b8e5903
SHA2567e7bd3b613f2555962e1a196d3cc3f06fb5b4cd6ad6757042c2654c7d979f8e9
SHA5127a9aab20ede0fb405f8b760debe0867c88b86e3662302c5484a7e6ff8aec7f883db8c4912a7542aa5981c3c2d474fc41076b3ba304be116b71b9c9078b96b19a