Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 11:53
Static task
static1
Behavioral task
behavioral1
Sample
c3a98931781898fef100b8d060571e098324111ba6be4bf6bb012c98d762a909.exe
Resource
win10v2004-20241007-en
General
-
Target
c3a98931781898fef100b8d060571e098324111ba6be4bf6bb012c98d762a909.exe
-
Size
695KB
-
MD5
074cfabe4f8aa67e7ea2c787b6f3031c
-
SHA1
f76ca174f6f37b6d2bd306c33aa963f178ce2dc1
-
SHA256
c3a98931781898fef100b8d060571e098324111ba6be4bf6bb012c98d762a909
-
SHA512
d6399b166a5c47d4ccd48332c58ad36b82cf992799f9bab7e224a76f354517c8316bdb737a1c375ac362aca3cccecb2da966ca6f656d096b33ef8c8c2ded15ac
-
SSDEEP
12288:ey90hU8daUd/5oHPX+fTeP8FNSXmRQ8v5mLo+F+0PBrnn+XYa:eyGUwhAm6ZXmuLqun+XYa
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b98-12.dat healer behavioral1/memory/3736-15-0x0000000000AF0000-0x0000000000AFA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az715038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az715038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az715038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az715038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az715038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az715038.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1684-22-0x0000000004B70000-0x0000000004BAC000-memory.dmp family_redline behavioral1/memory/1684-24-0x0000000004E10000-0x0000000004E4A000-memory.dmp family_redline behavioral1/memory/1684-28-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-36-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-88-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-86-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-84-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-82-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-80-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-78-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-76-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-72-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-70-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-68-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-66-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-64-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-62-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-60-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-58-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-56-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-54-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-52-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-48-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-46-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-44-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-42-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-40-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-38-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-34-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-32-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-30-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-74-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-50-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-26-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline behavioral1/memory/1684-25-0x0000000004E10000-0x0000000004E45000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 348 ki638922.exe 3736 az715038.exe 1684 bu567871.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az715038.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c3a98931781898fef100b8d060571e098324111ba6be4bf6bb012c98d762a909.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ki638922.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3a98931781898fef100b8d060571e098324111ba6be4bf6bb012c98d762a909.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ki638922.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bu567871.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3736 az715038.exe 3736 az715038.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3736 az715038.exe Token: SeDebugPrivilege 1684 bu567871.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2596 wrote to memory of 348 2596 c3a98931781898fef100b8d060571e098324111ba6be4bf6bb012c98d762a909.exe 83 PID 2596 wrote to memory of 348 2596 c3a98931781898fef100b8d060571e098324111ba6be4bf6bb012c98d762a909.exe 83 PID 2596 wrote to memory of 348 2596 c3a98931781898fef100b8d060571e098324111ba6be4bf6bb012c98d762a909.exe 83 PID 348 wrote to memory of 3736 348 ki638922.exe 84 PID 348 wrote to memory of 3736 348 ki638922.exe 84 PID 348 wrote to memory of 1684 348 ki638922.exe 93 PID 348 wrote to memory of 1684 348 ki638922.exe 93 PID 348 wrote to memory of 1684 348 ki638922.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3a98931781898fef100b8d060571e098324111ba6be4bf6bb012c98d762a909.exe"C:\Users\Admin\AppData\Local\Temp\c3a98931781898fef100b8d060571e098324111ba6be4bf6bb012c98d762a909.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki638922.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ki638922.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\az715038.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\az715038.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bu567871.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bu567871.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD5e5dadfe9cb3550d2809932a2e3c8e309
SHA114436da5d7a34f335bb7fd78612a5b99e56a5e41
SHA2569b77d082570a2d4585c9d36d0084ec1b0be4698b028251c228d7a040bfa67c69
SHA51228ad4883fcb9773159c98ab8e44425e7d03997031fbdcff3cc30c8d7e3bf4108e8f9a6ef138acdf13f2b2de112318ece9173b2c2d88bee8fb45f3c89c5c37ce0
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
359KB
MD5417b389e131dd5c381973d22c19fd1c8
SHA16af044b80a07558c133ffcdea57588e4dc28dd21
SHA25625945a132e2952c9ebeabe393270cde011674e4f0690ed7d99d4240f0fee0b67
SHA51222cddc22ccde850b2f240c3cb7305c13aa4b927f42b684bdb3dacec17987157eba52e999130ea20a88ca81ef7c2cf98a4f17f2133df24f1e183046f663103e26