Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 05:53
Static task
static1
Behavioral task
behavioral1
Sample
6d2516372c518721eae17ec0ba4b9b8364426cb8a4ae00da19d2bb60dc81c8afN.exe
Resource
win10v2004-20241007-en
General
-
Target
6d2516372c518721eae17ec0ba4b9b8364426cb8a4ae00da19d2bb60dc81c8afN.exe
-
Size
416KB
-
MD5
2f45ba95e4dbd98d800c4434adb65670
-
SHA1
2dc535effe1112bcfa1da96cd340c1f349ef9664
-
SHA256
6d2516372c518721eae17ec0ba4b9b8364426cb8a4ae00da19d2bb60dc81c8af
-
SHA512
67d46795fab197d7bb633cbcfb88042728623532c09c5a46c4aa2fd4fb913db5851ef4205964ceb78b22767bd5f78d6cd7bfd6c583d4b30702713256af687677
-
SSDEEP
6144:Kdy+bnr+xp0yN90QEYUEqyJZSMLJpKWDOp2MkLpG4yzkovUmjPjQaxdEHJ:XMrhy90mNAWpKWqpJaG4qdHQaqJ
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/624-12-0x0000000004C00000-0x0000000004C1A000-memory.dmp healer behavioral1/memory/624-14-0x0000000004C90000-0x0000000004CA8000-memory.dmp healer behavioral1/memory/624-15-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/624-42-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/624-40-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/624-39-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/624-36-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/624-34-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/624-32-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/624-30-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/624-28-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/624-26-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/624-24-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/624-22-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/624-20-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/624-18-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/624-16-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8687614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8687614.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8687614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8687614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8687614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8687614.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023ba8-51.dat family_redline behavioral1/memory/2684-54-0x0000000000BA0000-0x0000000000BD0000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 624 a8687614.exe 2684 b9467585.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8687614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8687614.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d2516372c518721eae17ec0ba4b9b8364426cb8a4ae00da19d2bb60dc81c8afN.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 740 624 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d2516372c518721eae17ec0ba4b9b8364426cb8a4ae00da19d2bb60dc81c8afN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8687614.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9467585.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 624 a8687614.exe 624 a8687614.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 624 a8687614.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3744 wrote to memory of 624 3744 6d2516372c518721eae17ec0ba4b9b8364426cb8a4ae00da19d2bb60dc81c8afN.exe 83 PID 3744 wrote to memory of 624 3744 6d2516372c518721eae17ec0ba4b9b8364426cb8a4ae00da19d2bb60dc81c8afN.exe 83 PID 3744 wrote to memory of 624 3744 6d2516372c518721eae17ec0ba4b9b8364426cb8a4ae00da19d2bb60dc81c8afN.exe 83 PID 3744 wrote to memory of 2684 3744 6d2516372c518721eae17ec0ba4b9b8364426cb8a4ae00da19d2bb60dc81c8afN.exe 94 PID 3744 wrote to memory of 2684 3744 6d2516372c518721eae17ec0ba4b9b8364426cb8a4ae00da19d2bb60dc81c8afN.exe 94 PID 3744 wrote to memory of 2684 3744 6d2516372c518721eae17ec0ba4b9b8364426cb8a4ae00da19d2bb60dc81c8afN.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d2516372c518721eae17ec0ba4b9b8364426cb8a4ae00da19d2bb60dc81c8afN.exe"C:\Users\Admin\AppData\Local\Temp\6d2516372c518721eae17ec0ba4b9b8364426cb8a4ae00da19d2bb60dc81c8afN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a8687614.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a8687614.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 10843⤵
- Program crash
PID:740
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b9467585.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b9467585.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 624 -ip 6241⤵PID:856
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD596900966e55098397dda005e7ca5593c
SHA1c194a51790a99bfded36d24d313eb4f07caa18ed
SHA256a351511bd5d04d83e4bf8167e4bbc5f6599e2a272092597bd82e9391855cf21a
SHA512e62f0e49b44c36e848a90e5f67feee0c551e69466e8adad9d58d011e4a1cf3822ad9da56c8e36e92accffa602ca8f930eda96a190c69f9473a7442f05899e3c4
-
Filesize
168KB
MD5fb8500178b1fa09cc6b1a5e55f3cfff5
SHA1fcefde90989fa8e4227023f74ba0a6a398ac7c79
SHA25619bf8d5b5ab47011dcb4847708e71f8c7456f867ca7209a52e162daa1ca2c358
SHA5120942dacfc4904be9dc7d237a19060f3552bb4f5399781ce6b3aeaaa8bce227833ff62962f0f305ec904806fa9cbbf31122afdfefce2b81ffb267e544815a008f