Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
287c9660c07ac4675a47677458b15f818558daffa39761f0672a7da1ed5c1a65.exe
Resource
win10v2004-20241007-en
General
-
Target
287c9660c07ac4675a47677458b15f818558daffa39761f0672a7da1ed5c1a65.exe
-
Size
568KB
-
MD5
9c7a6959f8895c9b1a23bb1b81a6f4a7
-
SHA1
562f4c2035ba88fb4e0838f11a71ad459c744725
-
SHA256
287c9660c07ac4675a47677458b15f818558daffa39761f0672a7da1ed5c1a65
-
SHA512
12abe3a40eac564ecf78da56e1fc92e05bbe51da530f6e27aebb53520d9dabffdc500ec22eb1ae260d1f967a82e7128c7aee2cd0132340e57c11c9c37ec0f21b
-
SSDEEP
12288:/y9098+PIfhtGltMHDbTPBT5t5eYIeioiek4LNARp0x:/yeUGltCXFVt5eYIFQnWRp0x
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000023c9c-12.dat healer behavioral1/memory/4928-15-0x0000000000DF0000-0x0000000000DFA000-memory.dmp healer -
Healer family
-
Processes:
it287319.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it287319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it287319.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it287319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it287319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it287319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it287319.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1084-22-0x0000000004AF0000-0x0000000004B2C000-memory.dmp family_redline behavioral1/memory/1084-24-0x0000000004BB0000-0x0000000004BEA000-memory.dmp family_redline behavioral1/memory/1084-28-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-36-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-88-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-86-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-84-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-80-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-78-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-76-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-74-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-72-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-70-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-68-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-66-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-64-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-60-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-58-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-56-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-54-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-52-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-50-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-48-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-46-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-42-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-40-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-38-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-34-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-32-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-30-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-82-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-62-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-44-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-26-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline behavioral1/memory/1084-25-0x0000000004BB0000-0x0000000004BE5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziNo7819.exeit287319.exejr368764.exepid Process 3824 ziNo7819.exe 4928 it287319.exe 1084 jr368764.exe -
Processes:
it287319.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it287319.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
287c9660c07ac4675a47677458b15f818558daffa39761f0672a7da1ed5c1a65.exeziNo7819.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 287c9660c07ac4675a47677458b15f818558daffa39761f0672a7da1ed5c1a65.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziNo7819.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
287c9660c07ac4675a47677458b15f818558daffa39761f0672a7da1ed5c1a65.exeziNo7819.exejr368764.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 287c9660c07ac4675a47677458b15f818558daffa39761f0672a7da1ed5c1a65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziNo7819.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr368764.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
it287319.exepid Process 4928 it287319.exe 4928 it287319.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
it287319.exejr368764.exedescription pid Process Token: SeDebugPrivilege 4928 it287319.exe Token: SeDebugPrivilege 1084 jr368764.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
287c9660c07ac4675a47677458b15f818558daffa39761f0672a7da1ed5c1a65.exeziNo7819.exedescription pid Process procid_target PID 1916 wrote to memory of 3824 1916 287c9660c07ac4675a47677458b15f818558daffa39761f0672a7da1ed5c1a65.exe 82 PID 1916 wrote to memory of 3824 1916 287c9660c07ac4675a47677458b15f818558daffa39761f0672a7da1ed5c1a65.exe 82 PID 1916 wrote to memory of 3824 1916 287c9660c07ac4675a47677458b15f818558daffa39761f0672a7da1ed5c1a65.exe 82 PID 3824 wrote to memory of 4928 3824 ziNo7819.exe 83 PID 3824 wrote to memory of 4928 3824 ziNo7819.exe 83 PID 3824 wrote to memory of 1084 3824 ziNo7819.exe 88 PID 3824 wrote to memory of 1084 3824 ziNo7819.exe 88 PID 3824 wrote to memory of 1084 3824 ziNo7819.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\287c9660c07ac4675a47677458b15f818558daffa39761f0672a7da1ed5c1a65.exe"C:\Users\Admin\AppData\Local\Temp\287c9660c07ac4675a47677458b15f818558daffa39761f0672a7da1ed5c1a65.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNo7819.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNo7819.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it287319.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it287319.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr368764.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr368764.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
415KB
MD5da62bc2b677c6f661b9d93b95f4ce67d
SHA12b78fe3adf16f42d9d539601c77bae4b195d081f
SHA25641e810e3b4db8e833bf643304da7cd0b1d07bb36fd6e97282fb3c465e7b99ea8
SHA5127348b043fe7f0af3e0442c021148ce5a07fc29c92ffa23efa5a169c9cd0cb95dacdc97245680f4ad09df64a33ab90bd0f1cfe7366b6219c76d7cf14cfd25e5cd
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD5e12dc270ace18045e5e10abf8a3ec2ba
SHA1e86b928548fc4817c1b71a461035e2228673d248
SHA25695ab6617929867dfb4c543de2d302559e032640efe277d741c7506ad65999f78
SHA51254e5ff135ec224b04cc28e1fce662f2592a98cea809729f0e886b1d6f7b70562af4277518ec5fcf21ff4da1fc435718d37f2c8ae082654b8b966a9d544649e50