Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-10-2024 23:04
Static task
static1
Behavioral task
behavioral1
Sample
d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe
Resource
win11-20241007-en
General
-
Target
d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe
-
Size
658KB
-
MD5
a8218ad88fa977c148d432a96a626bf6
-
SHA1
d1b33828fa7491a165bc3307d8f6f4f4755df501
-
SHA256
d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738
-
SHA512
577696f114c7b0e7d30bcc311bf87ae2c6f9729eb89b6e3a0f20e449711fa1fd9529b58fc485f4899492241be50f6b452312fa264239354a6bf69e30fcdeb6ef
-
SSDEEP
12288:DMruy90+UdjGJWxf0kiVxkVuLt8/EwkgU44LzWKKf8vU9oE:5yDWjIeUEuhnXgF42KYiE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral4/memory/3384-19-0x00000000024C0000-0x00000000024DA000-memory.dmp healer behavioral4/memory/3384-21-0x00000000027B0000-0x00000000027C8000-memory.dmp healer behavioral4/memory/3384-29-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral4/memory/3384-31-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral4/memory/3384-49-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral4/memory/3384-47-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral4/memory/3384-45-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral4/memory/3384-43-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral4/memory/3384-41-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral4/memory/3384-39-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral4/memory/3384-37-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral4/memory/3384-33-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral4/memory/3384-27-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral4/memory/3384-25-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral4/memory/3384-23-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral4/memory/3384-35-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral4/memory/3384-22-0x00000000027B0000-0x00000000027C2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0318.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro0318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0318.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral4/memory/3616-63-0x0000000002430000-0x0000000002476000-memory.dmp family_redline behavioral4/memory/3616-64-0x0000000004B50000-0x0000000004B94000-memory.dmp family_redline behavioral4/memory/3616-72-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-76-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-98-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-96-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-92-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-90-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-88-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-86-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-84-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-82-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-81-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-74-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-70-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-94-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-78-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-68-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-66-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline behavioral4/memory/3616-65-0x0000000004B50000-0x0000000004B8F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2468 un530290.exe 3384 pro0318.exe 3616 qu7572.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0318.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un530290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4416 3384 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un530290.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0318.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7572.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3384 pro0318.exe 3384 pro0318.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3384 pro0318.exe Token: SeDebugPrivilege 3616 qu7572.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2468 1560 d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe 80 PID 1560 wrote to memory of 2468 1560 d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe 80 PID 1560 wrote to memory of 2468 1560 d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe 80 PID 2468 wrote to memory of 3384 2468 un530290.exe 81 PID 2468 wrote to memory of 3384 2468 un530290.exe 81 PID 2468 wrote to memory of 3384 2468 un530290.exe 81 PID 2468 wrote to memory of 3616 2468 un530290.exe 86 PID 2468 wrote to memory of 3616 2468 un530290.exe 86 PID 2468 wrote to memory of 3616 2468 un530290.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe"C:\Users\Admin\AppData\Local\Temp\d9725d37c9ad4a2a83c8a7d80004c2f24ca9f1f464732b92fe88fe32fa760738.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un530290.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un530290.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0318.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0318.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3384 -s 9724⤵
- Program crash
PID:4416
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7572.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7572.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3384 -ip 33841⤵PID:2812
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD569e08451d317b29cc4ec452fa877491a
SHA15b6efafa9a95f867a28baf569e91f07d61656193
SHA256d35f42c4c63c7cba0a08c1b2fc498c905b92d9999f0a29daa7e0d19cb1f170b0
SHA512d19f98769def60b2d0afc5de495f4db6c15f7f3a1ccf43d58fb8637bcacc802a7014ad633cb96a7b079f4cbf2fbdbd23c2889632f0655cdea6af10720aeab210
-
Filesize
235KB
MD5286043e29340f4e9be8245655cfc5544
SHA1acb4ac67aed93f4868adb55919d1687f5c9c06d6
SHA25670f7ea1b6248622dc2595f828feb244e473e96ab9bdfa8d3032554c802f74daa
SHA5128291b19547eb671c5bb9edadc8a59c2366f4e9ea6bd71681d473d3a8fe3156032d1bcc0765a4a7cfc86beb34b48a71b1cfed2f4326a519bd6ba6fac7172fc90f
-
Filesize
294KB
MD595980a917d5cf6fccefa0382940cf584
SHA11431f14d21b8dc2acdda68e58b025f08bea94e35
SHA256b108f04a1776fd8397fc21472b789bb59e552e6330cabb2382378377c88fcee3
SHA5122d4d65800783434a7b079d74d952168ec05612633ce4f82f33f52a9e53403c28b7e1c15ef07fa30d015a27ac9bbd5ea32c23db33d19d6c76795d3d975915b7a1