Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe
Resource
win11-20241007-en
General
-
Target
644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe
-
Size
818KB
-
MD5
683b68fec2236c364f13a40f78fcd8cf
-
SHA1
043ff22f809153d1fb5f8da442a6337f27d3aed1
-
SHA256
644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667
-
SHA512
c460773dfee9438c41fdae118b27b85778ebc9ca33a87127904c590fe55473b0684d541dcfcf13c7d24208f9a7e347d7dccb45b85c9ef77efe42faed5667565f
-
SSDEEP
12288:9Mrgy90spivgcuraF3iFbctjTQu6Wnp1xPLtEqE8UhcTVV6zggdbwx1PQIc:hy1CgcVuaTp6WoqE8U8VkzXbwxRQ3
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0007000000019490-24.dat healer behavioral1/memory/2356-28-0x0000000000990000-0x000000000099A000-memory.dmp healer behavioral1/memory/2916-39-0x0000000000870000-0x000000000088A000-memory.dmp healer behavioral1/memory/2916-40-0x0000000000950000-0x0000000000968000-memory.dmp healer behavioral1/memory/2916-41-0x0000000000950000-0x0000000000962000-memory.dmp healer behavioral1/memory/2916-42-0x0000000000950000-0x0000000000962000-memory.dmp healer behavioral1/memory/2916-68-0x0000000000950000-0x0000000000962000-memory.dmp healer behavioral1/memory/2916-66-0x0000000000950000-0x0000000000962000-memory.dmp healer behavioral1/memory/2916-64-0x0000000000950000-0x0000000000962000-memory.dmp healer behavioral1/memory/2916-62-0x0000000000950000-0x0000000000962000-memory.dmp healer behavioral1/memory/2916-60-0x0000000000950000-0x0000000000962000-memory.dmp healer behavioral1/memory/2916-58-0x0000000000950000-0x0000000000962000-memory.dmp healer behavioral1/memory/2916-56-0x0000000000950000-0x0000000000962000-memory.dmp healer behavioral1/memory/2916-54-0x0000000000950000-0x0000000000962000-memory.dmp healer behavioral1/memory/2916-52-0x0000000000950000-0x0000000000962000-memory.dmp healer behavioral1/memory/2916-50-0x0000000000950000-0x0000000000962000-memory.dmp healer behavioral1/memory/2916-49-0x0000000000950000-0x0000000000962000-memory.dmp healer behavioral1/memory/2916-47-0x0000000000950000-0x0000000000962000-memory.dmp healer behavioral1/memory/2916-44-0x0000000000950000-0x0000000000962000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu6598.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu6598.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu6598.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu6598.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu6598.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro3643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3643.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2696-81-0x0000000000EE0000-0x0000000000F26000-memory.dmp family_redline behavioral1/memory/2696-82-0x0000000000F70000-0x0000000000FB4000-memory.dmp family_redline behavioral1/memory/2696-83-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-84-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-86-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-88-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-90-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-92-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-94-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-96-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-98-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-100-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-102-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-104-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-106-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-108-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-110-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-116-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-114-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline behavioral1/memory/2696-112-0x0000000000F70000-0x0000000000FAE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 2572 unio5502.exe 2560 unio6595.exe 2356 pro3643.exe 2916 qu6598.exe 2696 rxq08s62.exe -
Loads dropped DLL 11 IoCs
pid Process 1528 644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe 2572 unio5502.exe 2572 unio5502.exe 2560 unio6595.exe 2560 unio6595.exe 2560 unio6595.exe 2560 unio6595.exe 2916 qu6598.exe 2572 unio5502.exe 2572 unio5502.exe 2696 rxq08s62.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features pro3643.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3643.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features qu6598.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu6598.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio5502.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio6595.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxq08s62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio5502.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio6595.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6598.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2356 pro3643.exe 2356 pro3643.exe 2916 qu6598.exe 2916 qu6598.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2356 pro3643.exe Token: SeDebugPrivilege 2916 qu6598.exe Token: SeDebugPrivilege 2696 rxq08s62.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2572 1528 644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe 30 PID 1528 wrote to memory of 2572 1528 644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe 30 PID 1528 wrote to memory of 2572 1528 644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe 30 PID 1528 wrote to memory of 2572 1528 644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe 30 PID 1528 wrote to memory of 2572 1528 644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe 30 PID 1528 wrote to memory of 2572 1528 644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe 30 PID 1528 wrote to memory of 2572 1528 644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe 30 PID 2572 wrote to memory of 2560 2572 unio5502.exe 31 PID 2572 wrote to memory of 2560 2572 unio5502.exe 31 PID 2572 wrote to memory of 2560 2572 unio5502.exe 31 PID 2572 wrote to memory of 2560 2572 unio5502.exe 31 PID 2572 wrote to memory of 2560 2572 unio5502.exe 31 PID 2572 wrote to memory of 2560 2572 unio5502.exe 31 PID 2572 wrote to memory of 2560 2572 unio5502.exe 31 PID 2560 wrote to memory of 2356 2560 unio6595.exe 32 PID 2560 wrote to memory of 2356 2560 unio6595.exe 32 PID 2560 wrote to memory of 2356 2560 unio6595.exe 32 PID 2560 wrote to memory of 2356 2560 unio6595.exe 32 PID 2560 wrote to memory of 2356 2560 unio6595.exe 32 PID 2560 wrote to memory of 2356 2560 unio6595.exe 32 PID 2560 wrote to memory of 2356 2560 unio6595.exe 32 PID 2560 wrote to memory of 2916 2560 unio6595.exe 33 PID 2560 wrote to memory of 2916 2560 unio6595.exe 33 PID 2560 wrote to memory of 2916 2560 unio6595.exe 33 PID 2560 wrote to memory of 2916 2560 unio6595.exe 33 PID 2560 wrote to memory of 2916 2560 unio6595.exe 33 PID 2560 wrote to memory of 2916 2560 unio6595.exe 33 PID 2560 wrote to memory of 2916 2560 unio6595.exe 33 PID 2572 wrote to memory of 2696 2572 unio5502.exe 35 PID 2572 wrote to memory of 2696 2572 unio5502.exe 35 PID 2572 wrote to memory of 2696 2572 unio5502.exe 35 PID 2572 wrote to memory of 2696 2572 unio5502.exe 35 PID 2572 wrote to memory of 2696 2572 unio5502.exe 35 PID 2572 wrote to memory of 2696 2572 unio5502.exe 35 PID 2572 wrote to memory of 2696 2572 unio5502.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe"C:\Users\Admin\AppData\Local\Temp\644a69d7a8ab8d84f686f24e30b12cd21699911e8a0ee7cef8bdae4840cc8667.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5502.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5502.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio6595.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio6595.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro3643.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro3643.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu6598.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu6598.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rxq08s62.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rxq08s62.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD58fb75576aaee8b6d470b7cee083bfe74
SHA17af2096362f5bb76b1ca123844ec816d71947926
SHA256a8660aabe3ef66798d1ecc74d53dce57c9071adcecfc6b1373f9500fe2b56dbb
SHA512cdd6a756d434a91a24a86b3b2e1f83397bb56069ce8ad1344280ecec6256ba0e39f6a871366a6f2e7aaec31d16aad3540d72c2f2d9f7a2f0df7e005f8acdea8c
-
Filesize
349KB
MD5a2a316ff9fa56e0cf20eef0721bf2f83
SHA1c9fd5bee654eb1c3b4febd72542155acd99324fe
SHA256f5d8abe85ed83cd9b95c23fcd4dec4ca69b1b797afc7322e6f2e83156d64de7c
SHA5127f2b23737ae5c9259ae3a29d8580bfe2f077a9a533fc8d2a936f5ba8c4f6a11c09f0717bd210d6bb940f92061b5d4b4f095255c3a3abd1c08dcaff85dc7cbc27
-
Filesize
334KB
MD55a3606fe024835ec93cfa5ee8a6f9a22
SHA10afc7094202038c1e87e0583e9e8711b966a9cad
SHA2563e7c03738c640927b1ac1d9f156e6e804fd7f55347143f73bffcb5136a49adcb
SHA5122e07279503af6c7b4dba568f3833f32bfe58d3011b49f366252af37eeb20467c8dfb7658b633b02fffd3361cdd4c3ce09475bcce6d57fa8e2884a07d33362492
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
290KB
MD5dcaa6556d4145d5f38d2facf1411d405
SHA177b40c27d9c42c28fa9211f9fda0c5cf5b3a5a08
SHA2565543d4b0115a52081b47d7fd76e8118cf2093f3f2a0e4bc1aaa66572b173c4b7
SHA512ec5ca805bd2483aac79636fbd5b53091cf7e7cadc43a260d3f3f69a405a9aa095d3c27cdb1b02e19f154a51fa10b65c8686bcfa0b4c453257640a870af291bb1