Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
28-10-2024 22:59
Static task
static1
Behavioral task
behavioral1
Sample
e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe
Resource
win11-20241007-en
General
-
Target
e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe
-
Size
689KB
-
MD5
419f78993f29965cd3c3fcfc459937b1
-
SHA1
aa1244f33844b769ff336810ce57e7c322aa07ff
-
SHA256
e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698
-
SHA512
34468c8953b1a0c07b9c8b01ccee8705328ff16a666c62dd01cce0f31e96e93cb0659e21761c4066613d194484a587574265c5ff8ba916ea706c6be9b0901175
-
SSDEEP
12288:TMrvy90nY6MGhbe/HHXA2HWDZa7cMF5sptCC/a1na23EEEFxJajsno4UdeMJDCON:MyAY6MQbATHWaF5sGC/a1nmEEFujs4ei
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral3/memory/4980-19-0x00000000029A0000-0x00000000029BA000-memory.dmp healer behavioral3/memory/4980-21-0x0000000005490000-0x00000000054A8000-memory.dmp healer behavioral3/memory/4980-22-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral3/memory/4980-27-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral3/memory/4980-49-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral3/memory/4980-47-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral3/memory/4980-45-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral3/memory/4980-43-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral3/memory/4980-41-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral3/memory/4980-39-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral3/memory/4980-36-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral3/memory/4980-33-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral3/memory/4980-31-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral3/memory/4980-30-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral3/memory/4980-25-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral3/memory/4980-23-0x0000000005490000-0x00000000054A2000-memory.dmp healer behavioral3/memory/4980-37-0x0000000005490000-0x00000000054A2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9829.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral3/memory/4560-61-0x0000000002980000-0x00000000029C6000-memory.dmp family_redline behavioral3/memory/4560-62-0x0000000004F60000-0x0000000004FA4000-memory.dmp family_redline behavioral3/memory/4560-63-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-74-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-96-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-94-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-92-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-90-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-89-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-86-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-84-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-82-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-78-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-76-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-72-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-70-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-68-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-66-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-64-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral3/memory/4560-80-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4572 un304040.exe 4980 pro9829.exe 4560 qu0530.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9829.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un304040.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4172 4980 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un304040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9829.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0530.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4980 pro9829.exe 4980 pro9829.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4980 pro9829.exe Token: SeDebugPrivilege 4560 qu0530.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4572 4588 e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe 80 PID 4588 wrote to memory of 4572 4588 e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe 80 PID 4588 wrote to memory of 4572 4588 e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe 80 PID 4572 wrote to memory of 4980 4572 un304040.exe 81 PID 4572 wrote to memory of 4980 4572 un304040.exe 81 PID 4572 wrote to memory of 4980 4572 un304040.exe 81 PID 4572 wrote to memory of 4560 4572 un304040.exe 86 PID 4572 wrote to memory of 4560 4572 un304040.exe 86 PID 4572 wrote to memory of 4560 4572 un304040.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe"C:\Users\Admin\AppData\Local\Temp\e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un304040.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un304040.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9829.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9829.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 12084⤵
- Program crash
PID:4172
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0530.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0530.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4980 -ip 49801⤵PID:3708
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5810bffb656c74128de6943257b81276b
SHA148c1b2b62d7103a800c9f46c92b7eb952d6787ba
SHA2565ed01b320ad843d2c870e4b21cd8ca3e9b4bb1bd95d3cd15987f67a966012ca4
SHA5124ed74a7b665811ee6c281ea7c8891a5fc143f4c05f39fdd25a64f9349a552d6379c9a6e9556e546551f809933557b05811a14fda4a94809fc7208272a08e28cb
-
Filesize
314KB
MD5f637a5455b80c0146d7fc0f4fd624265
SHA11863bb9c6164223d5c14be7a50ecbd77382f317c
SHA25650f32f0c9f444dd20036da0fc5539007f622d89d9978f2bd0da494f2d62a4ad1
SHA512f9ed204371b284358cc89b7632782bdf0b9dff009e513e417061354c7ac7e92dec1bf146b43a689995633235ba35dd4c2c8b1a5a5c84df4304f3d19480d5c754
-
Filesize
372KB
MD5bb2dc070fc4f34f4b68b7be7bc9f1543
SHA14fbf083e36041eb1b41b53b07e53ef0dca373064
SHA2566b3e1fa16735d65ef89e659c39d48f37fc0d270e6997548ff58d1915561a6ae1
SHA512d7f587013f2e6b697cb51907f1cfa303dc13910b4479bc36d78984b091b9795e4e7c9b0f1a067ee7d6b5ed4b51b7098a38cd79cc369ced28662ed1f3af2b94d4