Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-10-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b.exe
Resource
win11-20241007-en
General
-
Target
416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b.exe
-
Size
698KB
-
MD5
b4a752aa7501627ab288dd3188c59e4c
-
SHA1
cf595ede743c4034c3d52ac783872e7ca0d009f4
-
SHA256
416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b
-
SHA512
e5d27819f1e28a61d0123e21c1a2692bf7806c847ce5390b656d38530864198e44819dc7eb91afbe76eaff848ad8a2cf3d7e523d8bfcca85904a1724449875ac
-
SSDEEP
12288:NMr9y90Kqw9HCX9jlF0puBt8NGz1PAqL6ZDGjpAxI9gHnpLoTW5u8:gyt9iXB37Z7MGjiI9gpLoeu8
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral4/memory/3032-18-0x0000000004BF0000-0x0000000004C0A000-memory.dmp healer behavioral4/memory/3032-20-0x00000000071E0000-0x00000000071F8000-memory.dmp healer behavioral4/memory/3032-42-0x00000000071E0000-0x00000000071F2000-memory.dmp healer behavioral4/memory/3032-48-0x00000000071E0000-0x00000000071F2000-memory.dmp healer behavioral4/memory/3032-46-0x00000000071E0000-0x00000000071F2000-memory.dmp healer behavioral4/memory/3032-44-0x00000000071E0000-0x00000000071F2000-memory.dmp healer behavioral4/memory/3032-40-0x00000000071E0000-0x00000000071F2000-memory.dmp healer behavioral4/memory/3032-38-0x00000000071E0000-0x00000000071F2000-memory.dmp healer behavioral4/memory/3032-36-0x00000000071E0000-0x00000000071F2000-memory.dmp healer behavioral4/memory/3032-34-0x00000000071E0000-0x00000000071F2000-memory.dmp healer behavioral4/memory/3032-32-0x00000000071E0000-0x00000000071F2000-memory.dmp healer behavioral4/memory/3032-30-0x00000000071E0000-0x00000000071F2000-memory.dmp healer behavioral4/memory/3032-28-0x00000000071E0000-0x00000000071F2000-memory.dmp healer behavioral4/memory/3032-26-0x00000000071E0000-0x00000000071F2000-memory.dmp healer behavioral4/memory/3032-24-0x00000000071E0000-0x00000000071F2000-memory.dmp healer behavioral4/memory/3032-22-0x00000000071E0000-0x00000000071F2000-memory.dmp healer behavioral4/memory/3032-21-0x00000000071E0000-0x00000000071F2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5687.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro5687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5687.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral4/memory/3104-62-0x0000000007310000-0x0000000007356000-memory.dmp family_redline behavioral4/memory/3104-63-0x0000000007390000-0x00000000073D4000-memory.dmp family_redline behavioral4/memory/3104-69-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-97-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-95-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-93-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-91-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-89-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-87-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-85-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-83-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-81-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-79-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-77-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-75-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-73-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-71-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-67-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-65-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline behavioral4/memory/3104-64-0x0000000007390000-0x00000000073CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4336 un449033.exe 3032 pro5687.exe 3104 qu1940.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5687.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un449033.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5096 3032 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un449033.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5687.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1940.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3032 pro5687.exe 3032 pro5687.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3032 pro5687.exe Token: SeDebugPrivilege 3104 qu1940.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 808 wrote to memory of 4336 808 416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b.exe 79 PID 808 wrote to memory of 4336 808 416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b.exe 79 PID 808 wrote to memory of 4336 808 416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b.exe 79 PID 4336 wrote to memory of 3032 4336 un449033.exe 81 PID 4336 wrote to memory of 3032 4336 un449033.exe 81 PID 4336 wrote to memory of 3032 4336 un449033.exe 81 PID 4336 wrote to memory of 3104 4336 un449033.exe 85 PID 4336 wrote to memory of 3104 4336 un449033.exe 85 PID 4336 wrote to memory of 3104 4336 un449033.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b.exe"C:\Users\Admin\AppData\Local\Temp\416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un449033.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un449033.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5687.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5687.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 9724⤵
- Program crash
PID:5096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1940.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1940.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3032 -ip 30321⤵PID:4164
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
556KB
MD527f2113fcd7d63975586830b90b4b3d5
SHA18bacafba90681f0a908ebccc3a9dc6f59f05f2bd
SHA256a5419abb844fa78199c18ea053798dbc23c98ec5d6bf146477a8c63cd1490685
SHA5127bc3be018a968a8af7d371ecedb389fbab86702357cdc5b8fe3ecbde6494aa3b0719e75250458ec9c75f6b88009e0e1d0e52c24011177c7e53926ba0c6f5ed36
-
Filesize
347KB
MD5cc9cb456b99172aa4997d845f88a8c9b
SHA14bc8cd5f79dedd90d27e2cf23963bf01bc251b05
SHA2564923d5f878371aa6b4b90ec7f8417ac57aed2f86d7d03bf7c8cdc4430e8946bb
SHA51213489da77b68163eb3db076826e29802675adf194f7fa3b5de7fbf4f3d8c197c6e9fd7c4befe8fc5de4fea02e2ef5630e32c5680a14a23dd0cc9e2824ff7c4da
-
Filesize
406KB
MD504568b5bfb344c81412bb209740c7e3f
SHA1bc643e137c6bb56bc02664415656fc20da5315dc
SHA25608db8af9c64e169dac4d0d25a95c5d12e611a4a0132d3e51754e4ae9305e3e1e
SHA5122fa123a755490efc018a2f7b238d1f69781a0a3efeb9592be8d45a3313b877e4b42b268248399bc9199a409971df19eb92047d9a6e399d2cde87a99c102877d6