Analysis
-
max time kernel
148s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe
Resource
win10v2004-20241007-en
General
-
Target
d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe
-
Size
657KB
-
MD5
53aeb57a80297336b726fe0a5233b348
-
SHA1
de49f7dc5bbd8ff6d2c2413638b161ad3da09cf8
-
SHA256
d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4
-
SHA512
6a9327672e6daf3284d27fa36780fec6b083012167ce510305c30b87147c30e7e41950b144dcf8b203e627cfe9a393d1e194ba752a32627970d6536b60e95463
-
SSDEEP
12288:dMrby90F8GP+laF7Azs/iIp9+16lcbsnGDH0RvkpUZo:eyi8GPCaF7Azu3PcbKeHgcpUm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/memory/1332-18-0x0000000004990000-0x00000000049AA000-memory.dmp healer behavioral1/memory/1332-20-0x0000000007110000-0x0000000007128000-memory.dmp healer behavioral1/memory/1332-26-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-48-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-46-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-44-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-42-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-40-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-38-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-39-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-36-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-34-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-32-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-30-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-29-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-27-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-24-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-21-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1332-23-0x0000000007110000-0x0000000007122000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6424.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1628-60-0x0000000004A50000-0x0000000004A96000-memory.dmp family_redline behavioral1/memory/1628-61-0x0000000007730000-0x0000000007774000-memory.dmp family_redline behavioral1/memory/1628-93-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-96-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-91-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-87-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-83-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-81-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-80-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-77-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-75-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-73-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-71-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-69-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-65-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-63-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-89-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-85-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-67-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1628-62-0x0000000007730000-0x000000000776F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4540 un002349.exe 1332 pro6424.exe 1628 qu8444.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6424.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un002349.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5004 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2780 1332 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un002349.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6424.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8444.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1332 pro6424.exe 1332 pro6424.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1332 pro6424.exe Token: SeDebugPrivilege 1628 qu8444.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3968 wrote to memory of 4540 3968 d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe 84 PID 3968 wrote to memory of 4540 3968 d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe 84 PID 3968 wrote to memory of 4540 3968 d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe 84 PID 4540 wrote to memory of 1332 4540 un002349.exe 85 PID 4540 wrote to memory of 1332 4540 un002349.exe 85 PID 4540 wrote to memory of 1332 4540 un002349.exe 85 PID 4540 wrote to memory of 1628 4540 un002349.exe 98 PID 4540 wrote to memory of 1628 4540 un002349.exe 98 PID 4540 wrote to memory of 1628 4540 un002349.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe"C:\Users\Admin\AppData\Local\Temp\d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un002349.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un002349.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6424.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6424.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 10844⤵
- Program crash
PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8444.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8444.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1332 -ip 13321⤵PID:740
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5004
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
515KB
MD5e8eec27b7578cea31f4d8e6253ebb187
SHA1de3fc1b1946e424c5265f8e1571a6fd973f82b54
SHA25657647ac4e0f86f5b4125ef268ba15e7d3aef12b8eb4b3a48cf09fdaba7add04d
SHA5126ee6156bfa8d67492de45eed6abb206af0d1aea22e703a3dd57879e1e5e1977bff5b737ab7dfef2e9768264a270388b4d955ab46ca65dc12659035cb95baf058
-
Filesize
284KB
MD50185cd41be13dc3cdf93788b8129e461
SHA163d3a631769ebcaba0ecd0c921096ce844c469da
SHA256e232d62df785bb6a6e21fd04fec4ad22ebb4004c1efde418fcf0251938e4c883
SHA51221b0c1a8105ff8f513aae5019cba28d492278c08b246834780daad0d8be6fd87916954afaf3480995c320d8b7ca5c253a5f2afc07991f01697e490504f3e14da
-
Filesize
342KB
MD56925f6b4ca4bbf2bfa17851e64ce0da7
SHA146b1875729a64d70aa1d9313ccd68e82fdb00e61
SHA25675960e3b365355cabf15babbb893e74e3633b4eb36f933998d1106f78b93ef81
SHA512fa15d45168070cf2a397fa087ec82427d2fd73ab9056d44e5c96dc5ddfbf391fe329c1514464b04fa215b718073a36fb61fc95e040d140e8cfb49bcbe1595500