Analysis
-
max time kernel
14s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 21:57
Static task
static1
Behavioral task
behavioral1
Sample
733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe
Resource
win10v2004-20241007-en
General
-
Target
733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe
-
Size
658KB
-
MD5
c0e8d44559834eae09f1274dd38c8b22
-
SHA1
d93281f69b601d526276c221f72ea8aa27289c0b
-
SHA256
733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7
-
SHA512
fba132a94cab28a466f596b5d61d62618d9161cc2a62ea25e5f773678e6e1cfc9e49d30dbd48576b5546e544ff96c209ed66af999264c498cab0779032c84c70
-
SSDEEP
12288:cMrky90X+pXJPa43VZWVI81Af1gKHNdYo04s44I+3t//SSL/4:gyCIfWVeGKHzYo04oT3N/Sw4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3640-18-0x0000000004920000-0x000000000493A000-memory.dmp healer behavioral1/memory/3640-20-0x0000000004BC0000-0x0000000004BD8000-memory.dmp healer behavioral1/memory/3640-48-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/3640-46-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/3640-44-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/3640-42-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/3640-40-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/3640-38-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/3640-36-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/3640-34-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/3640-32-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/3640-30-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/3640-28-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/3640-26-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/3640-24-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/3640-22-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/3640-21-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0398.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0398.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4508-60-0x0000000004B20000-0x0000000004B66000-memory.dmp family_redline behavioral1/memory/4508-61-0x0000000007180000-0x00000000071C4000-memory.dmp family_redline behavioral1/memory/4508-83-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-95-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-93-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-91-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-89-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-87-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-85-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-81-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-79-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-78-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-75-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-73-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-71-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-69-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-67-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-65-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-63-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4508-62-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 632 un052974.exe 3640 pro0398.exe 4508 qu5463.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0398.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un052974.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1488 3640 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un052974.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0398.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5463.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3640 pro0398.exe 3640 pro0398.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3640 pro0398.exe Token: SeDebugPrivilege 4508 qu5463.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4520 wrote to memory of 632 4520 733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe 84 PID 4520 wrote to memory of 632 4520 733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe 84 PID 4520 wrote to memory of 632 4520 733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe 84 PID 632 wrote to memory of 3640 632 un052974.exe 85 PID 632 wrote to memory of 3640 632 un052974.exe 85 PID 632 wrote to memory of 3640 632 un052974.exe 85 PID 632 wrote to memory of 4508 632 un052974.exe 98 PID 632 wrote to memory of 4508 632 un052974.exe 98 PID 632 wrote to memory of 4508 632 un052974.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe"C:\Users\Admin\AppData\Local\Temp\733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un052974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un052974.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0398.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0398.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 10884⤵
- Program crash
PID:1488
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5463.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5463.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3640 -ip 36401⤵PID:5004
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5c239ad6d65dc07a48c10a62566a7f8b9
SHA11362f0b830603fdae33b8c4f54714d59762348ed
SHA256cef3ffb2bee2713b44bd99590a134d3b4963e677160f0e33fd9c6d2b269a3a30
SHA51269e12d02e7beed1cd2688767ba9bb0c09c085b9f0c8ebe121484f8198333512635bbc03c0053ff131b1cb172fbbe586eb0154d5ee4e84c0c11ae8f016ad4b7b0
-
Filesize
284KB
MD552f1e2be256fbb4aeec7ea776c413009
SHA156adcc42e0bac18e7d5cd6b4dbc4fcf356d116c9
SHA2561aca61b56cbcaeb031637958229de4729a90ecce17f7d7e8c6ecfe8826fcdaf7
SHA512569b5d82cf7db375dfdd699822a3ae112038cec03ae4340982a2cfd57cf0cfbe21135ca274733142e0cc71459e999e984e8e65e24ddb04f819ce941dcd957d8e
-
Filesize
342KB
MD5999d9244a71a56d5970399a229742f54
SHA11ef3773f637578c71063816f4ef25940f3f62dce
SHA256f50e4a87b9edcbdf5bea07e4891fd1204dd116fca585914b186e4ec0d4f74c24
SHA512c5ff39ca6812853cec54d667f904214da2afa56c94c1bb0595a8c4c4286fccfa9993cd17e67b5605121b5873fc6b4838aab58249a1e8c187fa65c28d7986f5e9