Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:47
Static task
static1
Behavioral task
behavioral1
Sample
ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306.exe
Resource
win10v2004-20241007-en
General
-
Target
ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306.exe
-
Size
688KB
-
MD5
c71d53abd70de0de40b88fb3a4814a8e
-
SHA1
a743d73250d6791a3cc70ec16ac7d8835fa130d6
-
SHA256
ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306
-
SHA512
b3278cceca090a1065ed25b0f36070b713c70477c80492938bd79d7a799dca2abe65d29f52145b64ca375634a08875ba890cb9dfcca36fac4de6ba8d1c4de390
-
SSDEEP
12288:MMrFy90xDEx89UlnlIcPILIjPVmXcOJmA/7L43x0YMBKbLxB8lf+IYYl:5y9eOnKcPRmXccv4hLMgXxqNl
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3988-17-0x00000000047A0000-0x00000000047BA000-memory.dmp healer behavioral1/memory/3988-20-0x0000000007120000-0x0000000007138000-memory.dmp healer behavioral1/memory/3988-44-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3988-48-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3988-46-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3988-42-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3988-40-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3988-38-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3988-36-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3988-34-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3988-32-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3988-30-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3988-28-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3988-26-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3988-24-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3988-22-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3988-21-0x0000000007120000-0x0000000007132000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0680.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0680.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4996-59-0x0000000004AC0000-0x0000000004B06000-memory.dmp family_redline behavioral1/memory/4996-60-0x0000000004C60000-0x0000000004CA4000-memory.dmp family_redline behavioral1/memory/4996-78-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-94-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-93-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-90-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-88-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-86-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-84-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-82-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-80-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-76-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-74-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-70-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-68-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-66-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-64-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-62-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-72-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/4996-61-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1564 unio1801.exe 3988 pro0680.exe 4996 qu5119.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0680.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0680.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio1801.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 888 3988 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio1801.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0680.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3988 pro0680.exe 3988 pro0680.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3988 pro0680.exe Token: SeDebugPrivilege 4996 qu5119.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1564 1744 ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306.exe 84 PID 1744 wrote to memory of 1564 1744 ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306.exe 84 PID 1744 wrote to memory of 1564 1744 ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306.exe 84 PID 1564 wrote to memory of 3988 1564 unio1801.exe 85 PID 1564 wrote to memory of 3988 1564 unio1801.exe 85 PID 1564 wrote to memory of 3988 1564 unio1801.exe 85 PID 1564 wrote to memory of 4996 1564 unio1801.exe 98 PID 1564 wrote to memory of 4996 1564 unio1801.exe 98 PID 1564 wrote to memory of 4996 1564 unio1801.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306.exe"C:\Users\Admin\AppData\Local\Temp\ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio1801.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio1801.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0680.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0680.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 10884⤵
- Program crash
PID:888
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5119.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3988 -ip 39881⤵PID:800
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
546KB
MD5bf7e39ec562c99d9a2fae026c086e2bf
SHA1746bc76f915e254e3858c4a750e3584a356867c0
SHA256da08fb395715a877394a52d18e11f88f29f220578a0ce8d8b705dc9a1c9b81bb
SHA5120c982c79f8357e04e063a97720d151adc3319f7769a417fa2f5f66891988f3e8b19e6e1b3aa1c9ae47a6176b75b6e53bf034c0bcf404f70f6e52db0c23de8b11
-
Filesize
329KB
MD51b11e39d05e005c4c7618b85ba4c2856
SHA1337db5f06d086e884e2110b72b45540ff9186359
SHA25690a029153e9d988bc9d2e3de9483a1086d36cb92f31c20a5df412b7522deaed6
SHA51200cbca6f8801b950d7fec64f457fd14a984ec81741a38607f13f3d628849240c979a9ff1fbf9df9e9f57cd7b56d4bc7eb60ec87d977a59b4b35742714482fc0e
-
Filesize
386KB
MD5988853f50c2c7c3c9a99f57c9c9912e9
SHA14507f13547ad4b55559b3e0e7eaf2200d64d0b6c
SHA2561f712f3e564fef313b31e185a3766a4226ab6563c4ef1f0a04487f576f2b43b0
SHA512cbb0917942862118162c14ac80a1a76ecbddc13806a068fe8d46dad8f67966a775d882db8f5e9f1809a91203a89684b21a23622353e1166c30f4408643c54bd9