Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:53
Static task
static1
Behavioral task
behavioral1
Sample
e30297f7e5be578a9d59e85471344142e0bbeb3939ec49300d75322de45d91f7.exe
Resource
win10v2004-20241007-en
General
-
Target
e30297f7e5be578a9d59e85471344142e0bbeb3939ec49300d75322de45d91f7.exe
-
Size
682KB
-
MD5
0618fb504d258d428437dcaa20f97f24
-
SHA1
2f4f32944dc9b851c553b529a6da848bc0e93678
-
SHA256
e30297f7e5be578a9d59e85471344142e0bbeb3939ec49300d75322de45d91f7
-
SHA512
617edbf2fad07c61bc39ea35512ae6317fa49269eed5402fb8fd3e096069a3eb4e14ff1e8a1d8f3bde083917373e3c56fcff9d4db5ec9fc9dfa5f68bbacef429
-
SSDEEP
12288:AMryy90m1VGcilcYyrArOVr96Mp9IeQ3skUzhm0L3HL:iyIV2ArOrzpVqum0L3L
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4872-18-0x0000000004A50000-0x0000000004A6A000-memory.dmp healer behavioral1/memory/4872-20-0x00000000076F0000-0x0000000007708000-memory.dmp healer behavioral1/memory/4872-46-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/4872-48-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/4872-43-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/4872-40-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/4872-38-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/4872-36-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/4872-34-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/4872-32-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/4872-30-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/4872-28-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/4872-26-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/4872-24-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/4872-22-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/4872-21-0x00000000076F0000-0x0000000007702000-memory.dmp healer behavioral1/memory/4872-44-0x00000000076F0000-0x0000000007702000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0023.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0023.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2036-60-0x0000000004C60000-0x0000000004CA6000-memory.dmp family_redline behavioral1/memory/2036-61-0x0000000007180000-0x00000000071C4000-memory.dmp family_redline behavioral1/memory/2036-85-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-95-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-93-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-91-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-89-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-87-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-83-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-81-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-80-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-77-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-75-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-73-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-71-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-69-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-67-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-65-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-63-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/2036-62-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1140 un355263.exe 4872 pro0023.exe 2036 qu4919.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0023.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e30297f7e5be578a9d59e85471344142e0bbeb3939ec49300d75322de45d91f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un355263.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1212 4872 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e30297f7e5be578a9d59e85471344142e0bbeb3939ec49300d75322de45d91f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un355263.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0023.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4919.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4872 pro0023.exe 4872 pro0023.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4872 pro0023.exe Token: SeDebugPrivilege 2036 qu4919.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4736 wrote to memory of 1140 4736 e30297f7e5be578a9d59e85471344142e0bbeb3939ec49300d75322de45d91f7.exe 84 PID 4736 wrote to memory of 1140 4736 e30297f7e5be578a9d59e85471344142e0bbeb3939ec49300d75322de45d91f7.exe 84 PID 4736 wrote to memory of 1140 4736 e30297f7e5be578a9d59e85471344142e0bbeb3939ec49300d75322de45d91f7.exe 84 PID 1140 wrote to memory of 4872 1140 un355263.exe 85 PID 1140 wrote to memory of 4872 1140 un355263.exe 85 PID 1140 wrote to memory of 4872 1140 un355263.exe 85 PID 1140 wrote to memory of 2036 1140 un355263.exe 96 PID 1140 wrote to memory of 2036 1140 un355263.exe 96 PID 1140 wrote to memory of 2036 1140 un355263.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e30297f7e5be578a9d59e85471344142e0bbeb3939ec49300d75322de45d91f7.exe"C:\Users\Admin\AppData\Local\Temp\e30297f7e5be578a9d59e85471344142e0bbeb3939ec49300d75322de45d91f7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355263.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355263.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0023.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0023.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 10844⤵
- Program crash
PID:1212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4919.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4919.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4872 -ip 48721⤵PID:3048
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD524cbc64a1cb002b19e0cac53011a45b8
SHA14c506b57e3368fb13cde2f4a848120de5e75f9ea
SHA256d18ae409287d91185915d932052c5a7b0e239819eaa9add9b0cc33df22b465e1
SHA5121d1a2607e560ba3f4a216c4973243e2f7eb9af2305fa01f93cdc7bb4a9e2512407367c1a25e9f9d50989369cafd2e5efe56978993604916b0912d16d5a322c48
-
Filesize
321KB
MD527463a2931e8a6e9ec63e3db7f68bdd1
SHA159f19a376027a9802ddbdf0cc09d6c9431930d15
SHA2563a9398dada925220c08513cca236da9fd3c235ff85c0e65fb3b1917dee6dea1b
SHA512840fba736c1cbd768919a389d3817f55de605d574ef1c59c68185f57ceb9e3c9627510727c43fc221f430a05bb79e2ba96f34b0ef5587691db638ba8aef57ff8
-
Filesize
380KB
MD57ff96e4f98dcfeb94561597349eee69c
SHA19c93afcaed064ddfd6a3e22f0de4a02ff9e976fe
SHA256c2333ba03da04867bb3a28c8dcc1d10bf88c675bb953d070614c5521933ce92b
SHA51247fbbb3ecaf0197bd621fb31ec435ac09874c7c77aaedce757a5aef0da6cf66c78ee351186079d32a477ba812541516859799922dfad99a739dbfb761b4623b2