Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:17
Static task
static1
Behavioral task
behavioral1
Sample
9c1691b9581aa9889009cdc9b7097907346e972fc42e7e4ae1840fbf39dfe5b5.exe
Resource
win10v2004-20241007-en
General
-
Target
9c1691b9581aa9889009cdc9b7097907346e972fc42e7e4ae1840fbf39dfe5b5.exe
-
Size
689KB
-
MD5
b61a69d213497b7bfa96ae9918c7447f
-
SHA1
a1c7e34592798367c52257a9360df1e180ed45cc
-
SHA256
9c1691b9581aa9889009cdc9b7097907346e972fc42e7e4ae1840fbf39dfe5b5
-
SHA512
9ebd6889e797ff354f0805c2f4cb3ead5b14a1f9a7b0c1934bea73364912c90bfa61f5ad8dd01fe179c464d3ecf678a0daf744c2fe145c07656ef6990a13e074
-
SSDEEP
12288:DMrKy90sss4LLRRYKtDZNgHyBDNK743xtYMyKb32krBOwu:Zy3ss4LVRYKPNhxNU4hmM/CkNO3
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/180-17-0x0000000004760000-0x000000000477A000-memory.dmp healer behavioral1/memory/180-19-0x0000000004C90000-0x0000000004CA8000-memory.dmp healer behavioral1/memory/180-48-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/180-46-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/180-44-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/180-42-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/180-40-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/180-38-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/180-36-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/180-34-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/180-32-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/180-30-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/180-28-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/180-26-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/180-24-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/180-22-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer behavioral1/memory/180-21-0x0000000004C90000-0x0000000004CA2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2683.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1208-59-0x0000000004980000-0x00000000049C6000-memory.dmp family_redline behavioral1/memory/1208-60-0x0000000007190000-0x00000000071D4000-memory.dmp family_redline behavioral1/memory/1208-72-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-86-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-94-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-92-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-90-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-88-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-84-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-82-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-80-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-78-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-76-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-74-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-70-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-68-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-66-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-64-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-62-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1208-61-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1988 unio5892.exe 180 pro2683.exe 1208 qu4268.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2683.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9c1691b9581aa9889009cdc9b7097907346e972fc42e7e4ae1840fbf39dfe5b5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio5892.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 376 180 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c1691b9581aa9889009cdc9b7097907346e972fc42e7e4ae1840fbf39dfe5b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio5892.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2683.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4268.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 180 pro2683.exe 180 pro2683.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 180 pro2683.exe Token: SeDebugPrivilege 1208 qu4268.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1988 1932 9c1691b9581aa9889009cdc9b7097907346e972fc42e7e4ae1840fbf39dfe5b5.exe 86 PID 1932 wrote to memory of 1988 1932 9c1691b9581aa9889009cdc9b7097907346e972fc42e7e4ae1840fbf39dfe5b5.exe 86 PID 1932 wrote to memory of 1988 1932 9c1691b9581aa9889009cdc9b7097907346e972fc42e7e4ae1840fbf39dfe5b5.exe 86 PID 1988 wrote to memory of 180 1988 unio5892.exe 87 PID 1988 wrote to memory of 180 1988 unio5892.exe 87 PID 1988 wrote to memory of 180 1988 unio5892.exe 87 PID 1988 wrote to memory of 1208 1988 unio5892.exe 98 PID 1988 wrote to memory of 1208 1988 unio5892.exe 98 PID 1988 wrote to memory of 1208 1988 unio5892.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c1691b9581aa9889009cdc9b7097907346e972fc42e7e4ae1840fbf39dfe5b5.exe"C:\Users\Admin\AppData\Local\Temp\9c1691b9581aa9889009cdc9b7097907346e972fc42e7e4ae1840fbf39dfe5b5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5892.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5892.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2683.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2683.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 180 -s 10764⤵
- Program crash
PID:376
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4268.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4268.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 180 -ip 1801⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5e34ed7c7268954e9bcc09bb129329196
SHA1faf061ce8f5faed5244ddafe98c713c80ea674a3
SHA2564e974b721b29467f70c68305c567ff314e9a97256f73b0a0cc5e331cf426c8fd
SHA51219253d8ac49beed025e2d36f842a5423708d2ea95455c6706c1901b31489ec93ee094894fb838acffc7f36b258030b4727474106455d84ced4cc7b89d5d39d8e
-
Filesize
329KB
MD50c1f00c4be57abb607b37829b9ed1c2f
SHA1d532aaa54f5e14fcb02c9b34e58cb749afa7a4e7
SHA256362a839a42ae8a18dd4d1c051d54803081fd349423118d3d147bdb27f1692fcd
SHA5126b8e125a091794132a2df8bb4e9e28326e3f1661e47e7200b8cf5101f7ced3c7617e12a9e37c129413e42fcdaaea0d27aac6c2a41a81fe8415f1b34cc9338fcc
-
Filesize
386KB
MD538ca90dab57204795851f9139d049182
SHA10766c2fb449a36b9669ca6d78370ec979ae038b6
SHA25698339e75afb3c45a2137279b0206544d8d493587797a4113b1e10624a47ce1cf
SHA5120ab298ab3eba1fbd91b0212bfaf0cdd21c0cb5c1465fa2d00f5c263581df07842adda13c4e2e425b3fe3a7e0182a00b8b439bffac4ecaa8d11a6d3a4aa12bd7e