Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:27
Static task
static1
Behavioral task
behavioral1
Sample
e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752.exe
Resource
win10v2004-20241007-en
General
-
Target
e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752.exe
-
Size
836KB
-
MD5
0117e2ab3d9a5419081a7797ecca29a7
-
SHA1
66b32b8cb4dd2aa3d2e3df8077cc840cacd2746c
-
SHA256
e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752
-
SHA512
521927d18db0460eb87de832058b5e95af875591434caef7d1609e5cc4fcfa98d67f02d7c926218ce26bc7b9460a9dc223b4ff64d43cab14af25c5057ba1f7d1
-
SSDEEP
24576:1ykiGWVqqSCSwRfkB5EhVqbDJixzorrff:QkfyJZSaFmD4zWrf
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0009000000023bd6-19.dat healer behavioral1/memory/4460-22-0x0000000000260000-0x000000000026A000-memory.dmp healer behavioral1/memory/1148-28-0x00000000049E0000-0x00000000049FA000-memory.dmp healer behavioral1/memory/1148-30-0x0000000004B40000-0x0000000004B58000-memory.dmp healer behavioral1/memory/1148-31-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/1148-42-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/1148-58-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/1148-56-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/1148-54-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/1148-53-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/1148-50-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/1148-48-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/1148-46-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/1148-44-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/1148-40-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/1148-38-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/1148-36-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/1148-34-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/1148-32-0x0000000004B40000-0x0000000004B52000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h29Qp32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h29Qp32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f1954Uf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f1954Uf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f1954Uf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f1954Uf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h29Qp32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h29Qp32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h29Qp32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h29Qp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f1954Uf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f1954Uf.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3428-66-0x0000000007070000-0x00000000070B6000-memory.dmp family_redline behavioral1/memory/3428-67-0x00000000070F0000-0x0000000007134000-memory.dmp family_redline behavioral1/memory/3428-97-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-85-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-79-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-77-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-101-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-99-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-95-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-93-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-91-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-89-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-87-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-83-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-81-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-75-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-73-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-71-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-69-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline behavioral1/memory/3428-68-0x00000000070F0000-0x000000000712E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 3424 niba3227.exe 4264 niba7257.exe 4460 f1954Uf.exe 1148 h29Qp32.exe 3428 iTdXt64.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f1954Uf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h29Qp32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h29Qp32.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba3227.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba7257.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2016 1148 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niba3227.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niba7257.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h29Qp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iTdXt64.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4460 f1954Uf.exe 4460 f1954Uf.exe 1148 h29Qp32.exe 1148 h29Qp32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4460 f1954Uf.exe Token: SeDebugPrivilege 1148 h29Qp32.exe Token: SeDebugPrivilege 3428 iTdXt64.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1672 wrote to memory of 3424 1672 e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752.exe 84 PID 1672 wrote to memory of 3424 1672 e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752.exe 84 PID 1672 wrote to memory of 3424 1672 e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752.exe 84 PID 3424 wrote to memory of 4264 3424 niba3227.exe 85 PID 3424 wrote to memory of 4264 3424 niba3227.exe 85 PID 3424 wrote to memory of 4264 3424 niba3227.exe 85 PID 4264 wrote to memory of 4460 4264 niba7257.exe 86 PID 4264 wrote to memory of 4460 4264 niba7257.exe 86 PID 4264 wrote to memory of 1148 4264 niba7257.exe 95 PID 4264 wrote to memory of 1148 4264 niba7257.exe 95 PID 4264 wrote to memory of 1148 4264 niba7257.exe 95 PID 3424 wrote to memory of 3428 3424 niba3227.exe 99 PID 3424 wrote to memory of 3428 3424 niba3227.exe 99 PID 3424 wrote to memory of 3428 3424 niba3227.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752.exe"C:\Users\Admin\AppData\Local\Temp\e488ad503d4520a30bf42dbefa9695ab39cd41082ab60498d515da83cf672752.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3227.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3227.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7257.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7257.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1954Uf.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1954Uf.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h29Qp32.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h29Qp32.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 10805⤵
- Program crash
PID:2016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iTdXt64.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iTdXt64.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1148 -ip 11481⤵PID:1192
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
693KB
MD54d5140806b3e192c438c0721d612095c
SHA1acb0a9324bec39a801ba39b38ff13fe1892177f3
SHA256429bb29c36a7571e64cce0789250057872260902eb5d53185980d14c7b91253c
SHA512bf94f74645ca9c1a0d37b7c0ad461da87c9b429fa451d8098bc988b892a1bee544c7b2dc2382c319329ace9d2d53483dcf9ddf13ead18a2b5165b17586880714
-
Filesize
391KB
MD5987bc32f0ff4b4904333f0b1a813dd20
SHA1fd0523f021454143c6ec29ccae1b3505b4a39ae5
SHA256f2502d0c7ae9169875417ebc702c62473aa522b38d5b392ea07a3dd434368ae5
SHA512982a27def94f4ec812265e6906b3399ebed8e019fab35c0b2524fdda83e000231511db8718260d3bb32f7662a8c98073a114de0791ef59337fd008210ad2dff6
-
Filesize
344KB
MD5eb21da4aed9cccd8fb74779be75d5ce0
SHA1f593ee0870d32db3018bea0cabfd0434fac2ac91
SHA256462eecfc6981603a46294d219697f0249fe910028d4fc8d3e980ae50d9008458
SHA51229755a8eda61f5aea2726c4d2dbdd42536c3fde45aed7ee0ec5074ff040731c6c5f4bd361760ba004d679a3624d1011116d83d34a27fd156bdf5fbd97cb74b8c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
334KB
MD53c95dc4b6f5a703dc926246205bdea36
SHA1b36c209a01e19e7c2e077374ff38443db3f036eb
SHA256eddd828a3ba093bc8b673534bccd12b8cebce8e038dc4525474cca7eb3312f2c
SHA51299c21cc05f3990897a15bd6a1b6ae762aef5269f48ba6871ea2da7191bd3a2733d321026345a2f4b9dc411fc33288b2d7dec96db6df507bf50fc474ac5112bae