Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
682ae2452318234094cb4dd5c87a17175c7ef483fb1d03930ce446b107c25347.exe
Resource
win10v2004-20241007-en
General
-
Target
682ae2452318234094cb4dd5c87a17175c7ef483fb1d03930ce446b107c25347.exe
-
Size
673KB
-
MD5
e10a45f596ab6d698ef0143725dac5c4
-
SHA1
137e0899348fd1faf97e058599a470b7e0189db2
-
SHA256
682ae2452318234094cb4dd5c87a17175c7ef483fb1d03930ce446b107c25347
-
SHA512
fdf85e09d891cb82c24872db9f759131933b086e69a93f5ef79dbe9501bce8a1e8bb85a1830cf933214933366b0e33b382a5c25e407a28983c4b0ed20d6ea229
-
SSDEEP
12288:bMruy90399+sJBPc4QX6Rud6SRc0Ij4ObuWtQ3RHiEzpgJW:ByUL+sv0VEdSRYj42ueACEzpx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2680-19-0x0000000002520000-0x000000000253A000-memory.dmp healer behavioral1/memory/2680-21-0x0000000002700000-0x0000000002718000-memory.dmp healer behavioral1/memory/2680-25-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/2680-49-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/2680-47-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/2680-45-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/2680-43-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/2680-41-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/2680-39-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/2680-37-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/2680-35-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/2680-33-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/2680-31-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/2680-29-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/2680-27-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/2680-23-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/2680-22-0x0000000002700000-0x0000000002712000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3858.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3858.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4056-60-0x00000000025C0000-0x0000000002606000-memory.dmp family_redline behavioral1/memory/4056-61-0x0000000004A90000-0x0000000004AD4000-memory.dmp family_redline behavioral1/memory/4056-65-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-63-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-62-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-71-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-95-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-93-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-91-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-89-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-87-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-83-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-81-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-79-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-77-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-75-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-69-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-67-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-85-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-74-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2592 un212092.exe 2680 pro3858.exe 4056 qu8035.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3858.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un212092.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 682ae2452318234094cb4dd5c87a17175c7ef483fb1d03930ce446b107c25347.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 452 2680 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 682ae2452318234094cb4dd5c87a17175c7ef483fb1d03930ce446b107c25347.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un212092.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3858.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8035.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2680 pro3858.exe 2680 pro3858.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2680 pro3858.exe Token: SeDebugPrivilege 4056 qu8035.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4568 wrote to memory of 2592 4568 682ae2452318234094cb4dd5c87a17175c7ef483fb1d03930ce446b107c25347.exe 84 PID 4568 wrote to memory of 2592 4568 682ae2452318234094cb4dd5c87a17175c7ef483fb1d03930ce446b107c25347.exe 84 PID 4568 wrote to memory of 2592 4568 682ae2452318234094cb4dd5c87a17175c7ef483fb1d03930ce446b107c25347.exe 84 PID 2592 wrote to memory of 2680 2592 un212092.exe 85 PID 2592 wrote to memory of 2680 2592 un212092.exe 85 PID 2592 wrote to memory of 2680 2592 un212092.exe 85 PID 2592 wrote to memory of 4056 2592 un212092.exe 96 PID 2592 wrote to memory of 4056 2592 un212092.exe 96 PID 2592 wrote to memory of 4056 2592 un212092.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\682ae2452318234094cb4dd5c87a17175c7ef483fb1d03930ce446b107c25347.exe"C:\Users\Admin\AppData\Local\Temp\682ae2452318234094cb4dd5c87a17175c7ef483fb1d03930ce446b107c25347.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un212092.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un212092.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3858.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3858.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 10564⤵
- Program crash
PID:452
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8035.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8035.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2680 -ip 26801⤵PID:3820
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD5460cf90e9b64feed2461e2ea1ef2dc0d
SHA191b130b5d10ad74aa9ed8b32328a22af2ebc7560
SHA256bfbdc3782669674973b4e65eccb42a455c5585e7d556c56c1c82c7bca224cc5f
SHA512bdc47580685204e23e345e441aff1abbe79c16bdd8dc91f680eedb2c63acb67a23baa8e1cce68d39a22e60747408039fb107458264d6b8af13e5e19b153dca80
-
Filesize
260KB
MD56c0b0b0679a70200d1db2a81c85e9f6c
SHA1ae2018c9814dba033ab9ace64200517e82225690
SHA256615682df933660bc71964ffad062a4702ad9f733c58106d88638b94e721b06ef
SHA5120f776169f0b6ad1a05ac77ba7679bc048ce363a11a8bf19b78560effcaa9035c3bd3456b2af6990e7764097b5143cfdf3b7fac8e62eceec649f778dc5d30ea17
-
Filesize
319KB
MD5bdad838a9b25089dcc89b1c63855ee12
SHA19db832bfbc3f975aec9b8b608f0d4f40e4b0f351
SHA256f73e9d7962f55916d29c008f8736151d42f2db34d4e04a988b001d60ab3a6c73
SHA512b10b41d216447a09ea172eb0d6093b274990859b2ab858e85081f1eae2f5450b822686e270b55f3943a3c069e0e42adfedaf596ac94214126d4a2269bcb61fd9