Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:37
Static task
static1
Behavioral task
behavioral1
Sample
e8cf4c9fbf964d202e2bc1ef6885c2f213de9d25037ff3dbb3cd857c0d8145b1.exe
Resource
win10v2004-20241007-en
General
-
Target
e8cf4c9fbf964d202e2bc1ef6885c2f213de9d25037ff3dbb3cd857c0d8145b1.exe
-
Size
660KB
-
MD5
686e8fa1f4f16fc2bac01df693ca3919
-
SHA1
4d0252ddd24f973ee012308313c8371028c8329b
-
SHA256
e8cf4c9fbf964d202e2bc1ef6885c2f213de9d25037ff3dbb3cd857c0d8145b1
-
SHA512
7f3fc817eff494e030924c5ad911e00b2b087b66b118e62fd2654df846302b642b88dca487db43640141efa975382f8d884e0864e2dac73b72bfec72c79d6d5d
-
SSDEEP
12288:GMrsy90kUQ1CaoJiWLwt7IFPbdC1VveZtQFhlCpzLft/ju/2CPp:GyfUewiWk0PcveZenspXBLY
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1820-19-0x00000000023B0000-0x00000000023CA000-memory.dmp healer behavioral1/memory/1820-21-0x0000000004B90000-0x0000000004BA8000-memory.dmp healer behavioral1/memory/1820-22-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1820-49-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1820-45-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1820-41-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1820-37-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1820-33-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1820-23-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1820-47-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1820-43-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1820-40-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1820-35-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1820-31-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1820-29-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1820-27-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1820-25-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7416.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4940-60-0x00000000022D0000-0x0000000002316000-memory.dmp family_redline behavioral1/memory/4940-61-0x0000000002570000-0x00000000025B4000-memory.dmp family_redline behavioral1/memory/4940-75-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-85-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-95-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-94-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-91-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-89-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-87-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-83-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-82-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-79-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-77-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-73-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-71-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-69-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-67-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-65-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-63-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/4940-62-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2092 un376283.exe 1820 pro7416.exe 4940 qu6756.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7416.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e8cf4c9fbf964d202e2bc1ef6885c2f213de9d25037ff3dbb3cd857c0d8145b1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un376283.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1192 1820 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8cf4c9fbf964d202e2bc1ef6885c2f213de9d25037ff3dbb3cd857c0d8145b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un376283.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7416.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6756.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1820 pro7416.exe 1820 pro7416.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1820 pro7416.exe Token: SeDebugPrivilege 4940 qu6756.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2092 2720 e8cf4c9fbf964d202e2bc1ef6885c2f213de9d25037ff3dbb3cd857c0d8145b1.exe 84 PID 2720 wrote to memory of 2092 2720 e8cf4c9fbf964d202e2bc1ef6885c2f213de9d25037ff3dbb3cd857c0d8145b1.exe 84 PID 2720 wrote to memory of 2092 2720 e8cf4c9fbf964d202e2bc1ef6885c2f213de9d25037ff3dbb3cd857c0d8145b1.exe 84 PID 2092 wrote to memory of 1820 2092 un376283.exe 85 PID 2092 wrote to memory of 1820 2092 un376283.exe 85 PID 2092 wrote to memory of 1820 2092 un376283.exe 85 PID 2092 wrote to memory of 4940 2092 un376283.exe 98 PID 2092 wrote to memory of 4940 2092 un376283.exe 98 PID 2092 wrote to memory of 4940 2092 un376283.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8cf4c9fbf964d202e2bc1ef6885c2f213de9d25037ff3dbb3cd857c0d8145b1.exe"C:\Users\Admin\AppData\Local\Temp\e8cf4c9fbf964d202e2bc1ef6885c2f213de9d25037ff3dbb3cd857c0d8145b1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un376283.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un376283.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7416.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7416.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 10804⤵
- Program crash
PID:1192
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6756.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6756.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1820 -ip 18201⤵PID:4704
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5ef548a307b47f284040f7aae03ead3a5
SHA1a59471355c362d08aa0338b98982bf3dd5cda770
SHA25672e8e7328e2e52d36ff1962764e1c0932d7e882d54199b8afc32ce7986e796e2
SHA512deadf2f5dc286ecee4283e36471ec88a03c1a64533402acd811f4f6aae61cfab1a6b4ae71afd86673c4e0ded48b5edccf53d7a60153d3332753d7d1faf6dad20
-
Filesize
237KB
MD512648cebdb8fb1390d295d4a0a353d6d
SHA1716c7e0d4d45e674025abe1d3215e853b3fe551f
SHA256358446542e5719814d457721d525b836ad6f90d290e2072a53fea537c5924520
SHA512951ce8cd1d8ccb54073c84051adccf96e12dc42048a2e0b34d4abc2a100e690aff4e2c3ef36d697a1e40a708284a3f442edb019ec8980d36e7fb4507fbb042b9
-
Filesize
295KB
MD5c51e5ed9efd8de08556d9105ae8773f0
SHA1244d23338f2bb9299f64884abae176295591c2fe
SHA256b4a501bf2a86c9e5aba94d0ea3b9f90795d8875c0fee28cddb40de450c693466
SHA51264f4e96b1fffe379db706c1e64f5f4a759be49753ddf4059364a16542df66b2f23d2a47920691bbc97c8c0ead4a583291d7b33880d9822e8f1e7ff7e0829fbba