Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:41
Static task
static1
Behavioral task
behavioral1
Sample
4fa9a36ab2c814d45d4d37c0adb00ca145ae1d559f31a2e32d8d92b565f66375.exe
Resource
win10v2004-20241007-en
General
-
Target
4fa9a36ab2c814d45d4d37c0adb00ca145ae1d559f31a2e32d8d92b565f66375.exe
-
Size
689KB
-
MD5
b1f32c8b7402e79c60ca033f2f39c3ee
-
SHA1
9e636c8afd6985e89d26c018a60dcf7d1914ee40
-
SHA256
4fa9a36ab2c814d45d4d37c0adb00ca145ae1d559f31a2e32d8d92b565f66375
-
SHA512
c598af73d8235bd66978357109f5b453af95af7edc51a683ff6cf246f81cec03434b947d5144ef97aafcfd996983d9494608b2a81b08eba09f6d31358f277b56
-
SSDEEP
12288:2Mrmy905DGnSoRmcynlOsvDYfjp3tq5o8oSJT/uAp9yPM4f/u9+x2F:Uy+mRmcynlNLYfjzq9ogT/uW8PM4vm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2092-19-0x0000000000A70000-0x0000000000A8A000-memory.dmp healer behavioral1/memory/2092-21-0x00000000028C0000-0x00000000028D8000-memory.dmp healer behavioral1/memory/2092-25-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/2092-49-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/2092-47-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/2092-45-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/2092-43-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/2092-41-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/2092-39-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/2092-37-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/2092-35-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/2092-33-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/2092-31-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/2092-29-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/2092-27-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/2092-23-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/2092-22-0x00000000028C0000-0x00000000028D2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6051.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4548-61-0x00000000028C0000-0x0000000002906000-memory.dmp family_redline behavioral1/memory/4548-62-0x0000000004E00000-0x0000000004E44000-memory.dmp family_redline behavioral1/memory/4548-76-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-74-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-96-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-94-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-92-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-90-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-88-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-86-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-84-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-82-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-80-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-78-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-72-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-70-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-68-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-66-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-64-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4548-63-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3648 un871879.exe 2092 pro6051.exe 4548 qu5884.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6051.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4fa9a36ab2c814d45d4d37c0adb00ca145ae1d559f31a2e32d8d92b565f66375.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un871879.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3008 2092 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fa9a36ab2c814d45d4d37c0adb00ca145ae1d559f31a2e32d8d92b565f66375.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un871879.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6051.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2092 pro6051.exe 2092 pro6051.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2092 pro6051.exe Token: SeDebugPrivilege 4548 qu5884.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4872 wrote to memory of 3648 4872 4fa9a36ab2c814d45d4d37c0adb00ca145ae1d559f31a2e32d8d92b565f66375.exe 84 PID 4872 wrote to memory of 3648 4872 4fa9a36ab2c814d45d4d37c0adb00ca145ae1d559f31a2e32d8d92b565f66375.exe 84 PID 4872 wrote to memory of 3648 4872 4fa9a36ab2c814d45d4d37c0adb00ca145ae1d559f31a2e32d8d92b565f66375.exe 84 PID 3648 wrote to memory of 2092 3648 un871879.exe 85 PID 3648 wrote to memory of 2092 3648 un871879.exe 85 PID 3648 wrote to memory of 2092 3648 un871879.exe 85 PID 3648 wrote to memory of 4548 3648 un871879.exe 98 PID 3648 wrote to memory of 4548 3648 un871879.exe 98 PID 3648 wrote to memory of 4548 3648 un871879.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fa9a36ab2c814d45d4d37c0adb00ca145ae1d559f31a2e32d8d92b565f66375.exe"C:\Users\Admin\AppData\Local\Temp\4fa9a36ab2c814d45d4d37c0adb00ca145ae1d559f31a2e32d8d92b565f66375.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un871879.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un871879.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6051.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6051.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 10844⤵
- Program crash
PID:3008
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5884.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5884.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2092 -ip 20921⤵PID:4068
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
535KB
MD54194b769503b6095bf97d2528018835f
SHA1d3f90bb1cbae4a9a5f282d52adedba39f4f5006c
SHA2566fc9efa7d0818e1935a64b19318eaf8e0b84f544d7463a6eb26a888e2e35ac01
SHA512edce2115e3696d1b827aac9a46b095604039ba416de1cadb694140d650535618676af290c9665d93fb76c413b89ebb2fa6e640b5b0f221c37e5c539a34b88e61
-
Filesize
312KB
MD5f2124e12bcf35f645486578973ac4023
SHA10da035f576b993f787dabc2f027c4b6d5397dfef
SHA256dc9a5b09ecfb75140e5508f042ce9e67927afa177ef8dab4c4146240c25ee8f0
SHA5120039d71771f2d4249ed7efac0552717c583819bc72737f436b2c36864f9fd6cf0542fe9768558a0f3e8cc77a1a9e5be4cfb1172d5cbca5f0646e44ba5545740e
-
Filesize
370KB
MD5184c278e471573133ef1faafeb685e2d
SHA1c9b178b1b0238870c9e8a751a40be1d2b9064230
SHA256712ecc8ae4ac6f1594373175365762d60d62055963864fe2fbb7c0ba6c0badd0
SHA5125944f7386c5c07671967a6f0822b4daee70f63208ce03415a37ea22ac3dffd39663f0860906d8b407263997eb5eef4f3a27b0fc47ae3780ecfc4df401a79f16b