Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:08
Static task
static1
Behavioral task
behavioral1
Sample
22da8d9acbcdc8cb099b67e2ba51a8e5db6604723b69865b4d58948a73d3b2c3.exe
Resource
win10v2004-20241007-en
General
-
Target
22da8d9acbcdc8cb099b67e2ba51a8e5db6604723b69865b4d58948a73d3b2c3.exe
-
Size
688KB
-
MD5
39ff4020b842628e6c4305c9dc3f9de8
-
SHA1
ab2ffece19d47cd053c6232332bd7ec18b8d4a3d
-
SHA256
22da8d9acbcdc8cb099b67e2ba51a8e5db6604723b69865b4d58948a73d3b2c3
-
SHA512
519a1285a84e51307b27b2b913da484e728cb8efae256e34a0c085dc5d8d62b865ee801cd92133a91833ee0038ee77480769ad99ca7564b02943537d092ff10a
-
SSDEEP
12288:1Mrsy90YbwqV0omCUUlhHDGfcpnsIS9Fwa7WvUM/2huZoSx5V8Z1dtZ:hyCqiommlVVdCR/rEOSx3uZ
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2516-19-0x0000000002550000-0x000000000256A000-memory.dmp healer behavioral1/memory/2516-21-0x00000000028F0000-0x0000000002908000-memory.dmp healer behavioral1/memory/2516-33-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral1/memory/2516-49-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral1/memory/2516-47-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral1/memory/2516-45-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral1/memory/2516-43-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral1/memory/2516-41-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral1/memory/2516-39-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral1/memory/2516-37-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral1/memory/2516-35-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral1/memory/2516-31-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral1/memory/2516-30-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral1/memory/2516-27-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral1/memory/2516-25-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral1/memory/2516-23-0x00000000028F0000-0x0000000002902000-memory.dmp healer behavioral1/memory/2516-22-0x00000000028F0000-0x0000000002902000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7664.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7664.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4820-60-0x0000000002630000-0x0000000002676000-memory.dmp family_redline behavioral1/memory/4820-61-0x0000000004D10000-0x0000000004D54000-memory.dmp family_redline behavioral1/memory/4820-67-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-71-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-69-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-87-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-75-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-65-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-63-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-62-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-95-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-93-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-91-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-89-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-85-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-83-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-81-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-79-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-77-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline behavioral1/memory/4820-73-0x0000000004D10000-0x0000000004D4E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4192 un135276.exe 2516 pro7664.exe 4820 qu7601.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7664.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un135276.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 22da8d9acbcdc8cb099b67e2ba51a8e5db6604723b69865b4d58948a73d3b2c3.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2568 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1604 2516 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22da8d9acbcdc8cb099b67e2ba51a8e5db6604723b69865b4d58948a73d3b2c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un135276.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7601.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2516 pro7664.exe 2516 pro7664.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2516 pro7664.exe Token: SeDebugPrivilege 4820 qu7601.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 756 wrote to memory of 4192 756 22da8d9acbcdc8cb099b67e2ba51a8e5db6604723b69865b4d58948a73d3b2c3.exe 84 PID 756 wrote to memory of 4192 756 22da8d9acbcdc8cb099b67e2ba51a8e5db6604723b69865b4d58948a73d3b2c3.exe 84 PID 756 wrote to memory of 4192 756 22da8d9acbcdc8cb099b67e2ba51a8e5db6604723b69865b4d58948a73d3b2c3.exe 84 PID 4192 wrote to memory of 2516 4192 un135276.exe 85 PID 4192 wrote to memory of 2516 4192 un135276.exe 85 PID 4192 wrote to memory of 2516 4192 un135276.exe 85 PID 4192 wrote to memory of 4820 4192 un135276.exe 96 PID 4192 wrote to memory of 4820 4192 un135276.exe 96 PID 4192 wrote to memory of 4820 4192 un135276.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\22da8d9acbcdc8cb099b67e2ba51a8e5db6604723b69865b4d58948a73d3b2c3.exe"C:\Users\Admin\AppData\Local\Temp\22da8d9acbcdc8cb099b67e2ba51a8e5db6604723b69865b4d58948a73d3b2c3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un135276.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un135276.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7664.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7664.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 10804⤵
- Program crash
PID:1604
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7601.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7601.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2516 -ip 25161⤵PID:3276
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2568
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
545KB
MD5424b34ce7c3d73a22cba9d0ed7a12cb1
SHA18bc9c5c83614d773a8ae285dd7fae395dbfaf242
SHA2563e96691cbe30bcb74638eb074646c6860ba080cd09df28facc08746bfee1e766
SHA5125868031230cba21f1bd6895557843a0dea8b4558230a2921c54a1978958712eee5d5a286acf90920fb3bfc7aaeec62e4e4ed4ea1913bd39dff21c4ee54009229
-
Filesize
300KB
MD5f7c2142aeccc1edf6998e4b7a43ad0ff
SHA1c05d0d41256ff25c9609455ee4c01afe2369437f
SHA2567db3b119d462254972d555bba7500544f0590294c5abf1ac1dd44f2847b71f2c
SHA512abcecd34692ee960c83a2ae2d1bde11ae7d131b081509eb12c55f37e1c4df778818abcff3a7a64000191a6e333d339f2fc3375a8b6c81d7a5a408a625ac58385
-
Filesize
359KB
MD5303b402b44d7f833e7287ef920c8db0f
SHA1fca06b14bfa9effb532b93349cc2a26201775e9c
SHA256717b3c04578041e06dfb03a218699fceb00287e29b392a63bf378e34734561d2
SHA512b5ad811ec06aa87174379fd149cfb92c03aa552042612ad727331aaf026e20be4a2cbfe1b1726f8f46ccb7e1c03c81c468bbfb04d699830c3db2c2cbdd8d3889