Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
3addd9fa0be36feb4646c0bb42631684e2b71965cd9df6ec53606048535f406e.exe
Resource
win10v2004-20241007-en
General
-
Target
3addd9fa0be36feb4646c0bb42631684e2b71965cd9df6ec53606048535f406e.exe
-
Size
673KB
-
MD5
f19caeabe2cff502ca59039ac5487d51
-
SHA1
7c1b1f94a07f83522a8ef5feb9e5019aba22411b
-
SHA256
3addd9fa0be36feb4646c0bb42631684e2b71965cd9df6ec53606048535f406e
-
SHA512
4a8d502449aba8b21e7bc923e0e71aa6e0bd7068d2d4aa34e69724f619c6a5f09d423686ad10d94fc4b347ae69bb92e65bbc01f030704c7b5f7326fdfc31ad72
-
SSDEEP
12288:tMr4y90tF0CTg4MgqqQpLfUt3N6J3hZ1buWUswnOq49C:dyK0qg4MgqqKxJ3hZZuDy9C
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3152-19-0x0000000002360000-0x000000000237A000-memory.dmp healer behavioral1/memory/3152-21-0x0000000002660000-0x0000000002678000-memory.dmp healer behavioral1/memory/3152-49-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/3152-47-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/3152-45-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/3152-43-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/3152-41-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/3152-39-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/3152-37-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/3152-35-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/3152-33-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/3152-31-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/3152-29-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/3152-27-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/3152-25-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/3152-23-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/3152-22-0x0000000002660000-0x0000000002672000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5173.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5173.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5173.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5173.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5173.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5173.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1108-61-0x0000000004A20000-0x0000000004A66000-memory.dmp family_redline behavioral1/memory/1108-62-0x0000000004AA0000-0x0000000004AE4000-memory.dmp family_redline behavioral1/memory/1108-72-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-76-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-96-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-94-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-92-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-88-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-86-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-84-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-82-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-80-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-78-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-74-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-70-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-68-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-67-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-90-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-64-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1108-63-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2216 un230244.exe 3152 pro5173.exe 1108 qu3814.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5173.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5173.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3addd9fa0be36feb4646c0bb42631684e2b71965cd9df6ec53606048535f406e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un230244.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2724 3152 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un230244.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5173.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3814.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3addd9fa0be36feb4646c0bb42631684e2b71965cd9df6ec53606048535f406e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3152 pro5173.exe 3152 pro5173.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3152 pro5173.exe Token: SeDebugPrivilege 1108 qu3814.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3372 wrote to memory of 2216 3372 3addd9fa0be36feb4646c0bb42631684e2b71965cd9df6ec53606048535f406e.exe 84 PID 3372 wrote to memory of 2216 3372 3addd9fa0be36feb4646c0bb42631684e2b71965cd9df6ec53606048535f406e.exe 84 PID 3372 wrote to memory of 2216 3372 3addd9fa0be36feb4646c0bb42631684e2b71965cd9df6ec53606048535f406e.exe 84 PID 2216 wrote to memory of 3152 2216 un230244.exe 85 PID 2216 wrote to memory of 3152 2216 un230244.exe 85 PID 2216 wrote to memory of 3152 2216 un230244.exe 85 PID 2216 wrote to memory of 1108 2216 un230244.exe 98 PID 2216 wrote to memory of 1108 2216 un230244.exe 98 PID 2216 wrote to memory of 1108 2216 un230244.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\3addd9fa0be36feb4646c0bb42631684e2b71965cd9df6ec53606048535f406e.exe"C:\Users\Admin\AppData\Local\Temp\3addd9fa0be36feb4646c0bb42631684e2b71965cd9df6ec53606048535f406e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un230244.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un230244.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5173.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5173.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 10804⤵
- Program crash
PID:2724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3814.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3814.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3152 -ip 31521⤵PID:2052
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD5bb7cb55c4439eae75604a5b76a799f80
SHA1faf9ed5f534578badb762e7d7c677b6a2faeda25
SHA256ae07a48e4380d89cf1483189aa5e1cb7ce5b75a8255d724dbf675556aaefe6e9
SHA512f5433deffbcddfac2c1e54aaba63afb5d0dae9fa3838a24197b438ed4ec6ad09f41ac1588a1d195ec0b193be712abf33ccd5c2a19c8a5d4f4eeabf99de1960a0
-
Filesize
260KB
MD56ddd1a71cd33d3446c24635720119638
SHA1d7dce064910c115b5753cfad5b086f0407503b0f
SHA256b883e4012a2eef827d48b7fe33686761ea95020c0dae731f5743303a5376dfbb
SHA51252b5a2c0562e89532539c9fbb54201fcfb79a16debc9afe6a7aea7ec6a26e234806ffdfbd7bdb3bdb7b5e2c450cc241fe2c930f03ec78b87e586c8a71aaceb0c
-
Filesize
319KB
MD5e935db1c99d65e0182ac10b23994f820
SHA1be002b3a1844dc550e8024eac5b3e591c9def66f
SHA256293c31528932cac06fcf193d92394e56a694fb939e6503e52328ed59da7f9b2e
SHA5128b06bb8b26eb4abee6ec524ab33b5240d7e586a7779e695b1fce8163b9869fee20021ea33f378c653d98fae95371dcf664e54d7c4745d3916b66067a0a3b035f