Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:17
Static task
static1
Behavioral task
behavioral1
Sample
90ca4c4bb9261b016d8867a63169721550c7b103a1d098df5b96077e033c0448.exe
Resource
win10v2004-20241007-en
General
-
Target
90ca4c4bb9261b016d8867a63169721550c7b103a1d098df5b96077e033c0448.exe
-
Size
682KB
-
MD5
d97411c4473d2dea15eb62fe38601b80
-
SHA1
5687a8d6aead238416b8996425c246c48f41d2cc
-
SHA256
90ca4c4bb9261b016d8867a63169721550c7b103a1d098df5b96077e033c0448
-
SHA512
5fc040e530b857caf776b295411b09e8c8329483177fcc834c698cf777097d1ae902e05629ac9ebdf2824445caaf15d76b4e76abb72cce175e02496fdff621e8
-
SSDEEP
12288:sMriy90uRjyBLuNXLgPSSPkxS0GfB8wO/HqFrAt5q0jz5h+VdQFL:GynEaxkPSysGCwISAt5q0jV0O
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3392-18-0x00000000047D0000-0x00000000047EA000-memory.dmp healer behavioral1/memory/3392-20-0x0000000004BD0000-0x0000000004BE8000-memory.dmp healer behavioral1/memory/3392-26-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/3392-46-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/3392-44-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/3392-42-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/3392-40-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/3392-38-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/3392-36-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/3392-34-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/3392-32-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/3392-30-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/3392-48-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/3392-24-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/3392-22-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/3392-21-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/3392-28-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7199.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7199.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1040-59-0x00000000071E0000-0x0000000007226000-memory.dmp family_redline behavioral1/memory/1040-60-0x0000000007860000-0x00000000078A4000-memory.dmp family_redline behavioral1/memory/1040-70-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-78-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-95-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-92-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-90-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-89-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-86-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-84-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-82-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-76-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-74-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-72-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-68-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-66-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-64-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-62-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-61-0x0000000007860000-0x000000000789E000-memory.dmp family_redline behavioral1/memory/1040-80-0x0000000007860000-0x000000000789E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4620 un387165.exe 3392 pro7199.exe 1040 qu7254.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7199.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 90ca4c4bb9261b016d8867a63169721550c7b103a1d098df5b96077e033c0448.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un387165.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3160 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90ca4c4bb9261b016d8867a63169721550c7b103a1d098df5b96077e033c0448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un387165.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7199.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7254.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3392 pro7199.exe 3392 pro7199.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3392 pro7199.exe Token: SeDebugPrivilege 1040 qu7254.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2844 wrote to memory of 4620 2844 90ca4c4bb9261b016d8867a63169721550c7b103a1d098df5b96077e033c0448.exe 84 PID 2844 wrote to memory of 4620 2844 90ca4c4bb9261b016d8867a63169721550c7b103a1d098df5b96077e033c0448.exe 84 PID 2844 wrote to memory of 4620 2844 90ca4c4bb9261b016d8867a63169721550c7b103a1d098df5b96077e033c0448.exe 84 PID 4620 wrote to memory of 3392 4620 un387165.exe 85 PID 4620 wrote to memory of 3392 4620 un387165.exe 85 PID 4620 wrote to memory of 3392 4620 un387165.exe 85 PID 4620 wrote to memory of 1040 4620 un387165.exe 94 PID 4620 wrote to memory of 1040 4620 un387165.exe 94 PID 4620 wrote to memory of 1040 4620 un387165.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\90ca4c4bb9261b016d8867a63169721550c7b103a1d098df5b96077e033c0448.exe"C:\Users\Admin\AppData\Local\Temp\90ca4c4bb9261b016d8867a63169721550c7b103a1d098df5b96077e033c0448.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un387165.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un387165.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7199.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7199.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3392
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7254.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7254.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3160
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5e6fce4fd38c4b383fc9cb0d5ea850b0e
SHA15ff2254ca3dc566da8f6a5bfaa5eaa650e26afad
SHA256629321210b9d42cf2bb62aa01269514c80b9a9fd4d0a9bcb5140ff35de43f3a9
SHA512e682c992f1d1952a248bad1672fc6879b8684c8f1f3bd6368398a81c52b6c43b7b7da5c716223ebfe951a6065dc878d6a9ffc4c933dae2c47d66ae5cb74c7b31
-
Filesize
322KB
MD5dc2267637ac53ff059b629d3e4eeaaa1
SHA1e35e1c3bc35e4fb5bdb0efd2f871a7887fd1c181
SHA25692b4693f0638d2c992ac395feaee5c93b77eb9df5f24e5655db1124e566786f6
SHA5121bf69523d7c035c526715f441e0c21ee0f3fbb7974a41e40907f9767bceca475a8e5de95718883312f9bb8fd213dc8f896d67ef61fe431664cb02a5a023d3103
-
Filesize
379KB
MD53a7dfd34a01fe1890666ad4828b20a9e
SHA18f047c0284916cde1fbdff30cba483d012298bdc
SHA2569766f8a167b71c396dba523afd4a50b63716f147c9d3597fbf2c91de1b7fb6c8
SHA512332de0997b54189c7c104d7f9a4b39f512403ba2c964c432a3d41ac29615bed0ef0ca0abbe45db214b4dc6d76a06df87db20419defd9eab7da40757db195699e