Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
11bdd8caf0f76647d49b0aa015068c71b502c2ad350f7b0a3ca784dd277bcf65.exe
Resource
win10v2004-20241007-en
General
-
Target
11bdd8caf0f76647d49b0aa015068c71b502c2ad350f7b0a3ca784dd277bcf65.exe
-
Size
1006KB
-
MD5
99d3a9ea736eadb4d10e17bb0fff22ac
-
SHA1
d3f7020ee2249fe845a326b8bbca310de5c5bdda
-
SHA256
11bdd8caf0f76647d49b0aa015068c71b502c2ad350f7b0a3ca784dd277bcf65
-
SHA512
19b75d61e19a2b541617d9bafdb99e8967a45b0e89908e75c8f334b3cffae544e5f56f63388d79a66a6c9e241344720489503e30482207092108c34aff0bd3de
-
SSDEEP
24576:RypDpnXJV/EZYC6lqsvz+1kssaCNJa7nm/D0:E3nX/4yT61XygS/D
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000b000000023b76-26.dat healer behavioral1/memory/2660-28-0x00000000003D0000-0x00000000003DA000-memory.dmp healer behavioral1/memory/5080-34-0x00000000025B0000-0x00000000025CA000-memory.dmp healer behavioral1/memory/5080-36-0x0000000002920000-0x0000000002938000-memory.dmp healer behavioral1/memory/5080-37-0x0000000002920000-0x0000000002932000-memory.dmp healer behavioral1/memory/5080-64-0x0000000002920000-0x0000000002932000-memory.dmp healer behavioral1/memory/5080-62-0x0000000002920000-0x0000000002932000-memory.dmp healer behavioral1/memory/5080-60-0x0000000002920000-0x0000000002932000-memory.dmp healer behavioral1/memory/5080-58-0x0000000002920000-0x0000000002932000-memory.dmp healer behavioral1/memory/5080-56-0x0000000002920000-0x0000000002932000-memory.dmp healer behavioral1/memory/5080-54-0x0000000002920000-0x0000000002932000-memory.dmp healer behavioral1/memory/5080-52-0x0000000002920000-0x0000000002932000-memory.dmp healer behavioral1/memory/5080-50-0x0000000002920000-0x0000000002932000-memory.dmp healer behavioral1/memory/5080-48-0x0000000002920000-0x0000000002932000-memory.dmp healer behavioral1/memory/5080-46-0x0000000002920000-0x0000000002932000-memory.dmp healer behavioral1/memory/5080-44-0x0000000002920000-0x0000000002932000-memory.dmp healer behavioral1/memory/5080-43-0x0000000002920000-0x0000000002932000-memory.dmp healer behavioral1/memory/5080-40-0x0000000002920000-0x0000000002932000-memory.dmp healer behavioral1/memory/5080-38-0x0000000002920000-0x0000000002932000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor4984.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor4984.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor4984.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor4984.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bu912993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bu912993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bu912993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bu912993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor4984.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor4984.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bu912993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bu912993.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3804-72-0x0000000002790000-0x00000000027D6000-memory.dmp family_redline behavioral1/memory/3804-73-0x00000000028E0000-0x0000000002924000-memory.dmp family_redline behavioral1/memory/3804-75-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-74-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-89-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-105-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-103-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-101-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-99-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-97-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-95-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-93-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-87-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-85-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-83-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-81-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-79-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-77-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-107-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/3804-91-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 3740 kina7415.exe 1736 kina1828.exe 3296 kina6611.exe 2660 bu912993.exe 5080 cor4984.exe 3804 dCD71s40.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor4984.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor4984.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bu912993.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina6611.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 11bdd8caf0f76647d49b0aa015068c71b502c2ad350f7b0a3ca784dd277bcf65.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina7415.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina1828.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 516 5080 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11bdd8caf0f76647d49b0aa015068c71b502c2ad350f7b0a3ca784dd277bcf65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina7415.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina1828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina6611.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cor4984.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dCD71s40.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2660 bu912993.exe 2660 bu912993.exe 5080 cor4984.exe 5080 cor4984.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2660 bu912993.exe Token: SeDebugPrivilege 5080 cor4984.exe Token: SeDebugPrivilege 3804 dCD71s40.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4984 wrote to memory of 3740 4984 11bdd8caf0f76647d49b0aa015068c71b502c2ad350f7b0a3ca784dd277bcf65.exe 84 PID 4984 wrote to memory of 3740 4984 11bdd8caf0f76647d49b0aa015068c71b502c2ad350f7b0a3ca784dd277bcf65.exe 84 PID 4984 wrote to memory of 3740 4984 11bdd8caf0f76647d49b0aa015068c71b502c2ad350f7b0a3ca784dd277bcf65.exe 84 PID 3740 wrote to memory of 1736 3740 kina7415.exe 85 PID 3740 wrote to memory of 1736 3740 kina7415.exe 85 PID 3740 wrote to memory of 1736 3740 kina7415.exe 85 PID 1736 wrote to memory of 3296 1736 kina1828.exe 86 PID 1736 wrote to memory of 3296 1736 kina1828.exe 86 PID 1736 wrote to memory of 3296 1736 kina1828.exe 86 PID 3296 wrote to memory of 2660 3296 kina6611.exe 88 PID 3296 wrote to memory of 2660 3296 kina6611.exe 88 PID 3296 wrote to memory of 5080 3296 kina6611.exe 97 PID 3296 wrote to memory of 5080 3296 kina6611.exe 97 PID 3296 wrote to memory of 5080 3296 kina6611.exe 97 PID 1736 wrote to memory of 3804 1736 kina1828.exe 104 PID 1736 wrote to memory of 3804 1736 kina1828.exe 104 PID 1736 wrote to memory of 3804 1736 kina1828.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\11bdd8caf0f76647d49b0aa015068c71b502c2ad350f7b0a3ca784dd277bcf65.exe"C:\Users\Admin\AppData\Local\Temp\11bdd8caf0f76647d49b0aa015068c71b502c2ad350f7b0a3ca784dd277bcf65.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7415.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7415.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1828.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1828.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6611.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6611.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu912993.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu912993.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4984.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4984.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 10966⤵
- Program crash
PID:516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dCD71s40.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dCD71s40.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5080 -ip 50801⤵PID:3760
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
822KB
MD595224e6d66c4ad40a7410c1e587fa1e2
SHA1a7d8234ce80009806936815b7f2f1fe36e832b72
SHA256cc4eac475f28a7208a37c6b6e8680082f19fab39aa2e225496f8681070fec819
SHA512980b820303112f7aa6d5cdfb364fc66e8ad5ec8d5a3779e68904d5fb067278ce407d83074959bfcd2927ac4cc9809875fcca0a46bb6eb233c4fd9a36fbab85ef
-
Filesize
680KB
MD54e3c2b4684f45de510b9809f6a750367
SHA1d0eda1e72884b573c11e79cd8578f2969abae144
SHA256f4df272dd14f498705fe8208a68504e23b97f718ea6ec2d684430527aa89f1ab
SHA51250f5e423b93ffdd5aa9438e924bf69e3cfcb44a21ec86b2158fd4a413c5dce4fb249fd44da4e345e97aa68bb96c252be77438b6e5fe02457444e6d61751a80ae
-
Filesize
353KB
MD554adced244ec6d9d598f9513aa1bb751
SHA1106b4f104c3e391e9d7a0197c6eadbdb07a77be8
SHA256843301b9ccaaefdd446ed3452a4e9bf478031fcb8dcb1113cc6cef7ad3d4f539
SHA512006b625889d9ffac5b9dcb5b43607ad69a089a9b957b1493468a0412e7fcbab49b488fbe97a974cd2897b65c9d43ba7104ff799c0219ec1d86014c91eb9f5017
-
Filesize
336KB
MD5fca83c0a76f5ca813c28dacff4613f4d
SHA1aef249b633c8d44f5021ab97f8e57b06bf015225
SHA2561b2f0e8662399db8aff8b2c6faa49ca3f18f8fd53fa00c5383bc3ecc3c460588
SHA512af181105df6232e5518534ca27b1d1060fde97a5eb943dda71d00d604e620fd11741557a2f379bf895fbe3dfc84a1e0d31cd97d08e155f5dbf97bd5e5e6c18bf
-
Filesize
13KB
MD54f4dbe9352c3f20e7f1318aa58d12dd3
SHA1eb455f449ff3c3842cfe7d6f3278442e48bd0e1c
SHA25682412bdffe62c540f741dacbc80a43196cf9e593c10ceaf9a109b3895defe08c
SHA512a0ed241004dc224a191756563b10b26e490d488b701827f4a9ecd828d8dc0643627b685e906768b9fdbe08e4ccd21e1ce482bcddd6a809f9886f20c89fe878a0
-
Filesize
294KB
MD56cae2521b1640d6842e4af03aa0f9e23
SHA149516ace0b8b72516363931ffa367af693f69758
SHA2568c9987f8eae53ebbe8b2b09e15c3bcda6dbe262eb6f073f1cc8421a47b062406
SHA512243b8fb95ef7b63c49f5abd993eb0057f79f5771a5ce011bc028f6bb679700037dce006c383d58b984e52c95d707c46f3dc67048888fc6801407bd891f655b1e