Analysis
-
max time kernel
143s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
8312290b15cd15a035e6ded567daf4c7c99eda2938fbdb03f83033a38a5dd18b.exe
Resource
win10v2004-20241007-en
General
-
Target
8312290b15cd15a035e6ded567daf4c7c99eda2938fbdb03f83033a38a5dd18b.exe
-
Size
696KB
-
MD5
6d65de5263a5230a9f228694231eea60
-
SHA1
f12c169f479b538e3b7072ae49d8230392cf1e3e
-
SHA256
8312290b15cd15a035e6ded567daf4c7c99eda2938fbdb03f83033a38a5dd18b
-
SHA512
1351de48806ac0c1bf298974edbfb11e42e301c618c12e556028c2df082f9b87d6f515032e2dc0ed914963a8336ea45ce25b0a1cad68662564eb94a1ddd1c8ba
-
SSDEEP
12288:QMrty90TJnfCRyIyp0kqzpyGGe9+soOoGpCSe1k5obR8D+Fz:tyuckSpy24iIp5t8D+h
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2824-18-0x0000000004B80000-0x0000000004B9A000-memory.dmp healer behavioral1/memory/2824-20-0x0000000007820000-0x0000000007838000-memory.dmp healer behavioral1/memory/2824-21-0x0000000007820000-0x0000000007832000-memory.dmp healer behavioral1/memory/2824-48-0x0000000007820000-0x0000000007832000-memory.dmp healer behavioral1/memory/2824-46-0x0000000007820000-0x0000000007832000-memory.dmp healer behavioral1/memory/2824-44-0x0000000007820000-0x0000000007832000-memory.dmp healer behavioral1/memory/2824-42-0x0000000007820000-0x0000000007832000-memory.dmp healer behavioral1/memory/2824-40-0x0000000007820000-0x0000000007832000-memory.dmp healer behavioral1/memory/2824-38-0x0000000007820000-0x0000000007832000-memory.dmp healer behavioral1/memory/2824-36-0x0000000007820000-0x0000000007832000-memory.dmp healer behavioral1/memory/2824-35-0x0000000007820000-0x0000000007832000-memory.dmp healer behavioral1/memory/2824-32-0x0000000007820000-0x0000000007832000-memory.dmp healer behavioral1/memory/2824-30-0x0000000007820000-0x0000000007832000-memory.dmp healer behavioral1/memory/2824-28-0x0000000007820000-0x0000000007832000-memory.dmp healer behavioral1/memory/2824-26-0x0000000007820000-0x0000000007832000-memory.dmp healer behavioral1/memory/2824-24-0x0000000007820000-0x0000000007832000-memory.dmp healer behavioral1/memory/2824-22-0x0000000007820000-0x0000000007832000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7097.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2904-60-0x0000000004AA0000-0x0000000004AE6000-memory.dmp family_redline behavioral1/memory/2904-61-0x00000000071D0000-0x0000000007214000-memory.dmp family_redline behavioral1/memory/2904-65-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-71-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-91-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-95-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-93-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-89-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-88-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-85-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-83-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-81-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-79-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-77-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-75-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-69-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-73-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-67-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-63-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2904-62-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1508 un447496.exe 2824 pro7097.exe 2904 qu1051.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7097.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8312290b15cd15a035e6ded567daf4c7c99eda2938fbdb03f83033a38a5dd18b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un447496.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 552 2824 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8312290b15cd15a035e6ded567daf4c7c99eda2938fbdb03f83033a38a5dd18b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un447496.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7097.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1051.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2824 pro7097.exe 2824 pro7097.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2824 pro7097.exe Token: SeDebugPrivilege 2904 qu1051.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2136 wrote to memory of 1508 2136 8312290b15cd15a035e6ded567daf4c7c99eda2938fbdb03f83033a38a5dd18b.exe 87 PID 2136 wrote to memory of 1508 2136 8312290b15cd15a035e6ded567daf4c7c99eda2938fbdb03f83033a38a5dd18b.exe 87 PID 2136 wrote to memory of 1508 2136 8312290b15cd15a035e6ded567daf4c7c99eda2938fbdb03f83033a38a5dd18b.exe 87 PID 1508 wrote to memory of 2824 1508 un447496.exe 88 PID 1508 wrote to memory of 2824 1508 un447496.exe 88 PID 1508 wrote to memory of 2824 1508 un447496.exe 88 PID 1508 wrote to memory of 2904 1508 un447496.exe 96 PID 1508 wrote to memory of 2904 1508 un447496.exe 96 PID 1508 wrote to memory of 2904 1508 un447496.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\8312290b15cd15a035e6ded567daf4c7c99eda2938fbdb03f83033a38a5dd18b.exe"C:\Users\Admin\AppData\Local\Temp\8312290b15cd15a035e6ded567daf4c7c99eda2938fbdb03f83033a38a5dd18b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un447496.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un447496.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7097.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7097.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 10804⤵
- Program crash
PID:552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1051.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1051.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2824 -ip 28241⤵PID:2424
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554KB
MD5e714cd786fbbc22285cde28455133792
SHA124367239c601737d16e5a18b84ef62249e72d315
SHA256be032b6bb1cf33be24c6835d0d80ccec9b99312d0bce11b8212ca281aa020c16
SHA512d61efe6233e9a6e64f1d38a0733c9a13ef5d5c5dfca1239de548a15960bcdbba33e25d3196005316275713379fbab4f250d2222f6a76a7733b7a074de9ed2eb7
-
Filesize
348KB
MD5040873b6ddc2621b748eb4081f91d7dc
SHA1718daa93335afd0870e7ee2b2efe214b1e641b35
SHA256194ba401e0be86a244222479cb499a45ba54ec5b9f143636725c555684eeac39
SHA512d184bcd415ddeea7236ce6318f716434c9663f11e61459eb7ee013ba9b941306e5ca7f5ee991eb12576ad8470e35ee5ddba3cc284fbd648fe3e06dc579fab2ce
-
Filesize
406KB
MD52da5db06965a5fc5b7384ff0cfa49d9a
SHA1f32f08b65f5f44ce0077fa85a54c1df6a4d62e3e
SHA256cc10cb5ffda27457e1c5b868deaf8fa2248aa6bbfa3f0eca43fed78b5954230c
SHA512280ac2f30e2ae35784494cbb81ae11f881dff3da62bf499cb660a31b40f4c11b1a34509ac7d504bb8ca36bf5c744e9a8dc9194412c8fd81f3200f8ecce2b12e9