Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
b19fe36a516c8dc810df95ed1dea05a8e9fa07b4fdb2c7906d654f1d99871e13.exe
Resource
win10v2004-20241007-en
General
-
Target
b19fe36a516c8dc810df95ed1dea05a8e9fa07b4fdb2c7906d654f1d99871e13.exe
-
Size
696KB
-
MD5
7ff669a8c760e97531cdc5af5d4d9972
-
SHA1
6a52f953dcd3ffd3487c4e5fe911b3ca66f3bfdd
-
SHA256
b19fe36a516c8dc810df95ed1dea05a8e9fa07b4fdb2c7906d654f1d99871e13
-
SHA512
478efd0997f2d97b270028198681f9c14c3104f3055fe2c80f16f84cc3fd3589ad4d9cc952a2865f8cacb22054b424c673c9152d2f942085f23387f4a041d361
-
SSDEEP
12288:XMrwy90nqxreT89P3oax3NBJ9S9a3r69/tOMugb1bdFWAYkThq8HFoFD:nyv9fos9BJ9J3r6POM57TZsD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3260-18-0x00000000047A0000-0x00000000047BA000-memory.dmp healer behavioral1/memory/3260-20-0x0000000004850000-0x0000000004868000-memory.dmp healer behavioral1/memory/3260-36-0x0000000004850000-0x0000000004862000-memory.dmp healer behavioral1/memory/3260-48-0x0000000004850000-0x0000000004862000-memory.dmp healer behavioral1/memory/3260-46-0x0000000004850000-0x0000000004862000-memory.dmp healer behavioral1/memory/3260-44-0x0000000004850000-0x0000000004862000-memory.dmp healer behavioral1/memory/3260-42-0x0000000004850000-0x0000000004862000-memory.dmp healer behavioral1/memory/3260-40-0x0000000004850000-0x0000000004862000-memory.dmp healer behavioral1/memory/3260-38-0x0000000004850000-0x0000000004862000-memory.dmp healer behavioral1/memory/3260-34-0x0000000004850000-0x0000000004862000-memory.dmp healer behavioral1/memory/3260-32-0x0000000004850000-0x0000000004862000-memory.dmp healer behavioral1/memory/3260-30-0x0000000004850000-0x0000000004862000-memory.dmp healer behavioral1/memory/3260-28-0x0000000004850000-0x0000000004862000-memory.dmp healer behavioral1/memory/3260-26-0x0000000004850000-0x0000000004862000-memory.dmp healer behavioral1/memory/3260-24-0x0000000004850000-0x0000000004862000-memory.dmp healer behavioral1/memory/3260-22-0x0000000004850000-0x0000000004862000-memory.dmp healer behavioral1/memory/3260-21-0x0000000004850000-0x0000000004862000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9129.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3844-60-0x00000000070F0000-0x0000000007136000-memory.dmp family_redline behavioral1/memory/3844-61-0x00000000071B0000-0x00000000071F4000-memory.dmp family_redline behavioral1/memory/3844-69-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-75-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-95-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-93-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-91-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-89-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-87-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-85-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-83-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-81-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-79-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-77-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-73-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-71-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-67-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-65-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-63-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/3844-62-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1844 un502251.exe 3260 pro9129.exe 3844 qu0092.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9129.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b19fe36a516c8dc810df95ed1dea05a8e9fa07b4fdb2c7906d654f1d99871e13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un502251.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3488 3260 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b19fe36a516c8dc810df95ed1dea05a8e9fa07b4fdb2c7906d654f1d99871e13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un502251.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9129.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0092.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3260 pro9129.exe 3260 pro9129.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3260 pro9129.exe Token: SeDebugPrivilege 3844 qu0092.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1844 1872 b19fe36a516c8dc810df95ed1dea05a8e9fa07b4fdb2c7906d654f1d99871e13.exe 87 PID 1872 wrote to memory of 1844 1872 b19fe36a516c8dc810df95ed1dea05a8e9fa07b4fdb2c7906d654f1d99871e13.exe 87 PID 1872 wrote to memory of 1844 1872 b19fe36a516c8dc810df95ed1dea05a8e9fa07b4fdb2c7906d654f1d99871e13.exe 87 PID 1844 wrote to memory of 3260 1844 un502251.exe 88 PID 1844 wrote to memory of 3260 1844 un502251.exe 88 PID 1844 wrote to memory of 3260 1844 un502251.exe 88 PID 1844 wrote to memory of 3844 1844 un502251.exe 96 PID 1844 wrote to memory of 3844 1844 un502251.exe 96 PID 1844 wrote to memory of 3844 1844 un502251.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b19fe36a516c8dc810df95ed1dea05a8e9fa07b4fdb2c7906d654f1d99871e13.exe"C:\Users\Admin\AppData\Local\Temp\b19fe36a516c8dc810df95ed1dea05a8e9fa07b4fdb2c7906d654f1d99871e13.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502251.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un502251.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9129.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9129.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 10924⤵
- Program crash
PID:3488
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0092.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0092.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3260 -ip 32601⤵PID:2672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554KB
MD5f1aaad60510f5f12ed30e460230c7f1c
SHA10730d4d2f933c51f22af5a59041675b95e5c2c67
SHA256cc8239fd5dead35e9084397f08a83d4b72006293f869100d09684cecbe39eff8
SHA512ca8e358e6e43e28eb986dc4bce88e26e4a1c0c2fd0a37f27213d348d3e599a597bf19a20ff673ef0c7ceb73fcdaced1bedcddf628b0f20f27bf40881f113d9f9
-
Filesize
345KB
MD5966c2d562441a60a04a22ef0c8851651
SHA1930cad4525fdee09a9f333de33319b8491f4e9aa
SHA2563111e0d7f475a88dac9fb45377420cd103799663975a547b867442e2aec4a484
SHA51202e428fa9af1221d8c7499542b6ad87bc0826a5f18959536139243a147af166b5f0dce8034eecb4ba396759b988511942b067cf8c6b10c8251f80d755a249c8e
-
Filesize
403KB
MD505a7bc94643fdb213dac44cbfaa41d61
SHA132f14d4241a79ab4383c2cb7653b618f4d587ad5
SHA2563587c7ba97382a2f9b76a02462f3956ac8067084a427e8b2d9c0f8a7563e39ea
SHA5128f82615f77b664868f3eb69d6e64998bc854aadcee0fe800feb4c857238d7cbd9eaa5d7d3fb5cc60bae79d39a9e1878badc7c35d1e0557c52beff42a9e59c8fc