Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
7be6511830b1b45b437de3302f47a7bcac679c9061398bd0816bff010b8858db.exe
Resource
win10v2004-20241007-en
General
-
Target
7be6511830b1b45b437de3302f47a7bcac679c9061398bd0816bff010b8858db.exe
-
Size
689KB
-
MD5
56fbb4175e3569f6f83cfd87aaebf001
-
SHA1
bb95d45fa21fbf6b8a1d6ca5c42eaaabefa9fe80
-
SHA256
7be6511830b1b45b437de3302f47a7bcac679c9061398bd0816bff010b8858db
-
SHA512
e7a2af7682c6fdce539546da6b7f08a5d459f2e9602e8bc63760a4b48af26ec0aef69272909e072f7fc6b07442f1fa5e3fc4b7b96d46a74af2d9bdfbf6d078eb
-
SSDEEP
12288:jMrty90KKYXubMxWSBvgKNHwQIcgsaNmJOhE0EExJlOVkMgD:yyzeExv/HwTcgRNC0EEIVkMgD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4520-19-0x00000000026D0000-0x00000000026EA000-memory.dmp healer behavioral1/memory/4520-21-0x0000000002870000-0x0000000002888000-memory.dmp healer behavioral1/memory/4520-23-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4520-49-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4520-47-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4520-45-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4520-25-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4520-43-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4520-41-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4520-39-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4520-38-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4520-35-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4520-33-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4520-29-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4520-27-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4520-22-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4520-31-0x0000000002870000-0x0000000002882000-memory.dmp healer -
Healer family
-
Processes:
pro1974.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1974.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1974.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3028-61-0x0000000004D50000-0x0000000004D96000-memory.dmp family_redline behavioral1/memory/3028-62-0x0000000005400000-0x0000000005444000-memory.dmp family_redline behavioral1/memory/3028-78-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-88-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-96-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-94-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-92-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-90-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-86-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-84-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-82-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-80-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-76-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-74-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-72-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-70-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-68-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-66-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-64-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/3028-63-0x0000000005400000-0x000000000543F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un087216.exepro1974.exequ5817.exepid process 4924 un087216.exe 4520 pro1974.exe 3028 qu5817.exe -
Processes:
pro1974.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1974.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1974.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un087216.exe7be6511830b1b45b437de3302f47a7bcac679c9061398bd0816bff010b8858db.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un087216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7be6511830b1b45b437de3302f47a7bcac679c9061398bd0816bff010b8858db.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3680 4520 WerFault.exe pro1974.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro1974.exequ5817.exe7be6511830b1b45b437de3302f47a7bcac679c9061398bd0816bff010b8858db.exeun087216.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1974.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5817.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7be6511830b1b45b437de3302f47a7bcac679c9061398bd0816bff010b8858db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un087216.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1974.exepid process 4520 pro1974.exe 4520 pro1974.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1974.exequ5817.exedescription pid process Token: SeDebugPrivilege 4520 pro1974.exe Token: SeDebugPrivilege 3028 qu5817.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
7be6511830b1b45b437de3302f47a7bcac679c9061398bd0816bff010b8858db.exeun087216.exedescription pid process target process PID 1352 wrote to memory of 4924 1352 7be6511830b1b45b437de3302f47a7bcac679c9061398bd0816bff010b8858db.exe un087216.exe PID 1352 wrote to memory of 4924 1352 7be6511830b1b45b437de3302f47a7bcac679c9061398bd0816bff010b8858db.exe un087216.exe PID 1352 wrote to memory of 4924 1352 7be6511830b1b45b437de3302f47a7bcac679c9061398bd0816bff010b8858db.exe un087216.exe PID 4924 wrote to memory of 4520 4924 un087216.exe pro1974.exe PID 4924 wrote to memory of 4520 4924 un087216.exe pro1974.exe PID 4924 wrote to memory of 4520 4924 un087216.exe pro1974.exe PID 4924 wrote to memory of 3028 4924 un087216.exe qu5817.exe PID 4924 wrote to memory of 3028 4924 un087216.exe qu5817.exe PID 4924 wrote to memory of 3028 4924 un087216.exe qu5817.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7be6511830b1b45b437de3302f47a7bcac679c9061398bd0816bff010b8858db.exe"C:\Users\Admin\AppData\Local\Temp\7be6511830b1b45b437de3302f47a7bcac679c9061398bd0816bff010b8858db.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un087216.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un087216.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1974.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1974.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 10804⤵
- Program crash
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5817.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5817.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4520 -ip 45201⤵PID:3704
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5f9736c0b6e26a20b0a1a4087bb35dbf3
SHA1895f1bbce1e1c97b1a1578dd48b89664875ebf7b
SHA256ff0f1042430bff0d2100dc9b5de0f5f0a918bf4140e5f451c74afdabbd803630
SHA5120143627add42e11d7fb40515d57d39669e4eeb8b6dfb062b8f94eb645855823ddf969d35b1ab27c800cd7ba1eee593d2295343f31d355aea33982f3ca6677464
-
Filesize
314KB
MD55cb0bafb5f15916932d2c0d574341133
SHA1e0dbba462dc8be2f285e31d4294c00797e926aaf
SHA2569ba709ae460c5dfd58ef430da3f948b8ca5de675d10a13d89d6b2b352cf74135
SHA51229faa1e0697c9ddb1212d4dc97f613b8160ef44b73dc9273f0f0d1659c0089da4d0453b9870a33223a68b48ab214dbd59676d8eb8bce1c112175b8954825d6e9
-
Filesize
372KB
MD562d0f85a2ddd0a546d92a7796191e6df
SHA1d3c3400215c62e3d3719814886e39501aa6b0c6e
SHA256295e2003b5cf3a910471bbe6c060d18a4e3fdcd64ea92b739bba1b9716ef5161
SHA5126c41a63a73b09744a7b7692634fcd88784b8e467a63e2e6b4fcb8498730726bb20bba48d729da3da714dea862c4e4a03939d75f515370abc942f151db871a31e