Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
8d436819f36d28fcbffa07b0624496aecb123e76167c71ed3385a2a11889ac51.exe
Resource
win10v2004-20241007-en
General
-
Target
8d436819f36d28fcbffa07b0624496aecb123e76167c71ed3385a2a11889ac51.exe
-
Size
1006KB
-
MD5
b144d50c6b31c61d5fe66f666c80e2c8
-
SHA1
a02efccddffe28b264022a6f01ce9d36370e2b8a
-
SHA256
8d436819f36d28fcbffa07b0624496aecb123e76167c71ed3385a2a11889ac51
-
SHA512
15731e7c7a45ada712fd00815d4ddd902c4c24244d463131823c87d690a0f8e0d567ab516d03fcc79c6df97c30f0738c56e7ca33fe79c698657580e422ce15d5
-
SSDEEP
24576:HybhZD2LHuM5ds/rSLEzL4B1HZy3Nui4qIXCX8NLlW3R:SjaLHn2rMOL4Bzy9H4qd8lo
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu398265.exe healer behavioral1/memory/3556-28-0x0000000000BF0000-0x0000000000BFA000-memory.dmp healer behavioral1/memory/1748-34-0x0000000002770000-0x000000000278A000-memory.dmp healer behavioral1/memory/1748-36-0x0000000004DA0000-0x0000000004DB8000-memory.dmp healer behavioral1/memory/1748-51-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/1748-64-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/1748-62-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/1748-60-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/1748-58-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/1748-57-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/1748-54-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/1748-52-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/1748-48-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/1748-46-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/1748-44-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/1748-42-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/1748-40-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/1748-38-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer behavioral1/memory/1748-37-0x0000000004DA0000-0x0000000004DB2000-memory.dmp healer -
Healer family
-
Processes:
cor0013.exebu398265.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor0013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor0013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bu398265.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor0013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bu398265.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bu398265.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bu398265.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor0013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor0013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor0013.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bu398265.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bu398265.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/412-72-0x0000000002710000-0x0000000002756000-memory.dmp family_redline behavioral1/memory/412-73-0x0000000004E00000-0x0000000004E44000-memory.dmp family_redline behavioral1/memory/412-79-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-83-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-107-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-105-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-103-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-101-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-99-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-97-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-95-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-93-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-91-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-87-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-85-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-81-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-89-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-77-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-75-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/412-74-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
Processes:
kina5799.exekina7134.exekina3311.exebu398265.execor0013.exedKd74s67.exepid process 2024 kina5799.exe 1548 kina7134.exe 3280 kina3311.exe 3556 bu398265.exe 1748 cor0013.exe 412 dKd74s67.exe -
Processes:
bu398265.execor0013.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bu398265.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor0013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor0013.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
8d436819f36d28fcbffa07b0624496aecb123e76167c71ed3385a2a11889ac51.exekina5799.exekina7134.exekina3311.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8d436819f36d28fcbffa07b0624496aecb123e76167c71ed3385a2a11889ac51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina5799.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina7134.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina3311.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 576 1748 WerFault.exe cor0013.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8d436819f36d28fcbffa07b0624496aecb123e76167c71ed3385a2a11889ac51.exekina5799.exekina7134.exekina3311.execor0013.exedKd74s67.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d436819f36d28fcbffa07b0624496aecb123e76167c71ed3385a2a11889ac51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina5799.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina7134.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina3311.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cor0013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dKd74s67.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bu398265.execor0013.exepid process 3556 bu398265.exe 3556 bu398265.exe 1748 cor0013.exe 1748 cor0013.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
bu398265.execor0013.exedKd74s67.exedescription pid process Token: SeDebugPrivilege 3556 bu398265.exe Token: SeDebugPrivilege 1748 cor0013.exe Token: SeDebugPrivilege 412 dKd74s67.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
8d436819f36d28fcbffa07b0624496aecb123e76167c71ed3385a2a11889ac51.exekina5799.exekina7134.exekina3311.exedescription pid process target process PID 4652 wrote to memory of 2024 4652 8d436819f36d28fcbffa07b0624496aecb123e76167c71ed3385a2a11889ac51.exe kina5799.exe PID 4652 wrote to memory of 2024 4652 8d436819f36d28fcbffa07b0624496aecb123e76167c71ed3385a2a11889ac51.exe kina5799.exe PID 4652 wrote to memory of 2024 4652 8d436819f36d28fcbffa07b0624496aecb123e76167c71ed3385a2a11889ac51.exe kina5799.exe PID 2024 wrote to memory of 1548 2024 kina5799.exe kina7134.exe PID 2024 wrote to memory of 1548 2024 kina5799.exe kina7134.exe PID 2024 wrote to memory of 1548 2024 kina5799.exe kina7134.exe PID 1548 wrote to memory of 3280 1548 kina7134.exe kina3311.exe PID 1548 wrote to memory of 3280 1548 kina7134.exe kina3311.exe PID 1548 wrote to memory of 3280 1548 kina7134.exe kina3311.exe PID 3280 wrote to memory of 3556 3280 kina3311.exe bu398265.exe PID 3280 wrote to memory of 3556 3280 kina3311.exe bu398265.exe PID 3280 wrote to memory of 1748 3280 kina3311.exe cor0013.exe PID 3280 wrote to memory of 1748 3280 kina3311.exe cor0013.exe PID 3280 wrote to memory of 1748 3280 kina3311.exe cor0013.exe PID 1548 wrote to memory of 412 1548 kina7134.exe dKd74s67.exe PID 1548 wrote to memory of 412 1548 kina7134.exe dKd74s67.exe PID 1548 wrote to memory of 412 1548 kina7134.exe dKd74s67.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d436819f36d28fcbffa07b0624496aecb123e76167c71ed3385a2a11889ac51.exe"C:\Users\Admin\AppData\Local\Temp\8d436819f36d28fcbffa07b0624496aecb123e76167c71ed3385a2a11889ac51.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina5799.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina5799.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina7134.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina7134.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3311.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3311.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu398265.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu398265.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0013.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor0013.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 10886⤵
- Program crash
PID:576 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dKd74s67.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dKd74s67.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1748 -ip 17481⤵PID:4952
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
821KB
MD5aaa29a9aa8e53f0980efea491d4dc652
SHA19a379d4d98e4e72457b931d4ef66620ba4c5fe0e
SHA2562c6b5c28afc25bfd3cb6dc4265f59da69e5bf74d4614ab704cdb939b2b279829
SHA512148bd830f33bc9f62b17ee9bf931ac46f170187080c24ba5a1b08429376bdafbe61aa4e29ffda6c33cc33542dc32e85ef60bba0d0e55f319601550f1fa8a486e
-
Filesize
679KB
MD5ec9624e9d61f27567f9fa102342e4ae6
SHA1daf0c63e5a016c853363e007849602c2174dab97
SHA2563e3b613016304a65e5abddf8356eccb764ce56c17f40317f0f36ef34afde1dd1
SHA5126e8d2e6b1a9820872728a727a6cef1eb53801e505e0d0e145adf00e0898b5a46eb98de2aeda7ec76f1828caa3f7ea47e390c52ea44b86f1276f4e80b41b58f1e
-
Filesize
353KB
MD57c26f130230ff6e462c067c28521e61a
SHA1e51156361792e84ea0553d24363b688fd6b31446
SHA2567df94239599a2d51c8440f7a68e15cc898c13039339720047b9cee059fd6957a
SHA5128f54cc0278cc628aca8c1fb3fcacd2777f187d4647c62e36215ecd5823ced423412cec1fc551d1efbc2559f75082a901a673108d6f9ba3ae0b2d4daa146f7c72
-
Filesize
336KB
MD5e1bbf021761e2fd036ccdd0dbc9b54eb
SHA1753caefeebeb43932b7c845c7c068ff72a27e1a9
SHA2568351d3b6b0f3ad5b3c0e0c8a537944be948fd1b27b504f3624b3df153d262417
SHA512e153bce7a9b8de52d763abe4cd53f6852413dec2c0c0c32c4777d94c33917fc3ddd6d542ca0a2cefa4043fc0af8e76462702ec64b19c6f25410d531890572dd0
-
Filesize
13KB
MD5ef27753f347e3867edc7628b84eed83b
SHA1eef68a89add80a36f8120c00aee2bbd4e0f90bce
SHA2564cda341e7d14b95a395fd08d35a2aca4fec87ed1cf5c6afab8d4a13f13cc7b0d
SHA512ea184ffaa14200ad28bb14e4364709ba41bd37210379315b8395ac4243d29de77b5f5a267c9679f07e8c839adbaf13428fc5c4134e5c377606afb0723cfa78a1
-
Filesize
294KB
MD57f3e8c7aabb1fefee7b0be7744c374bb
SHA1269277091450bc9d1dbecab134ab64338cbe1ee7
SHA256b55b36598fc1e6b68a70f6228462f3973b8dfd25edb574f084aba0763d51fa2e
SHA5121159b5a877634719f1df8662ed646d8ce29be47e427f1ada116905ddc95db6faa4a1433152d04e247f8c4a2acee27e05ebc24fadcb0fac272d6d82e524c74a8b