Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:27
Static task
static1
Behavioral task
behavioral1
Sample
ded84ce2afa5153686591a67c502d7859d8c7a1cf150197cbb61ff3fcb9d79ff.exe
Resource
win10v2004-20241007-en
General
-
Target
ded84ce2afa5153686591a67c502d7859d8c7a1cf150197cbb61ff3fcb9d79ff.exe
-
Size
689KB
-
MD5
2f7b42bec4ccd28ba983461cd891aa12
-
SHA1
e0d771d585731d5978526aca70e812c104411846
-
SHA256
ded84ce2afa5153686591a67c502d7859d8c7a1cf150197cbb61ff3fcb9d79ff
-
SHA512
3733401e77f5e9b9b7e07c7f07bb3c5353e0b6261eece14a92e005272e5449d07c38e96fa55d5752e24ad34b80d626460ffd8c54baad85808a83426d2a16f05c
-
SSDEEP
12288:2MrSy90hmsiSf/QDXH5fhA3aHjvwutW6i0MBmBkX+4aTzNhlCQgUo8l2n:Iy6msig/wH55A3aDv7thfMsB9NO7UGn
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3640-19-0x0000000002670000-0x000000000268A000-memory.dmp healer behavioral1/memory/3640-21-0x0000000004DB0000-0x0000000004DC8000-memory.dmp healer behavioral1/memory/3640-23-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3640-49-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3640-47-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3640-46-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3640-43-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3640-41-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3640-39-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3640-37-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3640-36-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3640-33-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3640-31-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3640-29-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3640-27-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3640-26-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3640-22-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9923.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9923.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1084-60-0x0000000002810000-0x0000000002856000-memory.dmp family_redline behavioral1/memory/1084-61-0x0000000005470000-0x00000000054B4000-memory.dmp family_redline behavioral1/memory/1084-63-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-62-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-77-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-95-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-94-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-89-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-87-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-85-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-83-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-81-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-80-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-75-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-73-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-71-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-69-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-67-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-65-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline behavioral1/memory/1084-91-0x0000000005470000-0x00000000054AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3608 un101364.exe 3640 pro9923.exe 1084 qu3616.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9923.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ded84ce2afa5153686591a67c502d7859d8c7a1cf150197cbb61ff3fcb9d79ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un101364.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4088 3640 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ded84ce2afa5153686591a67c502d7859d8c7a1cf150197cbb61ff3fcb9d79ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un101364.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9923.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3616.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3640 pro9923.exe 3640 pro9923.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3640 pro9923.exe Token: SeDebugPrivilege 1084 qu3616.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2000 wrote to memory of 3608 2000 ded84ce2afa5153686591a67c502d7859d8c7a1cf150197cbb61ff3fcb9d79ff.exe 84 PID 2000 wrote to memory of 3608 2000 ded84ce2afa5153686591a67c502d7859d8c7a1cf150197cbb61ff3fcb9d79ff.exe 84 PID 2000 wrote to memory of 3608 2000 ded84ce2afa5153686591a67c502d7859d8c7a1cf150197cbb61ff3fcb9d79ff.exe 84 PID 3608 wrote to memory of 3640 3608 un101364.exe 85 PID 3608 wrote to memory of 3640 3608 un101364.exe 85 PID 3608 wrote to memory of 3640 3608 un101364.exe 85 PID 3608 wrote to memory of 1084 3608 un101364.exe 96 PID 3608 wrote to memory of 1084 3608 un101364.exe 96 PID 3608 wrote to memory of 1084 3608 un101364.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ded84ce2afa5153686591a67c502d7859d8c7a1cf150197cbb61ff3fcb9d79ff.exe"C:\Users\Admin\AppData\Local\Temp\ded84ce2afa5153686591a67c502d7859d8c7a1cf150197cbb61ff3fcb9d79ff.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un101364.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un101364.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9923.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9923.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 10484⤵
- Program crash
PID:4088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3616.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3616.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3640 -ip 36401⤵PID:1648
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5242eebd756ccf3cb7124e22ec7d3f90c
SHA1ab48c2363b76744eb78eda9c89a72f687ecca342
SHA256a7b6c5d7c863fb22f272b3fe97b62b135f68c61c525f1f2bf15738b26ff119ca
SHA512c949b170a8dd903b36bd0da355cf0ddcbc7d6a94830eea87466d2e99d6e0ded7a87fab96223650c985c61d61721c89ff1ddec52c663211c36bf3f857492b1856
-
Filesize
314KB
MD5e15c7278ce9dfa66a767c245341af3f6
SHA191fdb13053e90809a7cf10d8b1cf979f224aeb96
SHA256a1f40314eda006166c791edb9d80a6cc51e33ea674cc9238bde37fef24e36698
SHA5129a62f915a16e8b8dd9f8e66c523e9ec0caadc18f37e1525927e261a01fd5c3575598e354b44e99f43f877b835b0389d9b374388d57696630f85472c37a32b151
-
Filesize
372KB
MD52f351a3fc9c7f19838f8e6438c0676ad
SHA1fe5d226a9bb40181dc33a9f69f55d6b3c6048bc0
SHA25641a85e25464aeb61b2a1721b30648f1f911a2272f12ce37a6324627dd3753f1a
SHA51295b579717fee3473fd8feb33de3ff4d2f37a1da34dc74dbfbff7d04f3d709cda24801aa6614ff032e0678bce233ae6784901c54a5987aaaffddc2caa50518c4e