Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c.exe
Resource
win10v2004-20241007-en
General
-
Target
4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c.exe
-
Size
657KB
-
MD5
e79eb1a5050b2992234fed03bb05326f
-
SHA1
66851ffdf1b9974c9d360cd1d3c1b33cb295dd1c
-
SHA256
4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c
-
SHA512
d0b6bd60dddd8fb61096a885d20dbfc5a0d4f05e1c7be49fd4df4b52eb43315595fb3c52f207bf7f4e349ebce9e5011927e17aa8fd26957e7dc8c668d779c04c
-
SSDEEP
12288:aMrWy90gvWIE9cbnxj+sY06GY8yfKIjSZud4bC5l7LIU+ECZxV/Wn6Dt:4yTvL5bxqiifhLLn+ECzft
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1368-18-0x0000000004940000-0x000000000495A000-memory.dmp healer behavioral1/memory/1368-20-0x0000000004B50000-0x0000000004B68000-memory.dmp healer behavioral1/memory/1368-48-0x0000000004B50000-0x0000000004B62000-memory.dmp healer behavioral1/memory/1368-46-0x0000000004B50000-0x0000000004B62000-memory.dmp healer behavioral1/memory/1368-44-0x0000000004B50000-0x0000000004B62000-memory.dmp healer behavioral1/memory/1368-42-0x0000000004B50000-0x0000000004B62000-memory.dmp healer behavioral1/memory/1368-40-0x0000000004B50000-0x0000000004B62000-memory.dmp healer behavioral1/memory/1368-38-0x0000000004B50000-0x0000000004B62000-memory.dmp healer behavioral1/memory/1368-36-0x0000000004B50000-0x0000000004B62000-memory.dmp healer behavioral1/memory/1368-34-0x0000000004B50000-0x0000000004B62000-memory.dmp healer behavioral1/memory/1368-32-0x0000000004B50000-0x0000000004B62000-memory.dmp healer behavioral1/memory/1368-30-0x0000000004B50000-0x0000000004B62000-memory.dmp healer behavioral1/memory/1368-28-0x0000000004B50000-0x0000000004B62000-memory.dmp healer behavioral1/memory/1368-26-0x0000000004B50000-0x0000000004B62000-memory.dmp healer behavioral1/memory/1368-24-0x0000000004B50000-0x0000000004B62000-memory.dmp healer behavioral1/memory/1368-22-0x0000000004B50000-0x0000000004B62000-memory.dmp healer behavioral1/memory/1368-21-0x0000000004B50000-0x0000000004B62000-memory.dmp healer -
Healer family
-
Processes:
pro5258.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5258.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5258.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5258.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5258.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5258.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5258.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4624-60-0x00000000070D0000-0x0000000007116000-memory.dmp family_redline behavioral1/memory/4624-61-0x0000000007190000-0x00000000071D4000-memory.dmp family_redline behavioral1/memory/4624-95-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-93-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-91-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-89-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-87-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-85-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-83-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-81-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-79-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-77-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-75-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-73-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-71-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-69-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-67-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-65-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-63-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/4624-62-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un171405.exepro5258.exequ1650.exepid process 3168 un171405.exe 1368 pro5258.exe 4624 qu1650.exe -
Processes:
pro5258.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5258.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5258.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c.exeun171405.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un171405.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3684 1368 WerFault.exe pro5258.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un171405.exepro5258.exequ1650.exe4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un171405.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5258.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1650.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro5258.exepid process 1368 pro5258.exe 1368 pro5258.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro5258.exequ1650.exedescription pid process Token: SeDebugPrivilege 1368 pro5258.exe Token: SeDebugPrivilege 4624 qu1650.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c.exeun171405.exedescription pid process target process PID 2128 wrote to memory of 3168 2128 4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c.exe un171405.exe PID 2128 wrote to memory of 3168 2128 4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c.exe un171405.exe PID 2128 wrote to memory of 3168 2128 4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c.exe un171405.exe PID 3168 wrote to memory of 1368 3168 un171405.exe pro5258.exe PID 3168 wrote to memory of 1368 3168 un171405.exe pro5258.exe PID 3168 wrote to memory of 1368 3168 un171405.exe pro5258.exe PID 3168 wrote to memory of 4624 3168 un171405.exe qu1650.exe PID 3168 wrote to memory of 4624 3168 un171405.exe qu1650.exe PID 3168 wrote to memory of 4624 3168 un171405.exe qu1650.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c.exe"C:\Users\Admin\AppData\Local\Temp\4d6cd430745d0a70438a5a22ba7296f2d8e9e4f77971f0a4242841f32e11609c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un171405.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un171405.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5258.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5258.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 10804⤵
- Program crash
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1650.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1650.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1368 -ip 13681⤵PID:4816
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
515KB
MD5d9da1c7196005451e43dee1f97de4179
SHA16afa8c5973d3b72ee3bc21a5ef9c4cbab4cddab2
SHA25626e3af16da4f17269c0a1bfee2b4e3dc97f57111be8f17d68acda6103c8805ac
SHA51229e28149a3d9453c36c1dcf2a98bd7e572497048189b4c9a7f1968c6bc87039dff018e87425b43e4a9c6572c1dc1c2ff222095a74f8ff93cbaba010087f135ff
-
Filesize
295KB
MD5a156e7e6e03e30ba070c4b8ac1b79cb2
SHA17961949997169d2422622f88e85ddeaaa1791076
SHA2561eb6225df424a81b078cf3a679d9a73736482a908a6c020d3c4b131a1e1e48c0
SHA512f29ab295ea357eb162c95009ed77b6c6854853f83745096b0c60b0397b9961cb5d05773ed5518e9f69a02dadd6e09b5c7d3b54092d7b36784cb5f584b47226a0
-
Filesize
354KB
MD51de223ace33a23bd4861033069be92a5
SHA14205bfd01e057956168bc983e7fc1ac45c2a4514
SHA2566d37a40f8e0aa5aea67c2c99fdc3cdfd175a2799161601d5ee1514334980bb03
SHA5124cded42e48dae55d6ca11ee58f10f2ef67300a84c66b9ee53250fee3f1f8c0c824592544837de074b71e93a8a4a6a8cc567e2d74f33a404da6fe27f8383901b2