Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
55b4a82a129f7748e5dec22c943c83db81e6634240aef9139d491d856d41bce0.exe
Resource
win10v2004-20241007-en
General
-
Target
55b4a82a129f7748e5dec22c943c83db81e6634240aef9139d491d856d41bce0.exe
-
Size
666KB
-
MD5
4572dc5cfa6d972825f4a5ffb85f2f6f
-
SHA1
18e214f8b21dc257c17588bb24d33d5b2d08afcf
-
SHA256
55b4a82a129f7748e5dec22c943c83db81e6634240aef9139d491d856d41bce0
-
SHA512
98d4d15ba7eac992f6ccde9d6de32860801ee55cf6aafe2661dd5f1aa87760fedf95ca1475609070eebfb0db610e3f69cb455fdb051d7c012a07d1cc141ba458
-
SSDEEP
12288:DMrEy9022vFJ57Pnq5BAyF0PQhqiNmqu0vAyWwrU/DH/wHv9Qe8crBcrgcr:fyr2vrc5dFJhlN1uWVrOfw1QzCmrd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1424-19-0x0000000002680000-0x000000000269A000-memory.dmp healer behavioral1/memory/1424-21-0x0000000002770000-0x0000000002788000-memory.dmp healer behavioral1/memory/1424-27-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/1424-49-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/1424-47-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/1424-45-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/1424-43-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/1424-41-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/1424-39-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/1424-37-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/1424-35-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/1424-33-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/1424-31-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/1424-29-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/1424-25-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/1424-23-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/1424-22-0x0000000002770000-0x0000000002782000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8582.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1184-61-0x00000000029B0000-0x00000000029F6000-memory.dmp family_redline behavioral1/memory/1184-62-0x0000000004DD0000-0x0000000004E14000-memory.dmp family_redline behavioral1/memory/1184-68-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-77-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-96-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-94-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-92-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-90-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-88-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-86-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-82-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-80-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-79-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-74-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-72-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-70-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-84-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-66-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-64-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline behavioral1/memory/1184-63-0x0000000004DD0000-0x0000000004E0F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 844 un123065.exe 1424 pro8582.exe 1184 qu6085.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8582.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8582.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 55b4a82a129f7748e5dec22c943c83db81e6634240aef9139d491d856d41bce0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un123065.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1756 1424 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55b4a82a129f7748e5dec22c943c83db81e6634240aef9139d491d856d41bce0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un123065.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8582.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6085.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1424 pro8582.exe 1424 pro8582.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1424 pro8582.exe Token: SeDebugPrivilege 1184 qu6085.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4244 wrote to memory of 844 4244 55b4a82a129f7748e5dec22c943c83db81e6634240aef9139d491d856d41bce0.exe 84 PID 4244 wrote to memory of 844 4244 55b4a82a129f7748e5dec22c943c83db81e6634240aef9139d491d856d41bce0.exe 84 PID 4244 wrote to memory of 844 4244 55b4a82a129f7748e5dec22c943c83db81e6634240aef9139d491d856d41bce0.exe 84 PID 844 wrote to memory of 1424 844 un123065.exe 85 PID 844 wrote to memory of 1424 844 un123065.exe 85 PID 844 wrote to memory of 1424 844 un123065.exe 85 PID 844 wrote to memory of 1184 844 un123065.exe 96 PID 844 wrote to memory of 1184 844 un123065.exe 96 PID 844 wrote to memory of 1184 844 un123065.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\55b4a82a129f7748e5dec22c943c83db81e6634240aef9139d491d856d41bce0.exe"C:\Users\Admin\AppData\Local\Temp\55b4a82a129f7748e5dec22c943c83db81e6634240aef9139d491d856d41bce0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un123065.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un123065.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8582.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8582.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 10804⤵
- Program crash
PID:1756
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6085.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6085.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1424 -ip 14241⤵PID:1776
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
525KB
MD5d3ba970f77dd89eb186d44bccfc76071
SHA1f7f8525efc9d2af448b4c540160ce37b005abf4e
SHA256fd715d3ffc6c5b3f84594d099c04a6f46afe5bcdfc579c94faf70d207f7d3964
SHA51234b1cf9fe7cdccff0ac700431dfefd63d833cff5288cb8f8599acf9828ac53929a76ef4d943d4c871c66044a15369d4bdc000ac5e3ad712be8b91b6886d58b7d
-
Filesize
294KB
MD5e9bb7e145995c8f667168e80e85d7b10
SHA10e4c7e883f168cde049a044a90542ab53df6749d
SHA2567e9a9f9f27cdc06db31ee1e61826e67b0bfe27e60ab79899919f64583fe96bef
SHA5123c578a633e7194472d748e108b871b4e2d8cea2d875f97992349d509a85c8812a0c652475e32eeadf1dfe1b663ea10fc58d227c4171391d030bf8ba8df411121
-
Filesize
352KB
MD5b6032a7f2618d58919ef0a72dcf4f878
SHA1539c04d89dd26fdec0bf88610a9bfb68c59a5855
SHA256db440e8ad9d3053d9df36e21441733731b6fdab94476477ec5cb2ed74a845f8a
SHA5124ec7433d49d766b3adcd14413e2284a65645e8ede230619cdabc0a751d30659449502e72df88d60438f57a4708408a310bbd0c538d42fa90a0e11d9f8cff56b3