Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
6b92a72e30eb51392269dba40e78e96b82c7dfec6903b2930e76f5dad7ef55d8.exe
Resource
win10v2004-20241007-en
General
-
Target
6b92a72e30eb51392269dba40e78e96b82c7dfec6903b2930e76f5dad7ef55d8.exe
-
Size
698KB
-
MD5
9eddae64c7d28f17595440ad4be5edec
-
SHA1
d862793ab24992f47e114b9dd5ebd4be50f603ac
-
SHA256
6b92a72e30eb51392269dba40e78e96b82c7dfec6903b2930e76f5dad7ef55d8
-
SHA512
3b8e6f8e6a28c3b94b5250246549a881483cc8307f6c911739a2519a4662628a7caca0879e6303b1975a7dfbc3692c280e5b7545b339af70bbe9186ae736fd40
-
SSDEEP
12288:pMr3y90QWUkcQxRvlaFrOmH7KeWSnGWUf84vepUoU4cXqTUSEdWD1b:SyGioFlagO3Ufr6UoU4cXld6b
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1168-18-0x0000000004830000-0x000000000484A000-memory.dmp healer behavioral1/memory/1168-20-0x0000000004BE0000-0x0000000004BF8000-memory.dmp healer behavioral1/memory/1168-36-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/1168-32-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/1168-48-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/1168-46-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/1168-44-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/1168-42-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/1168-40-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/1168-38-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/1168-34-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/1168-30-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/1168-28-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/1168-24-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/1168-22-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/1168-21-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer behavioral1/memory/1168-26-0x0000000004BE0000-0x0000000004BF2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8216.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8216.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3972-60-0x0000000004C70000-0x0000000004CB6000-memory.dmp family_redline behavioral1/memory/3972-61-0x00000000071E0000-0x0000000007224000-memory.dmp family_redline behavioral1/memory/3972-65-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-75-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-95-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-91-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-89-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-88-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-85-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-83-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-81-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-77-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-73-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-71-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-70-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-67-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-93-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-79-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-63-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline behavioral1/memory/3972-62-0x00000000071E0000-0x000000000721F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1896 un691857.exe 1168 pro8216.exe 3972 qu2579.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8216.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8216.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6b92a72e30eb51392269dba40e78e96b82c7dfec6903b2930e76f5dad7ef55d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un691857.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3968 1168 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b92a72e30eb51392269dba40e78e96b82c7dfec6903b2930e76f5dad7ef55d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un691857.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8216.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2579.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1168 pro8216.exe 1168 pro8216.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1168 pro8216.exe Token: SeDebugPrivilege 3972 qu2579.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1896 1356 6b92a72e30eb51392269dba40e78e96b82c7dfec6903b2930e76f5dad7ef55d8.exe 84 PID 1356 wrote to memory of 1896 1356 6b92a72e30eb51392269dba40e78e96b82c7dfec6903b2930e76f5dad7ef55d8.exe 84 PID 1356 wrote to memory of 1896 1356 6b92a72e30eb51392269dba40e78e96b82c7dfec6903b2930e76f5dad7ef55d8.exe 84 PID 1896 wrote to memory of 1168 1896 un691857.exe 85 PID 1896 wrote to memory of 1168 1896 un691857.exe 85 PID 1896 wrote to memory of 1168 1896 un691857.exe 85 PID 1896 wrote to memory of 3972 1896 un691857.exe 98 PID 1896 wrote to memory of 3972 1896 un691857.exe 98 PID 1896 wrote to memory of 3972 1896 un691857.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b92a72e30eb51392269dba40e78e96b82c7dfec6903b2930e76f5dad7ef55d8.exe"C:\Users\Admin\AppData\Local\Temp\6b92a72e30eb51392269dba40e78e96b82c7dfec6903b2930e76f5dad7ef55d8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un691857.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un691857.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8216.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8216.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 10844⤵
- Program crash
PID:3968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2579.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2579.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1168 -ip 11681⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
556KB
MD5d7d6ae0d5c130195721e5a3934cb991f
SHA16aed6d33288b3e2e1fcfc2b85fe140c28bf6ed94
SHA25677b6191d1b9752f482fe96d9d84a5b6dd2476af3b11e5dde3d724f31c4ce0cbc
SHA512690bf733c80496eb000f58c4881f5d4007d43de887269e284fed40eb01163b62fe1f853b99e9b6f3a884e8a6499c31194df98a7dd2db0f8eeaddbe9838ce5a4d
-
Filesize
348KB
MD56fb96d274220a04aa3775a3afa881ad6
SHA1c0f4c5b37deb8bbaf0307589e0f5a3f6191eb393
SHA2568961baf846f7d196733d0ce6e9183817ec8783f096abb15c6d46b8a19a6fe159
SHA5122f95272d2ca378fffdcb77060b966f77e697e162788302bb880e995e0631f2193a069b0beacb5137d18591aa6febf9a41999127a084820c8e250320ea82ae120
-
Filesize
406KB
MD5b70859491bf97953ff5d0e3a3dbbed2b
SHA187b673710f6b8b9ad4cd1deb65b47c3599453410
SHA256d3e76413fd3a8d6d96147cd1c8008270ac7e4096e9e347f4cef386e2952cd7cd
SHA5129529ff525b944b03a8d5d4df7236b78e564084663312eeafd90c2ad3fadafd05af7a0b3c8f5508fab06e44ab0c58470e89ce0ecc27b689a70d55c6c898fcc976