Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 23:00
Static task
static1
Behavioral task
behavioral1
Sample
064a924ed928e1e100d725db8178813d3160cda37eeea12d2a66c7183f0db521.exe
Resource
win10v2004-20241007-en
General
-
Target
064a924ed928e1e100d725db8178813d3160cda37eeea12d2a66c7183f0db521.exe
-
Size
689KB
-
MD5
caca1115569c87cc1a0147ed2ee40c2b
-
SHA1
a0d74a73df1a4ebf4c4bcd182caa9a6e7d984b2c
-
SHA256
064a924ed928e1e100d725db8178813d3160cda37eeea12d2a66c7183f0db521
-
SHA512
db4cd9f5953753874fb01082e16b97053c4b68f5be89c68db7fbc2c5ab922c5ba9ee4aee31ce4c1bfae92024e0a7105694631807b179e793a499b62bd0be56bc
-
SSDEEP
12288:5MrGy90T/gw5InTgEEslHOsPmgiq5l8p0TMlgRkZwgFg8c:/yUx5IBNugiqQp0TEHZwj8c
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4812-19-0x0000000002620000-0x000000000263A000-memory.dmp healer behavioral1/memory/4812-21-0x00000000026E0000-0x00000000026F8000-memory.dmp healer behavioral1/memory/4812-31-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/4812-49-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/4812-47-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/4812-45-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/4812-43-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/4812-41-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/4812-39-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/4812-37-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/4812-35-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/4812-33-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/4812-29-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/4812-27-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/4812-25-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/4812-23-0x00000000026E0000-0x00000000026F2000-memory.dmp healer behavioral1/memory/4812-22-0x00000000026E0000-0x00000000026F2000-memory.dmp healer -
Healer family
-
Processes:
pro1036.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1036.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1036.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4936-61-0x0000000002A10000-0x0000000002A56000-memory.dmp family_redline behavioral1/memory/4936-62-0x0000000004E20000-0x0000000004E64000-memory.dmp family_redline behavioral1/memory/4936-68-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-72-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-96-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-94-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-92-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-90-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-88-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-86-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-84-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-80-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-78-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-77-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-74-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-71-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-66-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-82-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-64-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/4936-63-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un497528.exepro1036.exequ8994.exepid process 4520 un497528.exe 4812 pro1036.exe 4936 qu8994.exe -
Processes:
pro1036.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1036.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1036.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
064a924ed928e1e100d725db8178813d3160cda37eeea12d2a66c7183f0db521.exeun497528.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 064a924ed928e1e100d725db8178813d3160cda37eeea12d2a66c7183f0db521.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un497528.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2360 4812 WerFault.exe pro1036.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un497528.exepro1036.exequ8994.exe064a924ed928e1e100d725db8178813d3160cda37eeea12d2a66c7183f0db521.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un497528.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1036.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8994.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 064a924ed928e1e100d725db8178813d3160cda37eeea12d2a66c7183f0db521.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1036.exepid process 4812 pro1036.exe 4812 pro1036.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1036.exequ8994.exedescription pid process Token: SeDebugPrivilege 4812 pro1036.exe Token: SeDebugPrivilege 4936 qu8994.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
064a924ed928e1e100d725db8178813d3160cda37eeea12d2a66c7183f0db521.exeun497528.exedescription pid process target process PID 1932 wrote to memory of 4520 1932 064a924ed928e1e100d725db8178813d3160cda37eeea12d2a66c7183f0db521.exe un497528.exe PID 1932 wrote to memory of 4520 1932 064a924ed928e1e100d725db8178813d3160cda37eeea12d2a66c7183f0db521.exe un497528.exe PID 1932 wrote to memory of 4520 1932 064a924ed928e1e100d725db8178813d3160cda37eeea12d2a66c7183f0db521.exe un497528.exe PID 4520 wrote to memory of 4812 4520 un497528.exe pro1036.exe PID 4520 wrote to memory of 4812 4520 un497528.exe pro1036.exe PID 4520 wrote to memory of 4812 4520 un497528.exe pro1036.exe PID 4520 wrote to memory of 4936 4520 un497528.exe qu8994.exe PID 4520 wrote to memory of 4936 4520 un497528.exe qu8994.exe PID 4520 wrote to memory of 4936 4520 un497528.exe qu8994.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\064a924ed928e1e100d725db8178813d3160cda37eeea12d2a66c7183f0db521.exe"C:\Users\Admin\AppData\Local\Temp\064a924ed928e1e100d725db8178813d3160cda37eeea12d2a66c7183f0db521.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un497528.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un497528.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1036.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1036.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 10804⤵
- Program crash
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8994.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8994.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4812 -ip 48121⤵PID:2912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
535KB
MD583a686d8299af864e183b8346568f8c0
SHA1365683a48778136c20fbe6a01912fc806c2f36f7
SHA256cf36cb0b38b6aba43cb2a84ff802d268d953f22ecd169a794767a3aa1cf36cc2
SHA5124ef2e94fd044889783b9f3edddf9c8a52e7f25442bd06563aaab2c0fbfd9753ac4b633c8db3c3799c7d968edcac2bbc59840e8bc676779865e0b12b25f8c2467
-
Filesize
312KB
MD5ac38489b1738b641fd1311d37b4e6e0d
SHA143e048ea4650741f00e7fba2e3762343b68fc469
SHA256ad18a66f4ab451146c09754f5ddbc2a8b8ba9b3aa2685f13f0122a201b3a7a5e
SHA51255121edfa4708a819ef971a0e61def9c020049acbd39bcf353a460604fdaf7951a9434733c64fd733447de7ca039e4455762159fc5b26350a9b8e5379cc881da
-
Filesize
370KB
MD5c0124532e859893dcfed60bc6733a3ae
SHA18934b7a920352d82ac99f42936b284f4145a5edb
SHA2561132fb6aecd483c717458dfda0119cbb551d8adb48459f1f5e17b614d42186a9
SHA512afc8b9ddadf0427bb7150bcc34cfafc6adff485e0f21e3a7beba1948c464ec3e5fa9d62d5aedf2328ac58ab04aa98ebdf6179c72c4a3501087e76e70ad36a8ac