Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
5b318c66f8110bcedc3d04fcdc85b94b2ccd1a8a60637297719bdeb35ab3acbb.exe
Resource
win10v2004-20241007-en
General
-
Target
5b318c66f8110bcedc3d04fcdc85b94b2ccd1a8a60637297719bdeb35ab3acbb.exe
-
Size
674KB
-
MD5
1f3cce13112c9bfa16f36599a8846610
-
SHA1
d379bb4f931fc89c6fcaecdcb60589ff51a24315
-
SHA256
5b318c66f8110bcedc3d04fcdc85b94b2ccd1a8a60637297719bdeb35ab3acbb
-
SHA512
a6340ff212b46a0b33f4483847938bf89dbd40f520cfa6b7410f303e5ee7262059d96b5acc24bb189910f797ccafd667206240ed524379b38d8404e2de2c576e
-
SSDEEP
12288:BMrSy908Pqx+C006Amm9Gd70DrUybuW6JvJAal:fyT4+C006AmmQdMrUauV7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1816-19-0x00000000022A0000-0x00000000022BA000-memory.dmp healer behavioral1/memory/1816-21-0x0000000002440000-0x0000000002458000-memory.dmp healer behavioral1/memory/1816-27-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1816-45-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1816-47-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1816-43-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1816-41-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1816-39-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1816-37-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1816-25-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1816-35-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1816-33-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1816-31-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1816-29-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1816-49-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1816-23-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1816-22-0x0000000002440000-0x0000000002452000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8130.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8130.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4516-60-0x0000000002550000-0x0000000002596000-memory.dmp family_redline behavioral1/memory/4516-61-0x0000000004AE0000-0x0000000004B24000-memory.dmp family_redline behavioral1/memory/4516-65-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-69-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-95-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-93-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-89-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-87-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-85-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-83-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-81-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-77-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-75-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-73-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-71-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-67-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-91-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-79-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-63-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4516-62-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4136 un837917.exe 1816 pro8130.exe 4516 qu5479.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8130.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8130.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5b318c66f8110bcedc3d04fcdc85b94b2ccd1a8a60637297719bdeb35ab3acbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un837917.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1660 1816 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un837917.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8130.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5479.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b318c66f8110bcedc3d04fcdc85b94b2ccd1a8a60637297719bdeb35ab3acbb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1816 pro8130.exe 1816 pro8130.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1816 pro8130.exe Token: SeDebugPrivilege 4516 qu5479.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4136 5040 5b318c66f8110bcedc3d04fcdc85b94b2ccd1a8a60637297719bdeb35ab3acbb.exe 84 PID 5040 wrote to memory of 4136 5040 5b318c66f8110bcedc3d04fcdc85b94b2ccd1a8a60637297719bdeb35ab3acbb.exe 84 PID 5040 wrote to memory of 4136 5040 5b318c66f8110bcedc3d04fcdc85b94b2ccd1a8a60637297719bdeb35ab3acbb.exe 84 PID 4136 wrote to memory of 1816 4136 un837917.exe 85 PID 4136 wrote to memory of 1816 4136 un837917.exe 85 PID 4136 wrote to memory of 1816 4136 un837917.exe 85 PID 4136 wrote to memory of 4516 4136 un837917.exe 97 PID 4136 wrote to memory of 4516 4136 un837917.exe 97 PID 4136 wrote to memory of 4516 4136 un837917.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b318c66f8110bcedc3d04fcdc85b94b2ccd1a8a60637297719bdeb35ab3acbb.exe"C:\Users\Admin\AppData\Local\Temp\5b318c66f8110bcedc3d04fcdc85b94b2ccd1a8a60637297719bdeb35ab3acbb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un837917.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un837917.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8130.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8130.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 10044⤵
- Program crash
PID:1660
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5479.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5479.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1816 -ip 18161⤵PID:2860
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD50784d8283b6687fc37644fd4cdb9f9a6
SHA147614d80b61e4ddd8f323ac94fac5d5c9d71f6c9
SHA256310e13ceaaf29afd27ab90692590d78e5859dea52a3f8482aaba3f9d453c4cca
SHA512983c7b9a6462d59879aea6c08b678009d22f40445bd1770aaa23cbe4367822f45fc4c83033bb107b27457bd819313ba621b8525f1b7d9db3a97b596dd5bc7220
-
Filesize
260KB
MD593c166f31171ffbe36cd86bac1013c67
SHA1f14460d02dd6f52ddd394c6f3803150b886be651
SHA256681451864b9bc3407916afdc737ba77e61086292b245915e56668b446559afea
SHA512f174575270f7cb07773f40dbee1ca5a35d54c2afcb8e6196033a89af71a5ac91aeca2c0c7849e0178194a09318a451c3d408497119d98f70e7617fd96fb376de
-
Filesize
319KB
MD537f06dadc0342956b33c7a115ddeebec
SHA10c865cf87cf33c00b90ca785883c63c9bf2ecbed
SHA256d0a968254daead5bea0761a40865d6ac1f8341e48f766639cc51e4db3428670f
SHA5124ea63882ffcd09b82fdea47f0897378ab5c9e7a8cccb471202768dab0d3595ea8608ae981058e09f07ea700b3b665a6b8890c53b05ac1877ccd28e061f2a5ec3