Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 05:23
Static task
static1
Behavioral task
behavioral1
Sample
a45f31707108571e9648c8732aeabe80a09fc0de7924d117795e0e30c4455878.exe
Resource
win10v2004-20241007-en
General
-
Target
a45f31707108571e9648c8732aeabe80a09fc0de7924d117795e0e30c4455878.exe
-
Size
660KB
-
MD5
1ab429656f1e848376fde3f493c2b114
-
SHA1
7081b7c169c35017d9126c9993533a6ba6981301
-
SHA256
a45f31707108571e9648c8732aeabe80a09fc0de7924d117795e0e30c4455878
-
SHA512
fff9c7fe3f465fd04314d340fe4c4d7bdc37fbe3c884f4d2ab729cf5b3ef5d29d4a5f8d3912b53ab9bdf327bf5c275411d97241dc05720cbd36d7609a47c57b2
-
SSDEEP
12288:PMrVy900kd67oOFGxfnInWiPZ5oTZpb8h0WsOrLi0iYaWPMcwa68nZB:OyMU7RMxnIn5PZEPAhPsO60iY53wa68P
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3012-19-0x00000000023A0000-0x00000000023BA000-memory.dmp healer behavioral1/memory/3012-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/3012-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3012-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3012-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3012-43-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3012-41-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3012-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3012-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3012-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3012-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3012-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3012-31-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3012-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3012-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3012-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3012-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
Processes:
pro4683.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4683.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2072-61-0x0000000002470000-0x00000000024B6000-memory.dmp family_redline behavioral1/memory/2072-62-0x0000000002740000-0x0000000002784000-memory.dmp family_redline behavioral1/memory/2072-66-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-74-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-96-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-94-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-92-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-90-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-88-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-86-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-82-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-80-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-78-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-76-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-72-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-70-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-68-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-84-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-64-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/2072-63-0x0000000002740000-0x000000000277F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un238675.exepro4683.exequ6956.exepid process 2144 un238675.exe 3012 pro4683.exe 2072 qu6956.exe -
Processes:
pro4683.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4683.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un238675.exea45f31707108571e9648c8732aeabe80a09fc0de7924d117795e0e30c4455878.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un238675.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a45f31707108571e9648c8732aeabe80a09fc0de7924d117795e0e30c4455878.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4712 3012 WerFault.exe pro4683.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro4683.exequ6956.exea45f31707108571e9648c8732aeabe80a09fc0de7924d117795e0e30c4455878.exeun238675.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4683.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6956.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a45f31707108571e9648c8732aeabe80a09fc0de7924d117795e0e30c4455878.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un238675.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4683.exepid process 3012 pro4683.exe 3012 pro4683.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4683.exequ6956.exedescription pid process Token: SeDebugPrivilege 3012 pro4683.exe Token: SeDebugPrivilege 2072 qu6956.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a45f31707108571e9648c8732aeabe80a09fc0de7924d117795e0e30c4455878.exeun238675.exedescription pid process target process PID 552 wrote to memory of 2144 552 a45f31707108571e9648c8732aeabe80a09fc0de7924d117795e0e30c4455878.exe un238675.exe PID 552 wrote to memory of 2144 552 a45f31707108571e9648c8732aeabe80a09fc0de7924d117795e0e30c4455878.exe un238675.exe PID 552 wrote to memory of 2144 552 a45f31707108571e9648c8732aeabe80a09fc0de7924d117795e0e30c4455878.exe un238675.exe PID 2144 wrote to memory of 3012 2144 un238675.exe pro4683.exe PID 2144 wrote to memory of 3012 2144 un238675.exe pro4683.exe PID 2144 wrote to memory of 3012 2144 un238675.exe pro4683.exe PID 2144 wrote to memory of 2072 2144 un238675.exe qu6956.exe PID 2144 wrote to memory of 2072 2144 un238675.exe qu6956.exe PID 2144 wrote to memory of 2072 2144 un238675.exe qu6956.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a45f31707108571e9648c8732aeabe80a09fc0de7924d117795e0e30c4455878.exe"C:\Users\Admin\AppData\Local\Temp\a45f31707108571e9648c8732aeabe80a09fc0de7924d117795e0e30c4455878.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un238675.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un238675.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4683.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4683.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 10844⤵
- Program crash
PID:4712
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6956.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6956.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3012 -ip 30121⤵PID:992
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD548001f26ef2e64f27a8e6eb3a260f085
SHA1482977ead69269538e18e8aab93ff4241e635779
SHA25660f0e8f4c784308d89d618b5d4e9b36f61f57059ab8816b7c4f5648b9d1a7eb2
SHA51243d315a18274310ec6fc5e60e6b0125c1e8202e22e32ff913770a5919fb7cf321581b10b56d28364b69c27eab6072898da5a1a78b48241c0bcdc7bdb1efc8f14
-
Filesize
236KB
MD5a11d6cfcc1b48a4859553620f6078af8
SHA1c9993d009e451954c543cc433e299d3495ae57e1
SHA256c8708c18cd87051113d7ead9fd49bc93e20487728a9dbec6d09902506f50351a
SHA512dce48014a970afda815a30c388a5742dd695455bb4f66efff8154359165871ee5236befbc5cf35b350fb0c7be5a8674b00afb334f99943488bcf9e4acb17b2af
-
Filesize
295KB
MD5ae11c199a451ff6d6b9c25d33abfa261
SHA123fdcd01e18959f7fc0a59a248ff6a9c5b33cf01
SHA256c77be14e51e9372f7db0a70434f1804039d5339cf86114572265f0fb7c4ae5ac
SHA512c1c8276a0ac0dd0327417806cb0305cb6f9cc159125237dad99243ea06877aa6b9b739e1ae000df580ef2431871a6df181049d3095b212f0326ea40a78c4265b