Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 06:50
Static task
static1
Behavioral task
behavioral1
Sample
eb9f7931f77870703fdf61df3846add896293d5b6af9ffcfbc95ab2ea4c62824.exe
Resource
win10v2004-20241007-en
General
-
Target
eb9f7931f77870703fdf61df3846add896293d5b6af9ffcfbc95ab2ea4c62824.exe
-
Size
659KB
-
MD5
b84b4e324e50e6a3402a6d855e6694b5
-
SHA1
fc78a012d6be5db166f0fa55bb795e8ff52fe348
-
SHA256
eb9f7931f77870703fdf61df3846add896293d5b6af9ffcfbc95ab2ea4c62824
-
SHA512
d3aa9552db51e593e463f3de6bec8d5ca28f64adf2ce8b50b126ddb12ccd4ff5021f99cbefff9cb85a935dee670920a9f0d8f8cb596c26832d403b23bf56996d
-
SSDEEP
12288:gMr2y903/MYphXe5tyEqCwI25RXhYKjaQoqBiyyIa:Gyn6hO5XWI2rn2QDha
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1952-18-0x0000000004960000-0x000000000497A000-memory.dmp healer behavioral1/memory/1952-20-0x00000000049B0000-0x00000000049C8000-memory.dmp healer behavioral1/memory/1952-30-0x00000000049B0000-0x00000000049C2000-memory.dmp healer behavioral1/memory/1952-48-0x00000000049B0000-0x00000000049C2000-memory.dmp healer behavioral1/memory/1952-46-0x00000000049B0000-0x00000000049C2000-memory.dmp healer behavioral1/memory/1952-44-0x00000000049B0000-0x00000000049C2000-memory.dmp healer behavioral1/memory/1952-42-0x00000000049B0000-0x00000000049C2000-memory.dmp healer behavioral1/memory/1952-40-0x00000000049B0000-0x00000000049C2000-memory.dmp healer behavioral1/memory/1952-38-0x00000000049B0000-0x00000000049C2000-memory.dmp healer behavioral1/memory/1952-36-0x00000000049B0000-0x00000000049C2000-memory.dmp healer behavioral1/memory/1952-34-0x00000000049B0000-0x00000000049C2000-memory.dmp healer behavioral1/memory/1952-32-0x00000000049B0000-0x00000000049C2000-memory.dmp healer behavioral1/memory/1952-28-0x00000000049B0000-0x00000000049C2000-memory.dmp healer behavioral1/memory/1952-26-0x00000000049B0000-0x00000000049C2000-memory.dmp healer behavioral1/memory/1952-24-0x00000000049B0000-0x00000000049C2000-memory.dmp healer behavioral1/memory/1952-22-0x00000000049B0000-0x00000000049C2000-memory.dmp healer behavioral1/memory/1952-21-0x00000000049B0000-0x00000000049C2000-memory.dmp healer -
Healer family
-
Processes:
pro1992.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1992.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1992.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4620-60-0x0000000004AD0000-0x0000000004B16000-memory.dmp family_redline behavioral1/memory/4620-61-0x0000000007210000-0x0000000007254000-memory.dmp family_redline behavioral1/memory/4620-71-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-69-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-67-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-65-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-63-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-62-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-77-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-95-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-93-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-91-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-89-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-85-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-83-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-81-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-80-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-75-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-74-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4620-87-0x0000000007210000-0x000000000724F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un005528.exepro1992.exequ5430.exepid process 2316 un005528.exe 1952 pro1992.exe 4620 qu5430.exe -
Processes:
pro1992.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1992.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1992.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
eb9f7931f77870703fdf61df3846add896293d5b6af9ffcfbc95ab2ea4c62824.exeun005528.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eb9f7931f77870703fdf61df3846add896293d5b6af9ffcfbc95ab2ea4c62824.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un005528.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4896 1952 WerFault.exe pro1992.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
eb9f7931f77870703fdf61df3846add896293d5b6af9ffcfbc95ab2ea4c62824.exeun005528.exepro1992.exequ5430.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb9f7931f77870703fdf61df3846add896293d5b6af9ffcfbc95ab2ea4c62824.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un005528.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1992.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5430.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1992.exepid process 1952 pro1992.exe 1952 pro1992.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1992.exequ5430.exedescription pid process Token: SeDebugPrivilege 1952 pro1992.exe Token: SeDebugPrivilege 4620 qu5430.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
eb9f7931f77870703fdf61df3846add896293d5b6af9ffcfbc95ab2ea4c62824.exeun005528.exedescription pid process target process PID 2292 wrote to memory of 2316 2292 eb9f7931f77870703fdf61df3846add896293d5b6af9ffcfbc95ab2ea4c62824.exe un005528.exe PID 2292 wrote to memory of 2316 2292 eb9f7931f77870703fdf61df3846add896293d5b6af9ffcfbc95ab2ea4c62824.exe un005528.exe PID 2292 wrote to memory of 2316 2292 eb9f7931f77870703fdf61df3846add896293d5b6af9ffcfbc95ab2ea4c62824.exe un005528.exe PID 2316 wrote to memory of 1952 2316 un005528.exe pro1992.exe PID 2316 wrote to memory of 1952 2316 un005528.exe pro1992.exe PID 2316 wrote to memory of 1952 2316 un005528.exe pro1992.exe PID 2316 wrote to memory of 4620 2316 un005528.exe qu5430.exe PID 2316 wrote to memory of 4620 2316 un005528.exe qu5430.exe PID 2316 wrote to memory of 4620 2316 un005528.exe qu5430.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb9f7931f77870703fdf61df3846add896293d5b6af9ffcfbc95ab2ea4c62824.exe"C:\Users\Admin\AppData\Local\Temp\eb9f7931f77870703fdf61df3846add896293d5b6af9ffcfbc95ab2ea4c62824.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005528.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005528.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1992.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1992.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 10884⤵
- Program crash
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5430.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5430.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1952 -ip 19521⤵PID:2504
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5ec0194ed0cc0de67b9fcd71dadba9d75
SHA1307a7ad2479841f298cbcfc5aaa859bd1bd52838
SHA25654279b0e570416fa43c555914c7fa70987f772b6b466d0f1b307a93e30daecd2
SHA512d488a2a33d73aed6954d270a193c222bde30c5daec21ae1230bd1d93607cc58bfe18853aacdf16a613395f5db104643f39668956d2a135ec238f38585553a342
-
Filesize
295KB
MD549e127035d92ac4476b3bbe5a23ef950
SHA127e008118e2c36ad159ce75da33c4d31020d86a7
SHA2564bb301c1296d3dc7b198c0d524503cfec68f4e3b269026f8195087f317cfc3e7
SHA512da337895f93f5895ec1abcb6c8acd2c073d2fe14a78911dcea0e2ccf93850a14572b48c163ffc88bc6605b9a4efec17031bc594e5499f25a7eb1c7dc9806c566
-
Filesize
354KB
MD5d12b5c30a7b38b62a4ee2c42c22789ab
SHA1d910359f81d45756e5ed6799ee7da66fad834d03
SHA2564436fa91461afeb23f2a35bb6d8819594be4fdc2addf7337fe861b0bd5be5152
SHA512457f5c05a4d1a6170b0de2761b1667746b55daf075f77855b161f139665b56b079297ab5639f7669ec55c805a3ae751026b914114736f578c0db0ccba78752b1