Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
987bfa91debeffab59fcef7f9f0d0427a1f3b6a5a97e6c38065882c9f11ca270.exe
Resource
win10v2004-20241007-en
General
-
Target
987bfa91debeffab59fcef7f9f0d0427a1f3b6a5a97e6c38065882c9f11ca270.exe
-
Size
673KB
-
MD5
d90836f382bf5b6736a478e6cbcafbce
-
SHA1
f4c18d96429f8abeddb2c4ba2bcb35f2831505e6
-
SHA256
987bfa91debeffab59fcef7f9f0d0427a1f3b6a5a97e6c38065882c9f11ca270
-
SHA512
865752c2e46f5715bcc00f53cc12c45bbc5fdabd2a5053e2e672225bc883e9eac22fd870bc75c3aa819137fececab48778600af1d35c5fb935be9bf2b340f063
-
SSDEEP
12288:BMrwy90OF7TshxBThjkh8HW4fVBzM6zGtX98EV1GW/0bvjF:dyJ7w/jXHLVBw6atl3p/2F
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4072-19-0x0000000002280000-0x000000000229A000-memory.dmp healer behavioral1/memory/4072-21-0x0000000005030000-0x0000000005048000-memory.dmp healer behavioral1/memory/4072-45-0x0000000005030000-0x0000000005042000-memory.dmp healer behavioral1/memory/4072-49-0x0000000005030000-0x0000000005042000-memory.dmp healer behavioral1/memory/4072-47-0x0000000005030000-0x0000000005042000-memory.dmp healer behavioral1/memory/4072-43-0x0000000005030000-0x0000000005042000-memory.dmp healer behavioral1/memory/4072-41-0x0000000005030000-0x0000000005042000-memory.dmp healer behavioral1/memory/4072-39-0x0000000005030000-0x0000000005042000-memory.dmp healer behavioral1/memory/4072-37-0x0000000005030000-0x0000000005042000-memory.dmp healer behavioral1/memory/4072-36-0x0000000005030000-0x0000000005042000-memory.dmp healer behavioral1/memory/4072-33-0x0000000005030000-0x0000000005042000-memory.dmp healer behavioral1/memory/4072-31-0x0000000005030000-0x0000000005042000-memory.dmp healer behavioral1/memory/4072-29-0x0000000005030000-0x0000000005042000-memory.dmp healer behavioral1/memory/4072-27-0x0000000005030000-0x0000000005042000-memory.dmp healer behavioral1/memory/4072-25-0x0000000005030000-0x0000000005042000-memory.dmp healer behavioral1/memory/4072-23-0x0000000005030000-0x0000000005042000-memory.dmp healer behavioral1/memory/4072-22-0x0000000005030000-0x0000000005042000-memory.dmp healer -
Healer family
-
Processes:
pro0478.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0478.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0478.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0478.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0478.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0478.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0478.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1392-61-0x00000000023E0000-0x0000000002426000-memory.dmp family_redline behavioral1/memory/1392-62-0x0000000004AC0000-0x0000000004B04000-memory.dmp family_redline behavioral1/memory/1392-74-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-78-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-96-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-92-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-90-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-88-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-86-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-84-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-82-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-80-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-76-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-72-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-94-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-70-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-68-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-66-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-64-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/1392-63-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un826656.exepro0478.exequ3304.exepid process 2572 un826656.exe 4072 pro0478.exe 1392 qu3304.exe -
Processes:
pro0478.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0478.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0478.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
987bfa91debeffab59fcef7f9f0d0427a1f3b6a5a97e6c38065882c9f11ca270.exeun826656.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 987bfa91debeffab59fcef7f9f0d0427a1f3b6a5a97e6c38065882c9f11ca270.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un826656.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4588 4072 WerFault.exe pro0478.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
987bfa91debeffab59fcef7f9f0d0427a1f3b6a5a97e6c38065882c9f11ca270.exeun826656.exepro0478.exequ3304.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 987bfa91debeffab59fcef7f9f0d0427a1f3b6a5a97e6c38065882c9f11ca270.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un826656.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0478.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3304.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0478.exepid process 4072 pro0478.exe 4072 pro0478.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0478.exequ3304.exedescription pid process Token: SeDebugPrivilege 4072 pro0478.exe Token: SeDebugPrivilege 1392 qu3304.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
987bfa91debeffab59fcef7f9f0d0427a1f3b6a5a97e6c38065882c9f11ca270.exeun826656.exedescription pid process target process PID 4492 wrote to memory of 2572 4492 987bfa91debeffab59fcef7f9f0d0427a1f3b6a5a97e6c38065882c9f11ca270.exe un826656.exe PID 4492 wrote to memory of 2572 4492 987bfa91debeffab59fcef7f9f0d0427a1f3b6a5a97e6c38065882c9f11ca270.exe un826656.exe PID 4492 wrote to memory of 2572 4492 987bfa91debeffab59fcef7f9f0d0427a1f3b6a5a97e6c38065882c9f11ca270.exe un826656.exe PID 2572 wrote to memory of 4072 2572 un826656.exe pro0478.exe PID 2572 wrote to memory of 4072 2572 un826656.exe pro0478.exe PID 2572 wrote to memory of 4072 2572 un826656.exe pro0478.exe PID 2572 wrote to memory of 1392 2572 un826656.exe qu3304.exe PID 2572 wrote to memory of 1392 2572 un826656.exe qu3304.exe PID 2572 wrote to memory of 1392 2572 un826656.exe qu3304.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\987bfa91debeffab59fcef7f9f0d0427a1f3b6a5a97e6c38065882c9f11ca270.exe"C:\Users\Admin\AppData\Local\Temp\987bfa91debeffab59fcef7f9f0d0427a1f3b6a5a97e6c38065882c9f11ca270.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un826656.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un826656.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0478.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0478.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 10164⤵
- Program crash
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3304.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3304.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4072 -ip 40721⤵PID:4340
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5f5ede871edb7a983487ad2d207c0644a
SHA10841c211a5e927dad97880085fe17c700567dbf1
SHA256c173c91d0e5245e2b35ef83c94a1644a4fd2b27e550ee40f655e8fb1d9a46c96
SHA512a7168a2be7e372ecd569b15b5f53b166a44666734506b1da574f6213e6db61549d83f366c76eb6b12ece8ce16eb0eb7c1f942261f3667d7941b40c33d5733ffb
-
Filesize
253KB
MD56ef1f9d35c8bbc29a14d96c80cb5a0e5
SHA1b0e768e4003431edb7f6f334e0aa36fd9f601695
SHA256e859d86a5aae2566080631f3ade5c02821785b8ef95fc6ad998d035a2d7fd9b2
SHA512c78dbeb00a13daf68d54b75ccbc0af5e7065b5ac9158087da15342924d975a0661c720b0be3053674fe28e426763a68790ff6784a76382b2d6ea66836ec4d07b
-
Filesize
311KB
MD51b62d82b5dfc46fccea60ee766024d72
SHA1b93af79b55d6b123539459dbf970784a8e62e83f
SHA256dd8f46666ba8aed888980a561ff9de24231ba0afb43fe5279ee32b88015e52da
SHA512d2c754f2bdce542b5179856b923600ca5e46eb8200952a06a2a6f7e9f7adedaa76a55a523d35643c807c8b24bf850b4755aa67bd7ec9f5b60c4a37c6f969dea1