Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 09:17
Static task
static1
Behavioral task
behavioral1
Sample
84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exe
Resource
win10v2004-20241007-en
General
-
Target
84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exe
-
Size
673KB
-
MD5
20c84a2d204e9c02bf5b28ff19b6bda1
-
SHA1
ca955a870caa72f5288496328264bd143deb1ae1
-
SHA256
84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a
-
SHA512
716e89e11b7f938780b14939930fcd0403113ccc2d0352569c02ac2f6bcb58cf0e9e0f747ab5b53768183a2ceba165e101acf42336f3bf84780299c8e29d2867
-
SSDEEP
12288:CMrUy90EMSFA5UyGRzDlcQE2+evLm3DXooNiVbuW7ssGQr2:SyZMS62zDaN2Xa3DxNi5uEMj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2144-19-0x00000000023B0000-0x00000000023CA000-memory.dmp healer behavioral1/memory/2144-21-0x0000000002500000-0x0000000002518000-memory.dmp healer behavioral1/memory/2144-47-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2144-46-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2144-43-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2144-41-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2144-39-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2144-49-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2144-37-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2144-35-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2144-33-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2144-31-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2144-29-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2144-27-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2144-25-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2144-23-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2144-22-0x0000000002500000-0x0000000002512000-memory.dmp healer -
Healer family
-
Processes:
pro1446.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1446.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1446.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1052-60-0x0000000002570000-0x00000000025B6000-memory.dmp family_redline behavioral1/memory/1052-61-0x0000000002740000-0x0000000002784000-memory.dmp family_redline behavioral1/memory/1052-77-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-85-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-83-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-95-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-93-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-91-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-87-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-81-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-79-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-75-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-73-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-71-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-69-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-89-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-67-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-65-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-63-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/1052-62-0x0000000002740000-0x000000000277F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un282582.exepro1446.exequ3423.exepid process 4876 un282582.exe 2144 pro1446.exe 1052 qu3423.exe -
Processes:
pro1446.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1446.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exeun282582.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un282582.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3592 2144 WerFault.exe pro1446.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu3423.exe84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exeun282582.exepro1446.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3423.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un282582.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1446.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1446.exepid process 2144 pro1446.exe 2144 pro1446.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1446.exequ3423.exedescription pid process Token: SeDebugPrivilege 2144 pro1446.exe Token: SeDebugPrivilege 1052 qu3423.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exeun282582.exedescription pid process target process PID 2956 wrote to memory of 4876 2956 84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exe un282582.exe PID 2956 wrote to memory of 4876 2956 84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exe un282582.exe PID 2956 wrote to memory of 4876 2956 84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exe un282582.exe PID 4876 wrote to memory of 2144 4876 un282582.exe pro1446.exe PID 4876 wrote to memory of 2144 4876 un282582.exe pro1446.exe PID 4876 wrote to memory of 2144 4876 un282582.exe pro1446.exe PID 4876 wrote to memory of 1052 4876 un282582.exe qu3423.exe PID 4876 wrote to memory of 1052 4876 un282582.exe qu3423.exe PID 4876 wrote to memory of 1052 4876 un282582.exe qu3423.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exe"C:\Users\Admin\AppData\Local\Temp\84791e0ddbf366865c79ac83e1a543105eee0783482c0734e06119756113936a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un282582.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un282582.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1446.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1446.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 11084⤵
- Program crash
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3423.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3423.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2144 -ip 21441⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD5772ea787d1957a9feb0e75d5a80b965c
SHA1c43cf1457552d547a60f90339228b89ff2bedff3
SHA25654b2c138872298673e841ca89857f7fc0029fce2c6b30df1b8d48af3ae3777a3
SHA51221c146ad9936698c7468ffc40a54a7779af454328fb8386b829dd91be07d5d8bd30e07c37d0aedd5fd25c422fd9e929bcda374e7f845e78454b3517d6a5f285a
-
Filesize
260KB
MD5140b82d5e43afc7e28b2e9330f1b70e1
SHA1d4527e94667f276216bee385d2ecc711ee6b0713
SHA256739d959edf5bfd72c73f1204d3feb3df36bee3fbedf074932ebc055117b5cdf0
SHA512b9f08138e4e29ae79cf51702b2bc66bbf22fbb2b90592077e3d0ccc4db55f63970bef24f8fede610b3c722efdeab5aeadb8b938d7fa0f857e3e3b2d164cc15aa
-
Filesize
319KB
MD5db1a6f303f33be70a8878700c6d42381
SHA13c5aa7bb9a61f78e945959781781b663e9ee4f9e
SHA256cb5f33d1e4b20973a3a75133e32525b297a506f315c072323724958e3c36d80b
SHA512786ef287206d8bab1cee7da002881cf9b4abe4a7c53bed808a5896202b90c1f390c72641bb2c40266a9b09f5d1cc18f11c8d3155ac88743b5ec2699e88826756