Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 08:55
Static task
static1
Behavioral task
behavioral1
Sample
d1489cd8d816756dfb192babc9debffa8d81208df83500d4e962b8419c07bdb7.exe
Resource
win10v2004-20241007-en
General
-
Target
d1489cd8d816756dfb192babc9debffa8d81208df83500d4e962b8419c07bdb7.exe
-
Size
659KB
-
MD5
7c52f0041ab2f87b43c4e263e4fd89e3
-
SHA1
a68813a8f7f40e75e0757234e01ecda65da4f9af
-
SHA256
d1489cd8d816756dfb192babc9debffa8d81208df83500d4e962b8419c07bdb7
-
SHA512
0d6f761099cb6cfcd4ba74523ffdc60327715bdc01fc7d717c2e366417e7a1266703f4a578b33651a69431184854c0d1a5f7f7ca9a97c34e12a35f9bc41e8207
-
SSDEEP
12288:4MrOy90e0CHa+LpdTkmDlotDrxeE7BGyjU17of5KVa//mVzEbaJ4A/E4:my0MndAlBQyjU1QAymVAbaJ434
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1652-19-0x00000000009A0000-0x00000000009BA000-memory.dmp healer behavioral1/memory/1652-21-0x00000000024F0000-0x0000000002508000-memory.dmp healer behavioral1/memory/1652-22-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1652-49-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1652-48-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1652-45-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1652-43-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1652-41-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1652-39-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1652-37-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1652-35-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1652-23-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1652-33-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1652-31-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1652-29-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1652-27-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1652-25-0x00000000024F0000-0x0000000002502000-memory.dmp healer -
Healer family
-
Processes:
pro1090.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1090.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1090.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1090.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1090.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1090.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1090.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/508-61-0x0000000002670000-0x00000000026B6000-memory.dmp family_redline behavioral1/memory/508-62-0x0000000004B90000-0x0000000004BD4000-memory.dmp family_redline behavioral1/memory/508-68-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-72-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-70-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-86-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-76-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-66-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-64-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-63-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-96-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-94-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-92-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-90-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-88-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-84-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-82-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-80-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-79-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline behavioral1/memory/508-74-0x0000000004B90000-0x0000000004BCF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un690051.exepro1090.exequ5491.exepid process 3956 un690051.exe 1652 pro1090.exe 508 qu5491.exe -
Processes:
pro1090.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1090.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1090.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d1489cd8d816756dfb192babc9debffa8d81208df83500d4e962b8419c07bdb7.exeun690051.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d1489cd8d816756dfb192babc9debffa8d81208df83500d4e962b8419c07bdb7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un690051.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 908 1652 WerFault.exe pro1090.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d1489cd8d816756dfb192babc9debffa8d81208df83500d4e962b8419c07bdb7.exeun690051.exepro1090.exequ5491.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1489cd8d816756dfb192babc9debffa8d81208df83500d4e962b8419c07bdb7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un690051.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1090.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5491.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1090.exepid process 1652 pro1090.exe 1652 pro1090.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1090.exequ5491.exedescription pid process Token: SeDebugPrivilege 1652 pro1090.exe Token: SeDebugPrivilege 508 qu5491.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
d1489cd8d816756dfb192babc9debffa8d81208df83500d4e962b8419c07bdb7.exeun690051.exedescription pid process target process PID 2240 wrote to memory of 3956 2240 d1489cd8d816756dfb192babc9debffa8d81208df83500d4e962b8419c07bdb7.exe un690051.exe PID 2240 wrote to memory of 3956 2240 d1489cd8d816756dfb192babc9debffa8d81208df83500d4e962b8419c07bdb7.exe un690051.exe PID 2240 wrote to memory of 3956 2240 d1489cd8d816756dfb192babc9debffa8d81208df83500d4e962b8419c07bdb7.exe un690051.exe PID 3956 wrote to memory of 1652 3956 un690051.exe pro1090.exe PID 3956 wrote to memory of 1652 3956 un690051.exe pro1090.exe PID 3956 wrote to memory of 1652 3956 un690051.exe pro1090.exe PID 3956 wrote to memory of 508 3956 un690051.exe qu5491.exe PID 3956 wrote to memory of 508 3956 un690051.exe qu5491.exe PID 3956 wrote to memory of 508 3956 un690051.exe qu5491.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1489cd8d816756dfb192babc9debffa8d81208df83500d4e962b8419c07bdb7.exe"C:\Users\Admin\AppData\Local\Temp\d1489cd8d816756dfb192babc9debffa8d81208df83500d4e962b8419c07bdb7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un690051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un690051.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1090.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1090.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 10884⤵
- Program crash
PID:908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5491.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5491.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1652 -ip 16521⤵PID:4724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD5e66b2ae4062a0787e1af171a2638ef06
SHA112e54a0541e09879f6c9187590315660a01c746d
SHA256fe3ee6b71b8f38e0237a4cda1aa46132dbcfd6d2be431ee96d31082972b0c248
SHA512b65548a1b50c0ed3223f2515285f669ac55bedcda81f092500a1bcf546f8bc3844263caee580f05e6c76bf51af00370c76bf92846a11802814645557da04af00
-
Filesize
376KB
MD5d30541dcf9634d3500361c4e7c82ea9c
SHA1a3cc77a3642bf9d5acdefdd779fd7975a796d81f
SHA256eca91ecf41e821240a12e6ee8e844e551191566651e376b80e7f3608a1f382fe
SHA5128047437db4c77b4c15171752d5dd5ebfadeca5fcb164d10a850824015fcc29f0c49faf844392c6a98eeaedfd7be2405cf7441d2e304cabb4a20a9d1893d1f27c
-
Filesize
434KB
MD507c4895f4f37864079bf1a12f619060b
SHA186710b80ac3e8bf415402c763a7a11ba8e953d71
SHA2565e54efbae2067cac9801fadae706e1af9f597f6a7b9f967b5acf78a93678eeb2
SHA5123e24e25ac9ef43666ebb9181010500265fb46b22a77c1d5d9060be58082fe19661137cc53cab4418d5c5a58ae3a6bfe89148154c1535f30e63f77e15046e331e