Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 09:02
Static task
static1
Behavioral task
behavioral1
Sample
05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83.exe
Resource
win10v2004-20241007-en
General
-
Target
05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83.exe
-
Size
678KB
-
MD5
bf4d634278ef305a12bc2d8cb851d861
-
SHA1
1c6fb7dc5b105a0dc13f533701dea51ffbf82c3b
-
SHA256
05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83
-
SHA512
66755ecbc285156c76e51f9f83822f07db25de14bb10560f1ffaa42831ebfd721cd652f5b6def3fdde221a875e2075e655498fe8f95dd0fc7bea159b487fb390
-
SSDEEP
12288:lMr6y90LAgMAnco2Kt2G73MU8q0A1ifUsKSu1FZdGi/zaEhd6gZpBXr:zyJdAcK8X81n+4zaCMgtXr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3772-19-0x0000000002700000-0x000000000271A000-memory.dmp healer behavioral1/memory/3772-21-0x0000000002B70000-0x0000000002B88000-memory.dmp healer behavioral1/memory/3772-22-0x0000000002B70000-0x0000000002B82000-memory.dmp healer behavioral1/memory/3772-49-0x0000000002B70000-0x0000000002B82000-memory.dmp healer behavioral1/memory/3772-47-0x0000000002B70000-0x0000000002B82000-memory.dmp healer behavioral1/memory/3772-45-0x0000000002B70000-0x0000000002B82000-memory.dmp healer behavioral1/memory/3772-43-0x0000000002B70000-0x0000000002B82000-memory.dmp healer behavioral1/memory/3772-41-0x0000000002B70000-0x0000000002B82000-memory.dmp healer behavioral1/memory/3772-39-0x0000000002B70000-0x0000000002B82000-memory.dmp healer behavioral1/memory/3772-37-0x0000000002B70000-0x0000000002B82000-memory.dmp healer behavioral1/memory/3772-35-0x0000000002B70000-0x0000000002B82000-memory.dmp healer behavioral1/memory/3772-33-0x0000000002B70000-0x0000000002B82000-memory.dmp healer behavioral1/memory/3772-31-0x0000000002B70000-0x0000000002B82000-memory.dmp healer behavioral1/memory/3772-29-0x0000000002B70000-0x0000000002B82000-memory.dmp healer behavioral1/memory/3772-27-0x0000000002B70000-0x0000000002B82000-memory.dmp healer behavioral1/memory/3772-25-0x0000000002B70000-0x0000000002B82000-memory.dmp healer behavioral1/memory/3772-23-0x0000000002B70000-0x0000000002B82000-memory.dmp healer -
Healer family
-
Processes:
pro8131.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8131.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1952-60-0x0000000002420000-0x0000000002466000-memory.dmp family_redline behavioral1/memory/1952-61-0x0000000002570000-0x00000000025B4000-memory.dmp family_redline behavioral1/memory/1952-71-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-75-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-95-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-93-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-92-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-87-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-85-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-84-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-81-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-79-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-77-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-73-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-69-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-67-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-89-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-65-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-63-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/1952-62-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un281917.exepro8131.exequ4377.exepid process 4200 un281917.exe 3772 pro8131.exe 1952 qu4377.exe -
Processes:
pro8131.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8131.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8131.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un281917.exe05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un281917.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4044 3772 WerFault.exe pro8131.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu4377.exe05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83.exeun281917.exepro8131.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4377.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un281917.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8131.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8131.exepid process 3772 pro8131.exe 3772 pro8131.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8131.exequ4377.exedescription pid process Token: SeDebugPrivilege 3772 pro8131.exe Token: SeDebugPrivilege 1952 qu4377.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83.exeun281917.exedescription pid process target process PID 3876 wrote to memory of 4200 3876 05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83.exe un281917.exe PID 3876 wrote to memory of 4200 3876 05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83.exe un281917.exe PID 3876 wrote to memory of 4200 3876 05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83.exe un281917.exe PID 4200 wrote to memory of 3772 4200 un281917.exe pro8131.exe PID 4200 wrote to memory of 3772 4200 un281917.exe pro8131.exe PID 4200 wrote to memory of 3772 4200 un281917.exe pro8131.exe PID 4200 wrote to memory of 1952 4200 un281917.exe qu4377.exe PID 4200 wrote to memory of 1952 4200 un281917.exe qu4377.exe PID 4200 wrote to memory of 1952 4200 un281917.exe qu4377.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83.exe"C:\Users\Admin\AppData\Local\Temp\05e40a3b24881d4a9f7b0b383f97b0846152cc51085c7a2384c2f870402b0d83.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un281917.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un281917.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8131.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8131.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3772 -s 11044⤵
- Program crash
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4377.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4377.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3772 -ip 37721⤵PID:2728
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD50c9d7724a849355b82f8e0ef6a17868b
SHA17ab100f27fee3975045dc34e060bb1e46b0f9dfa
SHA25607f7e6c4d820b3971e5f33e54bc48cc3df9585b2d4cca148623ac7e9f18522c0
SHA512cb2d85af0825f19582e2fdcf9fac828e7d20d0da7d6a4c8cc2ea49c2908ace7fad5bb39737e8dc49b6ab26eb7bf8af4efa4232b238cb5b66b886cfd71a8538d7
-
Filesize
289KB
MD5b45e1249496d9d3845baae3b28271c8f
SHA10edfd701ed73b527336b84d7bcc49c90c5ba4d61
SHA256d416df3410df469bd5a7cb980c96c4f9ad39b8a99cde1f6ab4fc12481fd40330
SHA5122524ef085c16dc468ada3b0a6d58b5ae990042576f0377ac04cc70345b5b0d621f68d5028b88f60e149b47b72953669777d97b4c1420cdff30f491b5f4cc4389
-
Filesize
348KB
MD58d14c26c0de1ebf0a3d66a2f3e8445c8
SHA1355d89a2027aa72b0c81bb619dedb7e309f0e7c9
SHA256f2053d1b7c3256879585797de4ce785e51f2ce861b2aad1b6734f5b97f4910c3
SHA512dd29374f37f0d59cb36a780dd907c294257e4f714e4d93adde7b3fab8f7303e25ad89d16e21b9fa92d7301e68aedb821d8e1fe354524a3d9162b21ff86e20cb2