Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 09:36
Static task
static1
Behavioral task
behavioral1
Sample
fd2e6756fc4617d8c9890c6900d97e66c881960657c55f8573e259e7f9c29cd5.exe
Resource
win10v2004-20241007-en
General
-
Target
fd2e6756fc4617d8c9890c6900d97e66c881960657c55f8573e259e7f9c29cd5.exe
-
Size
677KB
-
MD5
98d8fb043e303bf77f56948fbfa02f90
-
SHA1
f2168b43586beb8d9aa60857c6870537095ce12f
-
SHA256
fd2e6756fc4617d8c9890c6900d97e66c881960657c55f8573e259e7f9c29cd5
-
SHA512
0132ef1f92ed75b87f3b92dce73a4eae5876918d7b530827681b97bae76b0dc6d798d034c9c80c5bfb186426f6172ac696cf89201f0dd87a33eb6434452000b0
-
SSDEEP
12288:PMrFy90R3EisMlN107TUHL4eS/Kzp0HMJGk3zYE3/9mIfjmnLfzDZ:+yu3rsMlN107TYeKoa/zD3lmejmnLR
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3288-19-0x00000000023B0000-0x00000000023CA000-memory.dmp healer behavioral1/memory/3288-21-0x00000000024A0000-0x00000000024B8000-memory.dmp healer behavioral1/memory/3288-27-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/3288-49-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/3288-48-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/3288-45-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/3288-43-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/3288-42-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/3288-39-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/3288-37-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/3288-35-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/3288-33-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/3288-31-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/3288-29-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/3288-25-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/3288-23-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/3288-22-0x00000000024A0000-0x00000000024B2000-memory.dmp healer -
Healer family
-
Processes:
pro0474.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0474.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0474.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4876-61-0x0000000002400000-0x0000000002446000-memory.dmp family_redline behavioral1/memory/4876-62-0x00000000024A0000-0x00000000024E4000-memory.dmp family_redline behavioral1/memory/4876-68-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-66-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-64-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-63-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-78-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-76-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-74-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-72-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-70-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-80-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-96-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-94-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-92-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-90-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-88-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-86-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-84-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/4876-82-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un973021.exepro0474.exequ9290.exepid process 1264 un973021.exe 3288 pro0474.exe 4876 qu9290.exe -
Processes:
pro0474.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0474.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un973021.exefd2e6756fc4617d8c9890c6900d97e66c881960657c55f8573e259e7f9c29cd5.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un973021.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fd2e6756fc4617d8c9890c6900d97e66c881960657c55f8573e259e7f9c29cd5.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5040 3288 WerFault.exe pro0474.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro0474.exequ9290.exefd2e6756fc4617d8c9890c6900d97e66c881960657c55f8573e259e7f9c29cd5.exeun973021.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0474.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9290.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd2e6756fc4617d8c9890c6900d97e66c881960657c55f8573e259e7f9c29cd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un973021.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0474.exepid process 3288 pro0474.exe 3288 pro0474.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0474.exequ9290.exedescription pid process Token: SeDebugPrivilege 3288 pro0474.exe Token: SeDebugPrivilege 4876 qu9290.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
fd2e6756fc4617d8c9890c6900d97e66c881960657c55f8573e259e7f9c29cd5.exeun973021.exedescription pid process target process PID 4456 wrote to memory of 1264 4456 fd2e6756fc4617d8c9890c6900d97e66c881960657c55f8573e259e7f9c29cd5.exe un973021.exe PID 4456 wrote to memory of 1264 4456 fd2e6756fc4617d8c9890c6900d97e66c881960657c55f8573e259e7f9c29cd5.exe un973021.exe PID 4456 wrote to memory of 1264 4456 fd2e6756fc4617d8c9890c6900d97e66c881960657c55f8573e259e7f9c29cd5.exe un973021.exe PID 1264 wrote to memory of 3288 1264 un973021.exe pro0474.exe PID 1264 wrote to memory of 3288 1264 un973021.exe pro0474.exe PID 1264 wrote to memory of 3288 1264 un973021.exe pro0474.exe PID 1264 wrote to memory of 4876 1264 un973021.exe qu9290.exe PID 1264 wrote to memory of 4876 1264 un973021.exe qu9290.exe PID 1264 wrote to memory of 4876 1264 un973021.exe qu9290.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd2e6756fc4617d8c9890c6900d97e66c881960657c55f8573e259e7f9c29cd5.exe"C:\Users\Admin\AppData\Local\Temp\fd2e6756fc4617d8c9890c6900d97e66c881960657c55f8573e259e7f9c29cd5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un973021.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un973021.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0474.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0474.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 10924⤵
- Program crash
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9290.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9290.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3288 -ip 32881⤵PID:1580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
523KB
MD5c33cf46a7ebc29d4eb7dea44e0eb67ff
SHA1895d0c1fbfe1ecc54aa6ceaf7cd791172f0fd15a
SHA25629d72ad758336c4300f422bb6f24624c64df5ac178820b04cbd9b83a83e51221
SHA5129ce3220fbb9feae0e355c48fdb8d741965842597645ef4d0005c734a6b8fbb382ad4847b566062317da8568f08bc218c05ce418c02a43317d8ec6200dc44ae9c
-
Filesize
253KB
MD56c080fac50c8c8ac7010e19e909f83d3
SHA1177e67502f7a9f46ac112c511833880fb8dfb4d6
SHA2567b927681a4de769334a27748843cd619f8893da04ef3f895e07f93926366d24e
SHA512a7404e2e386ca593f5a919b0678c8101a09009749d4799bb242a34fbd3897a8d343cf72f7a669a5afaffb5797ecc54c1493b8ec93344e7938afa363cd6774c55
-
Filesize
311KB
MD5a34d98d0abce58b66fc26e2d0a65dd82
SHA1900d3f072789a5add91484c058c4ba30b8d04c12
SHA256f699cc8c7cab4858f829947b79f8415c4e6c4c3042e6f25a5e186bf243aa297f
SHA5124e6c8666d08d3897bd9ebce66de355cb6683730bcea5782a05c8f45dad6eef46712ac67474b3e1b6f20ccb6e0cc21539bcc18dd999c8f6809ce0f032b686f053