Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 09:46
Static task
static1
Behavioral task
behavioral1
Sample
7e01bf45554dff1cb7b1623a78621bd22b16e9616beb5518cc7ff14a1ae85bf8.exe
Resource
win10v2004-20241007-en
General
-
Target
7e01bf45554dff1cb7b1623a78621bd22b16e9616beb5518cc7ff14a1ae85bf8.exe
-
Size
1005KB
-
MD5
ea28ed0b9c3cbc43bc5e26b43c1a03a5
-
SHA1
508dd93470841adbed26a9e40ff1c41289fb8a18
-
SHA256
7e01bf45554dff1cb7b1623a78621bd22b16e9616beb5518cc7ff14a1ae85bf8
-
SHA512
be11b86f4fea4afaba1ca2be79d61fdc7a9856c4bfe3502e40ef6eafcf08c844cd788b7c8a68e2e0103cca87d59290f5423cda995b31cfc16f118c0eb18ce54e
-
SSDEEP
24576:2y5WlX1/Ar30mSNGKS4OGY8yTYA4NyfnWFKctRl:F5WlX1/AYFGqw8BAs+n
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu337408.exe healer behavioral1/memory/1508-28-0x0000000000A20000-0x0000000000A2A000-memory.dmp healer behavioral1/memory/404-34-0x0000000002630000-0x000000000264A000-memory.dmp healer behavioral1/memory/404-36-0x00000000027D0000-0x00000000027E8000-memory.dmp healer behavioral1/memory/404-37-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/404-46-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/404-62-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/404-60-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/404-58-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/404-56-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/404-54-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/404-52-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/404-51-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/404-49-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/404-64-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/404-45-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/404-42-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/404-40-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/404-38-0x00000000027D0000-0x00000000027E2000-memory.dmp healer -
Healer family
-
Processes:
bu337408.execor8075.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bu337408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor8075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor8075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor8075.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bu337408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bu337408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bu337408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bu337408.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bu337408.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor8075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor8075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor8075.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4144-72-0x0000000002810000-0x0000000002856000-memory.dmp family_redline behavioral1/memory/4144-73-0x00000000053A0000-0x00000000053E4000-memory.dmp family_redline behavioral1/memory/4144-93-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-91-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-107-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-105-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-104-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-101-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-99-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-97-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-95-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-87-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-85-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-84-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-81-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-89-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-79-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-77-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-75-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/4144-74-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
Processes:
kina7839.exekina1242.exekina7144.exebu337408.execor8075.exedwU65s45.exepid process 1440 kina7839.exe 4912 kina1242.exe 3308 kina7144.exe 1508 bu337408.exe 404 cor8075.exe 4144 dwU65s45.exe -
Processes:
bu337408.execor8075.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bu337408.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor8075.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor8075.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
kina7144.exe7e01bf45554dff1cb7b1623a78621bd22b16e9616beb5518cc7ff14a1ae85bf8.exekina7839.exekina1242.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina7144.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e01bf45554dff1cb7b1623a78621bd22b16e9616beb5518cc7ff14a1ae85bf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina7839.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina1242.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4640 404 WerFault.exe cor8075.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
kina7144.execor8075.exedwU65s45.exe7e01bf45554dff1cb7b1623a78621bd22b16e9616beb5518cc7ff14a1ae85bf8.exekina7839.exekina1242.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina7144.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cor8075.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwU65s45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e01bf45554dff1cb7b1623a78621bd22b16e9616beb5518cc7ff14a1ae85bf8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina7839.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina1242.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bu337408.execor8075.exepid process 1508 bu337408.exe 1508 bu337408.exe 404 cor8075.exe 404 cor8075.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
bu337408.execor8075.exedwU65s45.exedescription pid process Token: SeDebugPrivilege 1508 bu337408.exe Token: SeDebugPrivilege 404 cor8075.exe Token: SeDebugPrivilege 4144 dwU65s45.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
7e01bf45554dff1cb7b1623a78621bd22b16e9616beb5518cc7ff14a1ae85bf8.exekina7839.exekina1242.exekina7144.exedescription pid process target process PID 3092 wrote to memory of 1440 3092 7e01bf45554dff1cb7b1623a78621bd22b16e9616beb5518cc7ff14a1ae85bf8.exe kina7839.exe PID 3092 wrote to memory of 1440 3092 7e01bf45554dff1cb7b1623a78621bd22b16e9616beb5518cc7ff14a1ae85bf8.exe kina7839.exe PID 3092 wrote to memory of 1440 3092 7e01bf45554dff1cb7b1623a78621bd22b16e9616beb5518cc7ff14a1ae85bf8.exe kina7839.exe PID 1440 wrote to memory of 4912 1440 kina7839.exe kina1242.exe PID 1440 wrote to memory of 4912 1440 kina7839.exe kina1242.exe PID 1440 wrote to memory of 4912 1440 kina7839.exe kina1242.exe PID 4912 wrote to memory of 3308 4912 kina1242.exe kina7144.exe PID 4912 wrote to memory of 3308 4912 kina1242.exe kina7144.exe PID 4912 wrote to memory of 3308 4912 kina1242.exe kina7144.exe PID 3308 wrote to memory of 1508 3308 kina7144.exe bu337408.exe PID 3308 wrote to memory of 1508 3308 kina7144.exe bu337408.exe PID 3308 wrote to memory of 404 3308 kina7144.exe cor8075.exe PID 3308 wrote to memory of 404 3308 kina7144.exe cor8075.exe PID 3308 wrote to memory of 404 3308 kina7144.exe cor8075.exe PID 4912 wrote to memory of 4144 4912 kina1242.exe dwU65s45.exe PID 4912 wrote to memory of 4144 4912 kina1242.exe dwU65s45.exe PID 4912 wrote to memory of 4144 4912 kina1242.exe dwU65s45.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e01bf45554dff1cb7b1623a78621bd22b16e9616beb5518cc7ff14a1ae85bf8.exe"C:\Users\Admin\AppData\Local\Temp\7e01bf45554dff1cb7b1623a78621bd22b16e9616beb5518cc7ff14a1ae85bf8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7839.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina7839.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1242.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina1242.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7144.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina7144.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu337408.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu337408.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8075.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor8075.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 10646⤵
- Program crash
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dwU65s45.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dwU65s45.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 404 -ip 4041⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
821KB
MD53e89abe896105dc03c241bc85ccefe28
SHA1a0a1e928a7321c59f67c9f98b846a3b558020214
SHA256d7e20b3825a889965c99636df67532a0285fbeba7994f08da6910950f393ea40
SHA51202a409ad17c04a870965686ac26a76192a5e10f035b98e62fefda34399e28bb6265b880ffa537b0060e6326e0ee30c570352c5951ce6c14d98befeb4d449ba30
-
Filesize
679KB
MD5c62e4b7bf78441ece3cb1df60572a5e3
SHA1efca50ff61d9df430b6d0115cf75382e5fd46e3e
SHA256bb14efb8aa28ab50b921237832377dae456d42fbf5e4cd4322ef4cf03de5e532
SHA5128a3dd02d81d74e082b4375256073cb0cd5dd46628fba7313eefad13d1f863e76cdbe3a19b4883dbebe7c3a8633d046ad6724faf216b8dc240137c9f0c76ef339
-
Filesize
353KB
MD54f39c59108db4f35437d4eb98566c9a6
SHA1e2033dfa0d3287a1fd5a3abaac9bb823f2339f35
SHA25603f033fa3bcafbc2083da65450d8774697b4a058b119180f8e0920989d57afec
SHA512af766457bb252f267879961d227988b1086fd7e33fb916902bd1982d4fc8f1006e6be7b3406166f16468db215878902bc39e7e1e75b06528bfbe0589993f3fc3
-
Filesize
336KB
MD5c3e65cd162588a4809898f10be83c33c
SHA10789acc00caefd1009036c8365ffe0db3d474eeb
SHA2569d6bb12effb3ae2c05aedd29d7481843e9a0891df8fd33f5ed6be37a6e6cba5b
SHA5127f9adf2d81633a10e0ea2dbaa4d9a15f10e3ffb49757fda0ffcdd9dbe6ae297f9e4b7b8f03110c4918e97a247f050d429befa8aec0ae8859511ca08674a82965
-
Filesize
13KB
MD58ebd537b04b359e632df9ba7174f39f8
SHA1b9be1f1b973d3cbd80cb5431b2ed9d105c3e000c
SHA256fd727d18c4153c64a7bb449c3a655ffc23901335c9271ee435d804f512494bf8
SHA5128a04f7e846de31bfec65f0cb397817120b193bf87ff59bb3ef14cf296583a6f009254172e85dd0a9998cdea17661d6732a0aea0e5045dbe23194eaed614d935a
-
Filesize
294KB
MD54ea34db8f782d40f09b7a8a77ee252ef
SHA127fe27d60af930f4f4793e1804271e7c45ef4615
SHA2564dd89ae6b5703d52fc700eab16e308961dad7880b4c237c3c89bc71f84ae973b
SHA512e57782b15a9b0a05ab7ead5ec703e091d42d3f15248449fe52ca2fb5f1cc6b66d62898aa783de29e49b3648a902f421312202892e7f1c62693ce5e216e20201d