Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc.exe
Resource
win10v2004-20241007-en
General
-
Target
a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc.exe
-
Size
658KB
-
MD5
0f9fa37ac6480d890f23496da7978880
-
SHA1
7725c9e32f36f85a6bdee912bb636c980ee415b4
-
SHA256
a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc
-
SHA512
775e2a577d56458271983606deb9dff8f12ab862990006794b9467027f01b83e1dca66b3c2ab9b5fa3ad6bd734bf8ecf6c15022c0a99b6b23d4b40ac2eb900b2
-
SSDEEP
12288:+Mrgy90YFcPRLqa6rWgudw10+N+s3nK5l7MGr+EUZxIQAbcclD:yyjiJormC1gsXIMG+EUzIQd6
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3912-18-0x0000000004A30000-0x0000000004A4A000-memory.dmp healer behavioral1/memory/3912-20-0x0000000004C00000-0x0000000004C18000-memory.dmp healer behavioral1/memory/3912-46-0x0000000004C00000-0x0000000004C12000-memory.dmp healer behavioral1/memory/3912-48-0x0000000004C00000-0x0000000004C12000-memory.dmp healer behavioral1/memory/3912-45-0x0000000004C00000-0x0000000004C12000-memory.dmp healer behavioral1/memory/3912-42-0x0000000004C00000-0x0000000004C12000-memory.dmp healer behavioral1/memory/3912-40-0x0000000004C00000-0x0000000004C12000-memory.dmp healer behavioral1/memory/3912-38-0x0000000004C00000-0x0000000004C12000-memory.dmp healer behavioral1/memory/3912-36-0x0000000004C00000-0x0000000004C12000-memory.dmp healer behavioral1/memory/3912-34-0x0000000004C00000-0x0000000004C12000-memory.dmp healer behavioral1/memory/3912-32-0x0000000004C00000-0x0000000004C12000-memory.dmp healer behavioral1/memory/3912-30-0x0000000004C00000-0x0000000004C12000-memory.dmp healer behavioral1/memory/3912-28-0x0000000004C00000-0x0000000004C12000-memory.dmp healer behavioral1/memory/3912-26-0x0000000004C00000-0x0000000004C12000-memory.dmp healer behavioral1/memory/3912-24-0x0000000004C00000-0x0000000004C12000-memory.dmp healer behavioral1/memory/3912-22-0x0000000004C00000-0x0000000004C12000-memory.dmp healer behavioral1/memory/3912-21-0x0000000004C00000-0x0000000004C12000-memory.dmp healer -
Healer family
-
Processes:
pro0668.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0668.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0668.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0668.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0668.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0668.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0668.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3528-60-0x0000000004C50000-0x0000000004C96000-memory.dmp family_redline behavioral1/memory/3528-61-0x0000000004E50000-0x0000000004E94000-memory.dmp family_redline behavioral1/memory/3528-65-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-89-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-95-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-93-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-91-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-88-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-85-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-83-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-82-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-79-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-77-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-75-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-73-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-71-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-69-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-67-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-63-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3528-62-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un093159.exepro0668.exequ9921.exepid process 3676 un093159.exe 3912 pro0668.exe 3528 qu9921.exe -
Processes:
pro0668.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0668.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0668.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc.exeun093159.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un093159.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1152 3912 WerFault.exe pro0668.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc.exeun093159.exepro0668.exequ9921.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un093159.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9921.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0668.exepid process 3912 pro0668.exe 3912 pro0668.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0668.exequ9921.exedescription pid process Token: SeDebugPrivilege 3912 pro0668.exe Token: SeDebugPrivilege 3528 qu9921.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc.exeun093159.exedescription pid process target process PID 5060 wrote to memory of 3676 5060 a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc.exe un093159.exe PID 5060 wrote to memory of 3676 5060 a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc.exe un093159.exe PID 5060 wrote to memory of 3676 5060 a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc.exe un093159.exe PID 3676 wrote to memory of 3912 3676 un093159.exe pro0668.exe PID 3676 wrote to memory of 3912 3676 un093159.exe pro0668.exe PID 3676 wrote to memory of 3912 3676 un093159.exe pro0668.exe PID 3676 wrote to memory of 3528 3676 un093159.exe qu9921.exe PID 3676 wrote to memory of 3528 3676 un093159.exe qu9921.exe PID 3676 wrote to memory of 3528 3676 un093159.exe qu9921.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc.exe"C:\Users\Admin\AppData\Local\Temp\a1aef7aa55c7a689e3146f9d3808be0b8b8ada004f158fbdc35bd00e13c1b3dc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un093159.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un093159.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0668.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0668.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 10724⤵
- Program crash
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9921.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9921.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3912 -ip 39121⤵PID:3508
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD53febdda0723e0ef3dfbe22ee286071b6
SHA137bf7f375b51c5e9becf96ecbd8e1ab43aa140f2
SHA2565d9a8279cdcb82d4c650f2b13035e0f93edfd807ae51fed8dc46b17bf6cc1084
SHA512babe404c204dd8aa21267c8754258256ef7efb67327251fc983decfc667a6da123a87608bad32c60c9d5f52d5ee63f092697c65261a794c6c451aec96b4307a4
-
Filesize
295KB
MD5978746afbabcbaf482c15937b88d91c3
SHA194cb8cf03f66f58c97ab55b2a01f7ee70b03fa44
SHA256d4185ce7a9c1b44de0b25eb11a842a6bd05e250af3dba5b639a4728f0c65dd87
SHA5126f5d62fd98b7a4727c139e0843a3edb336ba58b2a38b3ab6009ee3f02c830a836f9fedd67d1559eaf916efa1e7e06befa7d191db153fb25395d9f29df9775538
-
Filesize
354KB
MD55e72b7e607afddcea6a6fa3feebb1ca9
SHA19fa7ca4f7635171a50a18cc1812f380b665364db
SHA256e261fd5a73550b69e93a913891f95145d85c49350ce5963c2ff0529ab2494559
SHA5124af5f39da5c8f2fb4118624361082018f05bc7daff3082002290e6420e6a46a895c88872e2896647699c5a75adb3d7a8a39a3948bf2e89c5631680dd6cd950d3