Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe
Resource
win10v2004-20241007-en
General
-
Target
62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe
-
Size
671KB
-
MD5
2c29d4d448e0fc675ba44824426d6fd8
-
SHA1
6bd01b9934f0f932980b3995edc898593c6562cf
-
SHA256
62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548
-
SHA512
104731d4a0a6d456f26360575c9b1671902172effffbdf46f11de4c6fc6589f448c6a3975c57c6b54a690df7bc86f55942bad89fbecba87cf3f07dd76c2958ac
-
SSDEEP
12288:FMrNy90vD0nrEfstO0fgxPgw4GqVM2bHKD3Lqqi1O2st:gyEGltO0f+qVVbqD3GqQOV
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4008-17-0x0000000003B00000-0x0000000003B1A000-memory.dmp healer behavioral1/memory/4008-21-0x0000000006080000-0x0000000006098000-memory.dmp healer behavioral1/memory/4008-45-0x0000000006080000-0x0000000006092000-memory.dmp healer behavioral1/memory/4008-49-0x0000000006080000-0x0000000006092000-memory.dmp healer behavioral1/memory/4008-47-0x0000000006080000-0x0000000006092000-memory.dmp healer behavioral1/memory/4008-43-0x0000000006080000-0x0000000006092000-memory.dmp healer behavioral1/memory/4008-41-0x0000000006080000-0x0000000006092000-memory.dmp healer behavioral1/memory/4008-39-0x0000000006080000-0x0000000006092000-memory.dmp healer behavioral1/memory/4008-37-0x0000000006080000-0x0000000006092000-memory.dmp healer behavioral1/memory/4008-35-0x0000000006080000-0x0000000006092000-memory.dmp healer behavioral1/memory/4008-33-0x0000000006080000-0x0000000006092000-memory.dmp healer behavioral1/memory/4008-31-0x0000000006080000-0x0000000006092000-memory.dmp healer behavioral1/memory/4008-29-0x0000000006080000-0x0000000006092000-memory.dmp healer behavioral1/memory/4008-27-0x0000000006080000-0x0000000006092000-memory.dmp healer behavioral1/memory/4008-25-0x0000000006080000-0x0000000006092000-memory.dmp healer behavioral1/memory/4008-23-0x0000000006080000-0x0000000006092000-memory.dmp healer behavioral1/memory/4008-22-0x0000000006080000-0x0000000006092000-memory.dmp healer -
Healer family
-
Processes:
pro4665.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4665.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4665.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3596-60-0x0000000003A00000-0x0000000003A46000-memory.dmp family_redline behavioral1/memory/3596-61-0x0000000006110000-0x0000000006154000-memory.dmp family_redline behavioral1/memory/3596-79-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-73-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-63-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-62-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-85-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-95-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-93-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-91-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-89-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-88-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-83-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-81-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-77-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-75-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-71-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-69-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-67-0x0000000006110000-0x000000000614F000-memory.dmp family_redline behavioral1/memory/3596-65-0x0000000006110000-0x000000000614F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un552064.exepro4665.exequ2184.exepid process 4852 un552064.exe 4008 pro4665.exe 3596 qu2184.exe -
Processes:
pro4665.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4665.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exeun552064.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un552064.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3240 4008 WerFault.exe pro4665.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exeun552064.exepro4665.exequ2184.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un552064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4665.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2184.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4665.exepid process 4008 pro4665.exe 4008 pro4665.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4665.exequ2184.exedescription pid process Token: SeDebugPrivilege 4008 pro4665.exe Token: SeDebugPrivilege 3596 qu2184.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exeun552064.exedescription pid process target process PID 464 wrote to memory of 4852 464 62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe un552064.exe PID 464 wrote to memory of 4852 464 62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe un552064.exe PID 464 wrote to memory of 4852 464 62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe un552064.exe PID 4852 wrote to memory of 4008 4852 un552064.exe pro4665.exe PID 4852 wrote to memory of 4008 4852 un552064.exe pro4665.exe PID 4852 wrote to memory of 4008 4852 un552064.exe pro4665.exe PID 4852 wrote to memory of 3596 4852 un552064.exe qu2184.exe PID 4852 wrote to memory of 3596 4852 un552064.exe qu2184.exe PID 4852 wrote to memory of 3596 4852 un552064.exe qu2184.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe"C:\Users\Admin\AppData\Local\Temp\62e945c781be150efe1de52cd61eb9541e3556295b312d5e9d0d4c1f044bb548.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un552064.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un552064.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4665.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4665.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 11004⤵
- Program crash
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2184.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2184.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4008 -ip 40081⤵PID:3172
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
529KB
MD5043791acf6ab47e36081a547c77037e0
SHA14b3de473a9bc3e4589c79b0e568a9083d9f0779d
SHA2566f2806adf733f0976467c3ed5649ea9a02c083307decee698cf7bc4ebb6baf54
SHA512e25603f94967998ae2bae1c80a7cc1b6fae0fa86a92e6e87281f704af2171076c68a7bc788536264a54b0ec7868d9eb67efe8fa6d58c2ec19a5e96e563bbd5d9
-
Filesize
301KB
MD5b6df7bd5033879c075339d47d8d39d45
SHA11268cd743a5b0e939e62e727d47e559b96346b8f
SHA256c6c48a416130d1d9df059fcfd91463f475fa935ea26848e8a4ecb6aa92dd3803
SHA512bbabfc38b77828f20575e3b63bfe454b4c2b959bc86093cadbb88f5c7377f341bdb80c2ae7a68348660e600f9739776188ef6f0924c895aee3572c91202ba06b
-
Filesize
359KB
MD5df9f28a2e77750c67155a8ee6ab61cf3
SHA1e2fd58dccbb3fbf1724396bb21701ff2a8bbcbc7
SHA25624c6c72a15fa5dc498f37e1fdb933a1bca78f1c837d987cb597ba1e03af3fae2
SHA512d1884c46c1bcb3059bcb4f0a60944f34bbb6d69f66961cbea26bc233e55e6d81cb999bf1e8e6101341bd56ae95100a1dd595c3bc3eeaf4533baf34b8b9a372fe