Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:04
Static task
static1
Behavioral task
behavioral1
Sample
e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951.exe
Resource
win10v2004-20241007-en
General
-
Target
e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951.exe
-
Size
666KB
-
MD5
bce6dad9fadcc0922d380a4745dbebf3
-
SHA1
1cd9363e5ad94f37afe1b311452bc1a4ae785b0b
-
SHA256
e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951
-
SHA512
87a24ff90af08a8a9dfaf4f0243f3c305f9f12cb56719862f6a3ff7c74cc94e7f0c66e31f7b3375402aec91c3372274b5aac4f1ca8b4b1292f2ecdfcdc2487b6
-
SSDEEP
12288:aMrAy90TuZpH1OnM/5yFyo2UTrmlISqv2ORhT+6He8mo/ip7QoHppC:+ylZoz2+mlOHDTe7ZQuC
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4780-19-0x0000000002510000-0x000000000252A000-memory.dmp healer behavioral1/memory/4780-21-0x00000000027B0000-0x00000000027C8000-memory.dmp healer behavioral1/memory/4780-49-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4780-47-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4780-45-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4780-44-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4780-41-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4780-39-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4780-37-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4780-35-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4780-33-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4780-31-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4780-29-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4780-27-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4780-25-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4780-23-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4780-22-0x00000000027B0000-0x00000000027C2000-memory.dmp healer -
Healer family
-
Processes:
pro9043.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9043.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3036-61-0x0000000002710000-0x0000000002756000-memory.dmp family_redline behavioral1/memory/3036-62-0x0000000002AC0000-0x0000000002B04000-memory.dmp family_redline behavioral1/memory/3036-64-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-76-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-96-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-94-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-92-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-90-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-88-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-86-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-84-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-82-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-80-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-78-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-74-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-72-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-70-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-68-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-66-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/3036-63-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un373851.exepro9043.exequ1429.exepid process 1748 un373851.exe 4780 pro9043.exe 3036 qu1429.exe -
Processes:
pro9043.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9043.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951.exeun373851.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un373851.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3568 4780 WerFault.exe pro9043.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951.exeun373851.exepro9043.exequ1429.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un373851.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9043.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1429.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9043.exepid process 4780 pro9043.exe 4780 pro9043.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9043.exequ1429.exedescription pid process Token: SeDebugPrivilege 4780 pro9043.exe Token: SeDebugPrivilege 3036 qu1429.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951.exeun373851.exedescription pid process target process PID 1548 wrote to memory of 1748 1548 e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951.exe un373851.exe PID 1548 wrote to memory of 1748 1548 e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951.exe un373851.exe PID 1548 wrote to memory of 1748 1548 e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951.exe un373851.exe PID 1748 wrote to memory of 4780 1748 un373851.exe pro9043.exe PID 1748 wrote to memory of 4780 1748 un373851.exe pro9043.exe PID 1748 wrote to memory of 4780 1748 un373851.exe pro9043.exe PID 1748 wrote to memory of 3036 1748 un373851.exe qu1429.exe PID 1748 wrote to memory of 3036 1748 un373851.exe qu1429.exe PID 1748 wrote to memory of 3036 1748 un373851.exe qu1429.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951.exe"C:\Users\Admin\AppData\Local\Temp\e8f9871ba162ca5ff245f3987b4b178fa1e6b018cc6272dfcdf610fd82000951.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un373851.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un373851.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9043.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9043.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 10804⤵
- Program crash
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1429.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1429.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4780 -ip 47801⤵PID:620
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
525KB
MD5b1e7d105607e554a8a48766672f6b699
SHA1df88d7b536ee3fe83ca3d3b5904be0d345b9e76b
SHA256ca783333398c95045909a2e21f2e23c55b6fadcc07e6a971b91984da9eb3dc9d
SHA51245ecc2d5e8c5600df4cadfffe653abef37e6a9b02723de0d9b6414eb1d536fbc0e173b666b0aa1826d62186de4261b8c8803d922bdbe09a63e55764ec97901b3
-
Filesize
295KB
MD555420dce72c3df483fb03a79248cbb68
SHA1c3f90291f79a22b44e0f97b723353982821d8993
SHA2569dd8fd45fcdb77e521eedf522f1c322e3130f58a24efc73c1c3dc10afc98a47b
SHA51268ddc11649793a2629760aa9c1c690abd1d7032504e5afe1eed705c197019fa8b1fcc39ccdb17df2bbf41dd29c02dcbd83ae9ec93acdc894c1d3271dd9deaf77
-
Filesize
353KB
MD5b936bb184dbf249546c855d1cbc83b9a
SHA159c14fcc19776b1090751a4c3deed1a2a7a1a3c3
SHA25697864e2ff7535c684e5b7c2f9efbef0d1c0a6fc367c7548c029c6b706f3d757b
SHA5122ba40f59f62eb7628171f6d2e23f9f0f4e3a75e72cdaafc464eca449b053ac97cec089823bcb3fbc03040d2302bb4f12aef7099ed4c03ffb69a215c9dafd6b9b