Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:04
Static task
static1
Behavioral task
behavioral1
Sample
925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7.exe
Resource
win10v2004-20241007-en
General
-
Target
925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7.exe
-
Size
673KB
-
MD5
b0bccaa64cee14f004e43bae2db7ed28
-
SHA1
5084277dc6fbd73f2bc4edbc20f62754be63b4a0
-
SHA256
925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7
-
SHA512
015339636540dc046b19d76ca356879e92f16b11b3852c032d81003b68960585a4fe2204233c9e857a74953b457715920974c344ec03d26c14ec873ac09c69fd
-
SSDEEP
12288:SMr0y90dIgfD6QrdLdi+/Vbr6VZUd/lK8T5buW4JOau7:Ky23D6A5F8q/t9uLM7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2456-19-0x0000000002260000-0x000000000227A000-memory.dmp healer behavioral1/memory/2456-21-0x0000000002710000-0x0000000002728000-memory.dmp healer behavioral1/memory/2456-25-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/2456-49-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/2456-47-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/2456-45-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/2456-43-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/2456-41-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/2456-39-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/2456-37-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/2456-35-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/2456-33-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/2456-31-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/2456-29-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/2456-27-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/2456-23-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/2456-22-0x0000000002710000-0x0000000002722000-memory.dmp healer -
Healer family
-
Processes:
pro9262.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9262.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9262.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3172-61-0x0000000002500000-0x0000000002546000-memory.dmp family_redline behavioral1/memory/3172-62-0x00000000025D0000-0x0000000002614000-memory.dmp family_redline behavioral1/memory/3172-66-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-80-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-97-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-94-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-93-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-90-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-88-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-87-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-84-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-82-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-78-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-76-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-74-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-72-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-70-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-68-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-64-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline behavioral1/memory/3172-63-0x00000000025D0000-0x000000000260F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un163213.exepro9262.exequ8186.exepid process 1476 un163213.exe 2456 pro9262.exe 3172 qu8186.exe -
Processes:
pro9262.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9262.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7.exeun163213.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un163213.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4840 2456 WerFault.exe pro9262.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7.exeun163213.exepro9262.exequ8186.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un163213.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8186.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9262.exepid process 2456 pro9262.exe 2456 pro9262.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9262.exequ8186.exedescription pid process Token: SeDebugPrivilege 2456 pro9262.exe Token: SeDebugPrivilege 3172 qu8186.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7.exeun163213.exedescription pid process target process PID 4592 wrote to memory of 1476 4592 925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7.exe un163213.exe PID 4592 wrote to memory of 1476 4592 925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7.exe un163213.exe PID 4592 wrote to memory of 1476 4592 925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7.exe un163213.exe PID 1476 wrote to memory of 2456 1476 un163213.exe pro9262.exe PID 1476 wrote to memory of 2456 1476 un163213.exe pro9262.exe PID 1476 wrote to memory of 2456 1476 un163213.exe pro9262.exe PID 1476 wrote to memory of 3172 1476 un163213.exe qu8186.exe PID 1476 wrote to memory of 3172 1476 un163213.exe qu8186.exe PID 1476 wrote to memory of 3172 1476 un163213.exe qu8186.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7.exe"C:\Users\Admin\AppData\Local\Temp\925d91b57637c5a6409a6f903febb554d09526b0532207008c9999bad1e6d5e7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un163213.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un163213.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9262.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9262.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 10804⤵
- Program crash
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8186.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8186.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2456 -ip 24561⤵PID:4560
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD51b5a1febce63286df9a349c0ccf0da46
SHA187d6b1a04c9e27aebc5b86efb8e7935968522061
SHA2560180d1ca46b0532e93a1e3b62bb4dd9728691a428e91e10272aa9baf6d06644b
SHA512f2afd1e26e9c1d7dabb4f5e31fe0daf48eeb8931e12a9b7db6e3a62dcead9071e9758a15f29dcc5dc9ae15391e311e8441fc701d1f10a50b5882e40d083e890e
-
Filesize
260KB
MD5f3e0eb62831dd8cdad81c97431f51cc0
SHA1d5927f7edb3b30926d97ac020a0a43e2408615d8
SHA25648c3cae132cff06141be57a468490ecc726b14247f79c020fbcd2d2201d144a0
SHA5126b40f08b37e893956d5cb5b9af21a35e56a6bc735eb85e527e941eb1c9985780baee5aa1ea8fd34c346f480c8c0c5976552efddc697c906df544e28791aa2e36
-
Filesize
319KB
MD5722a0ce70a47c466ced021519b582173
SHA1c1078515593cef894d253326375d1c6337d6df33
SHA25656f90c0005cfdb7e052b5a5aeb6738e74a62793fc2613dbc4359fa763481ed74
SHA5127a9afc791430824293cc76944f1e9c0d9f4d46de6106e885d2927055c5a03611b9a5bbc8c23a15b992d26f8573a6128354928ecbc9691d55b57ea8c0f4b07110