Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 11:33
Static task
static1
Behavioral task
behavioral1
Sample
9822c127fc80592c825b15cc5c7e0465a27db986c30293dd0ca2fb0c6f9687e8.exe
Resource
win10v2004-20241007-en
General
-
Target
9822c127fc80592c825b15cc5c7e0465a27db986c30293dd0ca2fb0c6f9687e8.exe
-
Size
673KB
-
MD5
28988456a56621ed34c636ff62376f03
-
SHA1
ec226c1eb49891a0314d99f102fb810dbab08c09
-
SHA256
9822c127fc80592c825b15cc5c7e0465a27db986c30293dd0ca2fb0c6f9687e8
-
SHA512
a3e10a50fcca7a9f39c5f7f168e967dce8ee308475de6db3200fa0624509e96c86965e149da43c43c9dc7cd32f3f0431dae48948055800b5778b05bc93cb12d2
-
SSDEEP
12288:KMr6y90CngkzxLuEI2srUnlsc+KIbMyvL+JhQuuWTrCs/McZo/GKIe7:MypFL1orZKIbmJhQuugP/Mv/FIe7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3152-19-0x0000000002270000-0x000000000228A000-memory.dmp healer behavioral1/memory/3152-21-0x0000000002370000-0x0000000002388000-memory.dmp healer behavioral1/memory/3152-22-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3152-49-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3152-47-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3152-45-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3152-43-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3152-41-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3152-39-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3152-38-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3152-35-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3152-33-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3152-31-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3152-29-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3152-27-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3152-25-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3152-23-0x0000000002370000-0x0000000002382000-memory.dmp healer -
Healer family
-
Processes:
pro7049.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7049.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7049.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4784-61-0x00000000025B0000-0x00000000025F6000-memory.dmp family_redline behavioral1/memory/4784-62-0x0000000005060000-0x00000000050A4000-memory.dmp family_redline behavioral1/memory/4784-66-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-72-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-96-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-94-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-92-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-90-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-86-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-84-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-82-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-80-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-78-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-76-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-70-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-68-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-88-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-74-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-64-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/4784-63-0x0000000005060000-0x000000000509F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un385894.exepro7049.exequ0861.exepid process 3816 un385894.exe 3152 pro7049.exe 4784 qu0861.exe -
Processes:
pro7049.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7049.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
9822c127fc80592c825b15cc5c7e0465a27db986c30293dd0ca2fb0c6f9687e8.exeun385894.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9822c127fc80592c825b15cc5c7e0465a27db986c30293dd0ca2fb0c6f9687e8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un385894.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3124 3152 WerFault.exe pro7049.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu0861.exe9822c127fc80592c825b15cc5c7e0465a27db986c30293dd0ca2fb0c6f9687e8.exeun385894.exepro7049.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0861.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9822c127fc80592c825b15cc5c7e0465a27db986c30293dd0ca2fb0c6f9687e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un385894.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7049.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7049.exepid process 3152 pro7049.exe 3152 pro7049.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7049.exequ0861.exedescription pid process Token: SeDebugPrivilege 3152 pro7049.exe Token: SeDebugPrivilege 4784 qu0861.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
9822c127fc80592c825b15cc5c7e0465a27db986c30293dd0ca2fb0c6f9687e8.exeun385894.exedescription pid process target process PID 3760 wrote to memory of 3816 3760 9822c127fc80592c825b15cc5c7e0465a27db986c30293dd0ca2fb0c6f9687e8.exe un385894.exe PID 3760 wrote to memory of 3816 3760 9822c127fc80592c825b15cc5c7e0465a27db986c30293dd0ca2fb0c6f9687e8.exe un385894.exe PID 3760 wrote to memory of 3816 3760 9822c127fc80592c825b15cc5c7e0465a27db986c30293dd0ca2fb0c6f9687e8.exe un385894.exe PID 3816 wrote to memory of 3152 3816 un385894.exe pro7049.exe PID 3816 wrote to memory of 3152 3816 un385894.exe pro7049.exe PID 3816 wrote to memory of 3152 3816 un385894.exe pro7049.exe PID 3816 wrote to memory of 4784 3816 un385894.exe qu0861.exe PID 3816 wrote to memory of 4784 3816 un385894.exe qu0861.exe PID 3816 wrote to memory of 4784 3816 un385894.exe qu0861.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9822c127fc80592c825b15cc5c7e0465a27db986c30293dd0ca2fb0c6f9687e8.exe"C:\Users\Admin\AppData\Local\Temp\9822c127fc80592c825b15cc5c7e0465a27db986c30293dd0ca2fb0c6f9687e8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385894.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385894.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7049.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7049.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 10844⤵
- Program crash
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0861.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0861.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3152 -ip 31521⤵PID:4364
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD56a6476ae27873553aa207ec277de654d
SHA1acbf6065ab6e5c3f4fd2be8e8fd2c323aac65b72
SHA256f5db1201bd370a486c5046aa35e2d272ab7ce976ccd349b2fca8f957441dfcd6
SHA5122a20f59e7dabb4e3f150e222d2df8ab7095fe75a87c4579b69e8a9035da09f20ee702dbffa55f51582a14dd41d1a4eafe91795c5972c20326c0508cb01b47d1b
-
Filesize
260KB
MD5666a35595eb11a7beb470446e04743f5
SHA1d7911053cd35d5a3dc3b95a821a70b4b72f5e321
SHA256b587cce3616824ffbe839b2f6b81560930b02dc179aaa9d3868dc99763828567
SHA5128c009b0aab1ac1615af18d0cf140fd2290fb1e98286bc6537612ebfa52997fbef98067f5f5a03b17a35a6ced8ef546ff4d07739d6fdd02ac53b05e07fe340f71
-
Filesize
319KB
MD578a82cc9a7c758a98aaf1354f6fe39b3
SHA1007568a9cc2f3e6bd9df83461333d51de4c38327
SHA256d75ca3cc6066978b67eff780395fa2c83208516ce1cb878584056480d68f68a2
SHA5122290989a5c82d7df4c1b00c0599a04948f019a646bc943813372acc7b719a3bb8c247832663d1aaceaca7f9b263512573d7b86f02b23ec7d43b8c13e516a2dc9