Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 11:50
Static task
static1
Behavioral task
behavioral1
Sample
408adbe22d34af4e1b333100cc14188113fadc1c1da7575f3c900cbb88f76af9.exe
Resource
win10v2004-20241007-en
General
-
Target
408adbe22d34af4e1b333100cc14188113fadc1c1da7575f3c900cbb88f76af9.exe
-
Size
673KB
-
MD5
421db404d0fd62e433c09bcdf51671d4
-
SHA1
50602d6891256dbfd68c5a05a2d0c6ebce0280f9
-
SHA256
408adbe22d34af4e1b333100cc14188113fadc1c1da7575f3c900cbb88f76af9
-
SHA512
33f4c90fb4251361a977df4e5e85e801bd1b69602adea72cb7a438a6e1263d27f0a652134fbcdf7f35f62b27e2a5c9913398af0ed653601fc54d7ba9d54b65a6
-
SSDEEP
12288:2Mr+y90RP/4HAgdimCfI6mbc/nuProdJyomlU+Y/2aOpT:kyCnEvyCcWcdJyoUo4N
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1508-19-0x0000000002490000-0x00000000024AA000-memory.dmp healer behavioral1/memory/1508-21-0x00000000024F0000-0x0000000002508000-memory.dmp healer behavioral1/memory/1508-49-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1508-48-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1508-45-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1508-43-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1508-41-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1508-39-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1508-37-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1508-35-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1508-33-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1508-31-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1508-29-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1508-27-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1508-25-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1508-23-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/1508-22-0x00000000024F0000-0x0000000002502000-memory.dmp healer -
Healer family
-
Processes:
pro5337.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5337.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5337.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3576-60-0x0000000002310000-0x0000000002356000-memory.dmp family_redline behavioral1/memory/3576-61-0x0000000005070000-0x00000000050B4000-memory.dmp family_redline behavioral1/memory/3576-87-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-95-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-93-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-91-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-89-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-85-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-83-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-81-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-79-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-77-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-73-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-71-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-76-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-69-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-67-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-65-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-63-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/3576-62-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un975435.exepro5337.exequ5206.exepid process 2940 un975435.exe 1508 pro5337.exe 3576 qu5206.exe -
Processes:
pro5337.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5337.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
408adbe22d34af4e1b333100cc14188113fadc1c1da7575f3c900cbb88f76af9.exeun975435.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 408adbe22d34af4e1b333100cc14188113fadc1c1da7575f3c900cbb88f76af9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un975435.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3952 1508 WerFault.exe pro5337.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
408adbe22d34af4e1b333100cc14188113fadc1c1da7575f3c900cbb88f76af9.exeun975435.exepro5337.exequ5206.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 408adbe22d34af4e1b333100cc14188113fadc1c1da7575f3c900cbb88f76af9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un975435.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5337.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5206.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro5337.exepid process 1508 pro5337.exe 1508 pro5337.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro5337.exequ5206.exedescription pid process Token: SeDebugPrivilege 1508 pro5337.exe Token: SeDebugPrivilege 3576 qu5206.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
408adbe22d34af4e1b333100cc14188113fadc1c1da7575f3c900cbb88f76af9.exeun975435.exedescription pid process target process PID 3948 wrote to memory of 2940 3948 408adbe22d34af4e1b333100cc14188113fadc1c1da7575f3c900cbb88f76af9.exe un975435.exe PID 3948 wrote to memory of 2940 3948 408adbe22d34af4e1b333100cc14188113fadc1c1da7575f3c900cbb88f76af9.exe un975435.exe PID 3948 wrote to memory of 2940 3948 408adbe22d34af4e1b333100cc14188113fadc1c1da7575f3c900cbb88f76af9.exe un975435.exe PID 2940 wrote to memory of 1508 2940 un975435.exe pro5337.exe PID 2940 wrote to memory of 1508 2940 un975435.exe pro5337.exe PID 2940 wrote to memory of 1508 2940 un975435.exe pro5337.exe PID 2940 wrote to memory of 3576 2940 un975435.exe qu5206.exe PID 2940 wrote to memory of 3576 2940 un975435.exe qu5206.exe PID 2940 wrote to memory of 3576 2940 un975435.exe qu5206.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\408adbe22d34af4e1b333100cc14188113fadc1c1da7575f3c900cbb88f76af9.exe"C:\Users\Admin\AppData\Local\Temp\408adbe22d34af4e1b333100cc14188113fadc1c1da7575f3c900cbb88f76af9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un975435.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un975435.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5337.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5337.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 10804⤵
- Program crash
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5206.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5206.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1508 -ip 15081⤵PID:4584
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD52ec752f3c974f1b32e636571c66702ff
SHA19305f3b7521fdbd7b6e593b36e7dbef8b205875d
SHA256cc44ab51e76d6e0f10d00e489e071179148a43640de53f5ec373b9d412854f0a
SHA512c0ad59be5cedafece4c492e7334a74b8fc9b20fa0c177221e16e837d5018a117ea9a1a9aa916d4cc6cd1f90f0741281cc8cb760e13b1228cde9611699ccbe606
-
Filesize
259KB
MD592115d9a25fb0024802a223fda76edfb
SHA10b1f1f519f26b067ab001a66614a82a5759b3cb4
SHA256325c262814b20b59d112a8ca7bacae763089658e2e2c8eafb307305f7961f076
SHA512b51344d51a4c2ceebd21d5ba9bf5085105d0dbdc167833821e560f787c29bf4979cc1ae3c8cb9cab0aa078818b6b9eb333e81dc5c29c1a0761fc8476fff9b0a8
-
Filesize
318KB
MD50eaa45109572d57391dd11a3ca460beb
SHA1f4f997a8c71bfb18861964f52dc60ab42b6efaa4
SHA256a494ae538b9f6a815d3beed7ced63f7f553fae3fcd9ae5fdb00590c86ed1eceb
SHA5128e5a259e3ff3140df29cb5e96e776de5bb7eb7da7b89dc0afb28d40975b58910ab98a1c6e32fba2d479736991a9d73c8542a562f13cbce301017b8a1a8488c79