Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:50
Static task
static1
Behavioral task
behavioral1
Sample
ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exe
Resource
win10v2004-20241007-en
General
-
Target
ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exe
-
Size
671KB
-
MD5
35be64d704dad823673f061ad3ac88c6
-
SHA1
29110f86cbce9c5d114f52c7a0e8f7eb387a1aaf
-
SHA256
ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9
-
SHA512
62cc30c63838a05a9bf2e00d4041ab3305357edda5c71043e6b12200814a23f258f12642796be6a6895a540950555b8603b6def3b08508de56c9a4759bd8c450
-
SSDEEP
12288:UMrCy90F8uq0BOwoW9WI2tOigj3yoNZyAjKb252UVM3Lq0zyph37vq:eyMJxJigGaE5UVM3G0+phLq
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4764-18-0x0000000003900000-0x000000000391A000-memory.dmp healer behavioral1/memory/4764-20-0x0000000003BD0000-0x0000000003BE8000-memory.dmp healer behavioral1/memory/4764-49-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer behavioral1/memory/4764-47-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer behavioral1/memory/4764-45-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer behavioral1/memory/4764-43-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer behavioral1/memory/4764-41-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer behavioral1/memory/4764-39-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer behavioral1/memory/4764-37-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer behavioral1/memory/4764-35-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer behavioral1/memory/4764-33-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer behavioral1/memory/4764-31-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer behavioral1/memory/4764-29-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer behavioral1/memory/4764-27-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer behavioral1/memory/4764-25-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer behavioral1/memory/4764-23-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer behavioral1/memory/4764-22-0x0000000003BD0000-0x0000000003BE2000-memory.dmp healer -
Healer family
-
Processes:
pro4153.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4153.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1532-61-0x0000000003A30000-0x0000000003A76000-memory.dmp family_redline behavioral1/memory/1532-62-0x00000000060D0000-0x0000000006114000-memory.dmp family_redline behavioral1/memory/1532-64-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-80-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-96-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-94-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-92-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-90-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-88-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-86-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-82-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-78-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-76-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-74-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-72-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-70-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-68-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-66-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-84-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline behavioral1/memory/1532-63-0x00000000060D0000-0x000000000610F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un588005.exepro4153.exequ1894.exepid process 4932 un588005.exe 4764 pro4153.exe 1532 qu1894.exe -
Processes:
pro4153.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4153.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exeun588005.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un588005.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3408 4764 WerFault.exe pro4153.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exeun588005.exepro4153.exequ1894.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un588005.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4153.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1894.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4153.exepid process 4764 pro4153.exe 4764 pro4153.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4153.exequ1894.exedescription pid process Token: SeDebugPrivilege 4764 pro4153.exe Token: SeDebugPrivilege 1532 qu1894.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exeun588005.exedescription pid process target process PID 4508 wrote to memory of 4932 4508 ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exe un588005.exe PID 4508 wrote to memory of 4932 4508 ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exe un588005.exe PID 4508 wrote to memory of 4932 4508 ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exe un588005.exe PID 4932 wrote to memory of 4764 4932 un588005.exe pro4153.exe PID 4932 wrote to memory of 4764 4932 un588005.exe pro4153.exe PID 4932 wrote to memory of 4764 4932 un588005.exe pro4153.exe PID 4932 wrote to memory of 1532 4932 un588005.exe qu1894.exe PID 4932 wrote to memory of 1532 4932 un588005.exe qu1894.exe PID 4932 wrote to memory of 1532 4932 un588005.exe qu1894.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exe"C:\Users\Admin\AppData\Local\Temp\ad6757d9b2ae887286605d67e7a32c1910fb59f9488d68376a6b22de29d152b9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588005.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588005.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4153.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4153.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 9844⤵
- Program crash
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1894.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1894.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4764 -ip 47641⤵PID:2512
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
530KB
MD5a15505e2f695b00a7a4eb9177684c5d6
SHA1edb04860ecacb7408f94588a8f9bf2c8173d1f2b
SHA25614e15b2d4cf62face8606b31e2cf6e7148bf6d316131ac637375b64ef2e502b3
SHA51207e2ba9cff6947a738d3628e34e28a736aa0faac3c5fabb3bd667aceda427363e68f2fdb0a08b5ee902eff7a2b4140b4f1f3ec4c42523aac6512cf96b648e813
-
Filesize
301KB
MD5bb272c221ff897208f8ca583924ca492
SHA1330107dc0ecfca8bbec935b902568c0915cb17ee
SHA25614be1814a654d38c4a5ff720cb419e1fb47273a80a9c2914e64768aac310da17
SHA512b6576f8ea9447f0a4274833c9d2a8c89499cc369f6578d969871853925498b9541b9bcbd8e6c59671fd77f8a2f8a0483b5778cc089b310683bbad5e7410aa98e
-
Filesize
359KB
MD5f948b0ba3c2a4bf8623d0922f96a2360
SHA1adaba51c78a8a5cbca3684fa8d310aff2afa8a44
SHA256913c31df2ed22d2153e9cf13da3b262dadd6be8587e6b1911b6e3ccbe727caf2
SHA512b10af21f676aa797eb84248a2223238ada3195bd22f7dc13eface4f28cc37e385cdd961a078cc89ba48b81313a01a624e2c627ee17d3b4ca3066199b3b6bc17b