Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:54
Static task
static1
Behavioral task
behavioral1
Sample
325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exe
Resource
win10v2004-20241007-en
General
-
Target
325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exe
-
Size
658KB
-
MD5
d93d0bc1ed0cc99097245fb5ff3561ee
-
SHA1
df3ab8a48517ed615626e6dae383502c20500d54
-
SHA256
325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36
-
SHA512
a3e5570a360f358ca9bc65fba3f8d6fd236c8f2d1703caa300c1a8ac8a5e052f79aafc92004d8b4a0bee909474401b1192cd39be360a1d95e320eb3ebccde97a
-
SSDEEP
12288:4Mrdy90hWzutru/Byd5pK3FkyU8BRi9j0XTYKjFQoqBiPed6hbfxgy:lycruZyd+3yJ8BRW+5RQDtUhdgy
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2292-17-0x0000000004900000-0x000000000491A000-memory.dmp healer behavioral1/memory/2292-19-0x0000000004DC0000-0x0000000004DD8000-memory.dmp healer behavioral1/memory/2292-34-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/2292-46-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/2292-48-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/2292-44-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/2292-42-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/2292-40-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/2292-38-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/2292-36-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/2292-32-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/2292-30-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/2292-29-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/2292-26-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/2292-24-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/2292-22-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer behavioral1/memory/2292-21-0x0000000004DC0000-0x0000000004DD2000-memory.dmp healer -
Healer family
-
Processes:
pro6077.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6077.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6077.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4016-59-0x0000000007090000-0x00000000070D6000-memory.dmp family_redline behavioral1/memory/4016-60-0x0000000007720000-0x0000000007764000-memory.dmp family_redline behavioral1/memory/4016-82-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-94-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-92-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-90-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-88-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-86-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-84-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-80-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-78-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-76-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-74-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-72-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-70-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-68-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-66-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-64-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-62-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4016-61-0x0000000007720000-0x000000000775F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un454984.exepro6077.exequ7365.exepid process 392 un454984.exe 2292 pro6077.exe 4016 qu7365.exe -
Processes:
pro6077.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6077.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un454984.exe325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un454984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 536 2292 WerFault.exe pro6077.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exeun454984.exepro6077.exequ7365.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un454984.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6077.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7365.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6077.exepid process 2292 pro6077.exe 2292 pro6077.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6077.exequ7365.exedescription pid process Token: SeDebugPrivilege 2292 pro6077.exe Token: SeDebugPrivilege 4016 qu7365.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exeun454984.exedescription pid process target process PID 3296 wrote to memory of 392 3296 325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exe un454984.exe PID 3296 wrote to memory of 392 3296 325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exe un454984.exe PID 3296 wrote to memory of 392 3296 325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exe un454984.exe PID 392 wrote to memory of 2292 392 un454984.exe pro6077.exe PID 392 wrote to memory of 2292 392 un454984.exe pro6077.exe PID 392 wrote to memory of 2292 392 un454984.exe pro6077.exe PID 392 wrote to memory of 4016 392 un454984.exe qu7365.exe PID 392 wrote to memory of 4016 392 un454984.exe qu7365.exe PID 392 wrote to memory of 4016 392 un454984.exe qu7365.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exe"C:\Users\Admin\AppData\Local\Temp\325a76c8f45ce1d402f17e288e2b95210f480d2a6bf25ab2910949675846ac36.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un454984.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un454984.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6077.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6077.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 10884⤵
- Program crash
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7365.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7365.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2292 -ip 22921⤵PID:3924
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5709245354694f05cecfcfce4c4a960e9
SHA10c2c549155a95364751a13dc8538829d2d222a26
SHA256147a0c0eae614b72f325ac61b3f9b34ae0729804f0659fec83e71534e73ce5e0
SHA5127bb4d3a134f1cf82dfd3043777114d923bf92aec1a444a8b6bbf6dbe65676442fe62b7a90417286859792520b971d909d3e081627cbdf8505b73b77d95238d96
-
Filesize
295KB
MD5502cdc1d065246afafcad73e2df58763
SHA18e017873d6b66c9a228013353e073bf20e1cd2c1
SHA256565798380fb35ca27ce15526bac1dff24e4151c0bae16748ae2b94e61b38417e
SHA5122162e55f9b30b79760e55c7e204e08469211bed387dd1aa364ca6ea12ec352c03101df9a2abc2fb8c6ff0668456fa6e3b2643365926e21900409d0c96255080b
-
Filesize
354KB
MD5a59ac118f99e8302bbf0f42e47b49c37
SHA1aa401375319ed6cddc5ea2d9eb11bc9445926b3a
SHA2563313051b78b8860321d3f81ce9ef4be881cb00696d98d21049d195820c604f74
SHA512dd99edd9e45b20894356a38a20a259c3456b965b2542b62b629361dc8bef6a69ee4f14a6da4123ecf6b65cedb49666accd7363c499a561675c9b42438866082d