Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:23
Static task
static1
Behavioral task
behavioral1
Sample
01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exe
Resource
win10v2004-20241007-en
General
-
Target
01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exe
-
Size
671KB
-
MD5
2e25ca50731f7badc86f47ba28dee1e0
-
SHA1
18d365cca7954061d1b00ec7e17e539b1cfb1925
-
SHA256
01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07
-
SHA512
04936ed01e8ba3d313036d0478a08a9f705ae0f6a6502e7829c6b7f8ea528dce36de26a2ba149bd0fa4454e2a7b36a818b87cc6046125e5d369c0c9c7a899e35
-
SSDEEP
12288:uMrvy90/u+M00R8NhmCf+kPHrTKAhbVTJXmCJRz7dEMXfA:tybv0TPX/bVT8Mfdfo
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1216-19-0x00000000049B0000-0x00000000049CA000-memory.dmp healer behavioral1/memory/1216-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/1216-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1216-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1216-48-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1216-46-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1216-43-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1216-42-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1216-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1216-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1216-36-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1216-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1216-31-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1216-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1216-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1216-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1216-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
Processes:
pro1329.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1329.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3724-60-0x00000000023B0000-0x00000000023F6000-memory.dmp family_redline behavioral1/memory/3724-61-0x0000000002650000-0x0000000002694000-memory.dmp family_redline behavioral1/memory/3724-71-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-75-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-95-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-93-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-91-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-89-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-85-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-83-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-81-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-79-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-77-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-73-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-69-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-87-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-67-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-65-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-63-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/3724-62-0x0000000002650000-0x000000000268F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un621023.exepro1329.exequ7449.exepid process 3736 un621023.exe 1216 pro1329.exe 3724 qu7449.exe -
Processes:
pro1329.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1329.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exeun621023.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un621023.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4240 1216 WerFault.exe pro1329.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro1329.exequ7449.exe01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exeun621023.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1329.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7449.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un621023.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1329.exepid process 1216 pro1329.exe 1216 pro1329.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1329.exequ7449.exedescription pid process Token: SeDebugPrivilege 1216 pro1329.exe Token: SeDebugPrivilege 3724 qu7449.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exeun621023.exedescription pid process target process PID 3800 wrote to memory of 3736 3800 01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exe un621023.exe PID 3800 wrote to memory of 3736 3800 01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exe un621023.exe PID 3800 wrote to memory of 3736 3800 01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exe un621023.exe PID 3736 wrote to memory of 1216 3736 un621023.exe pro1329.exe PID 3736 wrote to memory of 1216 3736 un621023.exe pro1329.exe PID 3736 wrote to memory of 1216 3736 un621023.exe pro1329.exe PID 3736 wrote to memory of 3724 3736 un621023.exe qu7449.exe PID 3736 wrote to memory of 3724 3736 un621023.exe qu7449.exe PID 3736 wrote to memory of 3724 3736 un621023.exe qu7449.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exe"C:\Users\Admin\AppData\Local\Temp\01e5fa888633b4c45a22ea0a011ea37c4935a2660cb9654605c2927946edfc07.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un621023.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un621023.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1329.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1329.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 10844⤵
- Program crash
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7449.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7449.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1216 -ip 12161⤵PID:3536
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5853c0b9b50bda76bf13c19ef950e160d
SHA1c93190f122466e70c0ccc3fee2f94fb3b8d7a0b3
SHA2563237ce6c3645a2677c233ec33bcdef87b19659e314d438bfafa055e0233b2387
SHA5124ea44652168ffe7dfd1cceb071c7227baed5a97ccdcf90931756090eee3a594bb04f449530d12efe59144f45336a2136e14f5f1aadbc1d3a8d9d03e129d0bd63
-
Filesize
237KB
MD578e3e94cead295cffb83b10d9190a4b9
SHA1b0d68cefeab1b3ef9c303d537b4127a088c9ee93
SHA256d5c41fea142a2dd008d3b8401609cd88bf86057a5469b4a238cfd48a7ffb8009
SHA51297927198cdc05fd9bad1b2746950e787cd8eee884d9a8535b7d1aff11ae0012b609282d116e60259f93fc1a067de6a86cf336e6d5819fa91ed661195248bdece
-
Filesize
295KB
MD520420ac65c16d629e9c8bb91bf9f6283
SHA16c81b7a7d7a91e3e69f478dd8f04b2871faf012c
SHA256122681634a9b72ee1be6a9441c71ae627751d4ff4dad5591c059ecf17e01454d
SHA512b1f896cd0bf9c62f536dc8994f9456039c99fe4053ea228ff44b9194f421aae226d40e226d803a6c4453e82e61e96ba4891f2f750fea406c4e475f4d35a83a62