Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe
Resource
win10v2004-20241007-en
General
-
Target
01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe
-
Size
665KB
-
MD5
19863ecb232b3715e065ac78b562cd08
-
SHA1
666b8eab387f26ea5988f2c90bb0b795d223154f
-
SHA256
01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751
-
SHA512
ebc8d56bb568a558c70b13d7ce47465bff24602360efdee6637b06b528b0d37b03c949f37331612ecbd95e0e13adfdc4cb008547c59a3e2a996db30455bebe90
-
SSDEEP
12288:KMr0y90xYg9WHHIfJraVvO4Z8XNuZ67grosNPp3KcSsrUT7E/w/Oe8G2Jo1uXX:KyyiG9maXNuYgfH6cSsriSw/Ozp21uXX
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1076-19-0x0000000002760000-0x000000000277A000-memory.dmp healer behavioral1/memory/1076-21-0x0000000002800000-0x0000000002818000-memory.dmp healer behavioral1/memory/1076-35-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/1076-47-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/1076-46-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/1076-43-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/1076-41-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/1076-39-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/1076-37-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/1076-33-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/1076-49-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/1076-31-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/1076-29-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/1076-27-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/1076-25-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/1076-23-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/1076-22-0x0000000002800000-0x0000000002812000-memory.dmp healer -
Healer family
-
Processes:
pro8858.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8858.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8858.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2628-61-0x0000000002670000-0x00000000026B6000-memory.dmp family_redline behavioral1/memory/2628-62-0x00000000029E0000-0x0000000002A24000-memory.dmp family_redline behavioral1/memory/2628-70-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-74-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-96-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-94-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-92-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-90-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-86-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-84-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-82-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-80-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-78-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-72-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-88-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-76-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-68-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-66-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-64-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/2628-63-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un944525.exepro8858.exequ2498.exepid process 1704 un944525.exe 1076 pro8858.exe 2628 qu2498.exe -
Processes:
pro8858.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8858.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un944525.exe01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un944525.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5024 1076 WerFault.exe pro8858.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro8858.exequ2498.exe01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exeun944525.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8858.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2498.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un944525.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8858.exepid process 1076 pro8858.exe 1076 pro8858.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8858.exequ2498.exedescription pid process Token: SeDebugPrivilege 1076 pro8858.exe Token: SeDebugPrivilege 2628 qu2498.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exeun944525.exedescription pid process target process PID 2396 wrote to memory of 1704 2396 01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe un944525.exe PID 2396 wrote to memory of 1704 2396 01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe un944525.exe PID 2396 wrote to memory of 1704 2396 01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe un944525.exe PID 1704 wrote to memory of 1076 1704 un944525.exe pro8858.exe PID 1704 wrote to memory of 1076 1704 un944525.exe pro8858.exe PID 1704 wrote to memory of 1076 1704 un944525.exe pro8858.exe PID 1704 wrote to memory of 2628 1704 un944525.exe qu2498.exe PID 1704 wrote to memory of 2628 1704 un944525.exe qu2498.exe PID 1704 wrote to memory of 2628 1704 un944525.exe qu2498.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe"C:\Users\Admin\AppData\Local\Temp\01a8b3411735321192bb5911866d8e3b7bab6fa91bea6e8c4f96fcae46906751.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un944525.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un944525.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8858.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8858.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 10364⤵
- Program crash
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2498.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2498.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1076 -ip 10761⤵PID:3960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD508571fce1fa0b00e67a02735059f8a11
SHA1ce1e35dba2bfde2dfc2885def5be67aaddad3dbb
SHA2566f29d979f8f8f6009f54b4d3b7580c60f2ab787514e6892f3df039a154c101f7
SHA512fea7e22d9a0ff0f20b7f92a7a7694046f2dca9914f64dd5be7ec199861bc0778f1c0713a7acef99bc2880be2d978ffa6fdcb8b8bbc2c3ac250318e952e9352ba
-
Filesize
294KB
MD58113d19814223eff2576327d4a26fbda
SHA1224cfb28164f43b232d4d937a302e99222d7ae37
SHA25676c00da1904189b09f5c44238429e816232c1445822b26405dc4a3f6d47c5f0c
SHA512b33fc6c9834df0c29c5d90166c4e41f41f83cfaf38eb66f022265f0c29ab0272124dc0e51a919257ece13795df15405d42783e62461dbb8d5e76255d9e2f9722
-
Filesize
352KB
MD51f1807e74abb3357b26004afd8ed1a60
SHA15cdbc4f5fc10e3d6ece88de86dba99a7510a12f7
SHA256584a3323e20082d83dab4052a0f2e70b0cb56e5f3d6ceaec06d7f5e1a2776b9f
SHA5126a67f32ff0851d2d39371450763f35e971d531ba550bbca59fa262d01e6a2af6ebb70edefe2e67e046c97da095f1e9dcdc02ba6f7be2d9c3e14f987154374b5c