Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 13:32
Static task
static1
Behavioral task
behavioral1
Sample
6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486.exe
Resource
win10v2004-20241007-en
General
-
Target
6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486.exe
-
Size
659KB
-
MD5
2a9bca58b055d33fc43f5cee5b7b5d25
-
SHA1
d5677a19eaf7c4d4eabd3e6140354521324defa4
-
SHA256
6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486
-
SHA512
a1bf4b1a01754cc37aeaa8681df81aac249be5d7339cda199397bb08938fcb92b339bcf3538775dd236edb409fdbe32a9c56ff45e41a87c3e398d1d34083d7cc
-
SSDEEP
12288:EMrsy90rQV99VWw9aV2wh9m19gND8fkHvrVbhUWK4IT43QmjXDH:wypV39aV269m19gND8fkHvrV1dqjmjX7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4540-18-0x00000000048A0000-0x00000000048BA000-memory.dmp healer behavioral1/memory/4540-20-0x0000000004B90000-0x0000000004BA8000-memory.dmp healer behavioral1/memory/4540-30-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4540-48-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4540-46-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4540-44-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4540-42-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4540-40-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4540-38-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4540-36-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4540-34-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4540-32-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4540-28-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4540-26-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4540-24-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4540-22-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4540-21-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer -
Healer family
-
Processes:
pro8028.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8028.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8028.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2372-60-0x00000000070D0000-0x0000000007116000-memory.dmp family_redline behavioral1/memory/2372-61-0x0000000007750000-0x0000000007794000-memory.dmp family_redline behavioral1/memory/2372-75-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-79-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-95-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-93-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-91-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-89-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-87-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-85-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-83-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-81-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-77-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-73-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-71-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-69-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-67-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-65-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-63-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/2372-62-0x0000000007750000-0x000000000778F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un205232.exepro8028.exequ4631.exepid process 3232 un205232.exe 4540 pro8028.exe 2372 qu4631.exe -
Processes:
pro8028.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8028.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486.exeun205232.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un205232.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1412 4540 WerFault.exe pro8028.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro8028.exequ4631.exe6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486.exeun205232.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4631.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un205232.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8028.exepid process 4540 pro8028.exe 4540 pro8028.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8028.exequ4631.exedescription pid process Token: SeDebugPrivilege 4540 pro8028.exe Token: SeDebugPrivilege 2372 qu4631.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486.exeun205232.exedescription pid process target process PID 2384 wrote to memory of 3232 2384 6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486.exe un205232.exe PID 2384 wrote to memory of 3232 2384 6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486.exe un205232.exe PID 2384 wrote to memory of 3232 2384 6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486.exe un205232.exe PID 3232 wrote to memory of 4540 3232 un205232.exe pro8028.exe PID 3232 wrote to memory of 4540 3232 un205232.exe pro8028.exe PID 3232 wrote to memory of 4540 3232 un205232.exe pro8028.exe PID 3232 wrote to memory of 2372 3232 un205232.exe qu4631.exe PID 3232 wrote to memory of 2372 3232 un205232.exe qu4631.exe PID 3232 wrote to memory of 2372 3232 un205232.exe qu4631.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486.exe"C:\Users\Admin\AppData\Local\Temp\6e9e09752523fef4062c99eff8ecf2dcf562d1206d5619b34cc547744fa25486.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un205232.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un205232.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8028.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8028.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 10924⤵
- Program crash
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4631.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4631.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4540 -ip 45401⤵PID:1704
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5a265e6afba363f7859c7dd33d4e41b48
SHA1b5aded91df19082b48d244033102721a91f88f24
SHA256d1779cb8ea0cb8194c222e48d0e49af32218080c858601a0054193776236848d
SHA512f7f97cacbecff9da474e576246e3e518676731a3fc6eb5c6126a6c3caf4de172758139c90869e2bf346b9b5ecbed902b34a5ae0641626671694afa59b5b3803a
-
Filesize
284KB
MD5e727f2de9b455b9d50dfc5afc47250e4
SHA1c05f3684321d1400f2ec82f440693040fe2854d4
SHA256399b04cc48eaf3d8232ecd67bbb661e43c0c26fcb1ecd5d9bb512680c499fafd
SHA512a453629202bcd80c40332efd0bb6ad48a74cb9e103262f5c6ca2547e2fe7d0d7d3d4832ef08604367138ae1149b2e8cb91d6cab7f8e021eab2dc5263186f39ce
-
Filesize
342KB
MD5f9effeca5f545b85b601e972fd38dece
SHA16dab79cc2dfc9327d50ced306100eb4b0df1fd67
SHA25630896457379c8227a3832f7b22c8cf3f60aecb12c945601d6bd00abb9a6127d6
SHA512e2f11d03019b45a3e89ae583246e5bf92c4c00186ea148212efb002b22567cba5c7b4a18fce5fa82c99ee2d8aea6829dd551c59128ea1ff8518a630b9552de75