Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 13:31
Static task
static1
Behavioral task
behavioral1
Sample
d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f.exe
Resource
win10v2004-20241007-en
General
-
Target
d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f.exe
-
Size
688KB
-
MD5
8e56bc06899a6270d60c2cae1f164cf3
-
SHA1
51df828999f0142bb34df665a306a2b769eae137
-
SHA256
d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f
-
SHA512
a3545ba1f993d9d2794b1e3fb744c72d58f050f763b356ebb41b8d60b8a62313f0bc833c647b1163a85a98014ba739f3336e1143427a2a7a87dff2af179a0a5f
-
SSDEEP
12288:GMrGy90pPRfGqcK+W/BqPA2+xfDXlda4T+pIFNMtpXga+RHM4:EyURfGqcK+AB+Avxr/aG1jM/ga+Rs4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2896-19-0x0000000002770000-0x000000000278A000-memory.dmp healer behavioral1/memory/2896-21-0x0000000002860000-0x0000000002878000-memory.dmp healer behavioral1/memory/2896-44-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2896-37-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2896-49-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2896-47-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2896-45-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2896-41-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2896-39-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2896-35-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2896-33-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2896-31-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2896-29-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2896-27-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2896-25-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2896-23-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2896-22-0x0000000002860000-0x0000000002872000-memory.dmp healer -
Healer family
-
Processes:
pro0661.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0661.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0661.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0661.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0661.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0661.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0661.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4480-61-0x0000000000B40000-0x0000000000B86000-memory.dmp family_redline behavioral1/memory/4480-62-0x00000000028D0000-0x0000000002914000-memory.dmp family_redline behavioral1/memory/4480-74-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-80-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-94-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-92-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-90-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-88-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-86-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-82-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-78-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-76-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-72-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-70-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-68-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-66-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-96-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-84-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-64-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline behavioral1/memory/4480-63-0x00000000028D0000-0x000000000290F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un367069.exepro0661.exequ5923.exepid process 2560 un367069.exe 2896 pro0661.exe 4480 qu5923.exe -
Processes:
pro0661.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0661.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0661.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f.exeun367069.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un367069.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3044 2896 WerFault.exe pro0661.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f.exeun367069.exepro0661.exequ5923.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un367069.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0661.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5923.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0661.exepid process 2896 pro0661.exe 2896 pro0661.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0661.exequ5923.exedescription pid process Token: SeDebugPrivilege 2896 pro0661.exe Token: SeDebugPrivilege 4480 qu5923.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f.exeun367069.exedescription pid process target process PID 1124 wrote to memory of 2560 1124 d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f.exe un367069.exe PID 1124 wrote to memory of 2560 1124 d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f.exe un367069.exe PID 1124 wrote to memory of 2560 1124 d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f.exe un367069.exe PID 2560 wrote to memory of 2896 2560 un367069.exe pro0661.exe PID 2560 wrote to memory of 2896 2560 un367069.exe pro0661.exe PID 2560 wrote to memory of 2896 2560 un367069.exe pro0661.exe PID 2560 wrote to memory of 4480 2560 un367069.exe qu5923.exe PID 2560 wrote to memory of 4480 2560 un367069.exe qu5923.exe PID 2560 wrote to memory of 4480 2560 un367069.exe qu5923.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f.exe"C:\Users\Admin\AppData\Local\Temp\d9572c79ead058c6f2e4d7a0c27714af1fd103c13275e6b4e4748416669ffd5f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367069.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367069.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0661.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0661.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 10804⤵
- Program crash
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5923.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5923.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2896 -ip 28961⤵PID:1816
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
534KB
MD524102bb4a73e009281320b1870210a13
SHA1f8c4a8f16bbe32149a380aed9fd62b5300024e2a
SHA2560b756ff5b1048ae718b98225d6d780251d36977607f43bc6912cada9d2a60a87
SHA5121c61972e93baf1f3dabcacf0f88d53570dd004548db865f6df01f4a9a6607c29d420be7ffc9f4a9655465d8a8480d2d098df6e83f58ead82ceb51453bb9625e0
-
Filesize
311KB
MD55664ce859230e92520ca154d991ad2f9
SHA1d0885b556347364d691314a0ce7870e7be5566bb
SHA256415c0f6a6288cbadc41d0ab60a400dfa5d30e4c3d97065956bba8f5fbf6629d0
SHA512bc7b675d38d3f53ea4534a42f189f3d541e6859cf1631683392a262bccdb1e9ab3f1e1b56d139408131338b172fa9bee10fced82c3fdf89f73b292a518920bf6
-
Filesize
370KB
MD586d6b856e54eba40a0aa602ccdd7c5ac
SHA15a2a97276393662caf49a53f6f75088f01165cef
SHA2561bb8261d6e30da5b84152f3b1d06014cdf3bb30692b738efb443b5e7b241fd3e
SHA5122c54a6ba9b30e040c93d18fa1abf012d2493fd74be31a6dee158e87f4ccdc17684abfc4e5ccbf283fea9be6716263ccae7b9244e1752b0f76a60762121d6d745