Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805.exe
Resource
win10v2004-20241007-en
General
-
Target
d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805.exe
-
Size
662KB
-
MD5
0d969de928b2ce43172d0d1eb7827309
-
SHA1
33b50c3fb52424cd9bac6c448835ae7539868df6
-
SHA256
d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805
-
SHA512
633cd76e6f595acec0c42a7b62ec94b2c602515fc79ed545e680ab5662eb55a7c387a6500cd7c687993a9a24b53514058acaa0089260d9fce326e64ca3a8c88c
-
SSDEEP
12288:xMr1y90zq/5ok7eA8l2ANSv3BkQom2qCkY69Rm1zdMv8Dj:cyYnNfQom2qCOmBbDj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/824-19-0x0000000002490000-0x00000000024AA000-memory.dmp healer behavioral1/memory/824-21-0x00000000024F0000-0x0000000002508000-memory.dmp healer behavioral1/memory/824-23-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/824-49-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/824-47-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/824-45-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/824-43-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/824-41-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/824-39-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/824-37-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/824-35-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/824-33-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/824-31-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/824-29-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/824-27-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/824-25-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/824-22-0x00000000024F0000-0x0000000002502000-memory.dmp healer -
Healer family
-
Processes:
pro0875.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0875.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0875.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0875.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0875.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0875.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0875.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1976-60-0x0000000002610000-0x0000000002656000-memory.dmp family_redline behavioral1/memory/1976-61-0x0000000002690000-0x00000000026D4000-memory.dmp family_redline behavioral1/memory/1976-85-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-87-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-95-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-93-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-91-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-83-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-81-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-79-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-77-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-75-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-73-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-71-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-67-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-65-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-89-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-69-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-63-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/1976-62-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un670424.exepro0875.exequ7083.exepid process 1812 un670424.exe 824 pro0875.exe 1976 qu7083.exe -
Processes:
pro0875.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0875.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0875.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805.exeun670424.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un670424.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805.exeun670424.exepro0875.exequ7083.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un670424.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0875.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7083.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0875.exepid process 824 pro0875.exe 824 pro0875.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0875.exequ7083.exedescription pid process Token: SeDebugPrivilege 824 pro0875.exe Token: SeDebugPrivilege 1976 qu7083.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805.exeun670424.exedescription pid process target process PID 2192 wrote to memory of 1812 2192 d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805.exe un670424.exe PID 2192 wrote to memory of 1812 2192 d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805.exe un670424.exe PID 2192 wrote to memory of 1812 2192 d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805.exe un670424.exe PID 1812 wrote to memory of 824 1812 un670424.exe pro0875.exe PID 1812 wrote to memory of 824 1812 un670424.exe pro0875.exe PID 1812 wrote to memory of 824 1812 un670424.exe pro0875.exe PID 1812 wrote to memory of 1976 1812 un670424.exe qu7083.exe PID 1812 wrote to memory of 1976 1812 un670424.exe qu7083.exe PID 1812 wrote to memory of 1976 1812 un670424.exe qu7083.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805.exe"C:\Users\Admin\AppData\Local\Temp\d0a2254116f2cd7a4918d793d1d55c5d9f8aca1b6070e3bab8386888c523c805.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un670424.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un670424.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0875.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0875.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7083.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7083.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD50c7c653bb16db8e1ba87de9e84aa8e87
SHA16c420a73581f6baac510d5666b321f184545310f
SHA256893c971061cd19c317596d519e750d3fba1e0c67436c2372d4ff0b3b0fd5617b
SHA512915af0141f1d690e500b1bbd4eaeb8f8ee0479a88babe27b3eadbe874f1371a777c4fdecdbddcd43b8a7a550a74ddb908de58fc2aa428f68b06b6dcb66b9beb4
-
Filesize
236KB
MD5538d1a947d6c6521266f7e918d16ba8c
SHA151148dbc5cb89a293cf5e9d944292614d4994321
SHA256e1cb8add06f7c6483929fd2aa0d2ad504abd7e509904c4b596ba6769cd139d08
SHA512be92772331c456e4e8d6c76ba1ee20329279f08d8dc69c0cdf6389f46aeecac3c0a97ebbce14cb69f2b7f6d78e0f9789cf21f405feb6b6b91412d13c31979504
-
Filesize
295KB
MD53903ea83a7c104511a39d73d9198e8b6
SHA177796e68a0f8d9d71afb725a4ecb0f9224ebfef2
SHA256aca5d7b66fc135a4a234847a9ee383b6694014be65cbbea9a64fcc77203b66de
SHA51266e2ac988537cf21920248c4f15b69c3cda0b191a9855e89525ee377686ed319882ae381233b90091f0c0d9412f58b01e64c9cab154fb81002e69235a0979f2e