Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 15:45
Static task
static1
Behavioral task
behavioral1
Sample
2287999aabbf4cf0d5776403de9417550d2d888a571b543432d3e4e003519cee.exe
Resource
win10v2004-20241007-en
General
-
Target
2287999aabbf4cf0d5776403de9417550d2d888a571b543432d3e4e003519cee.exe
-
Size
659KB
-
MD5
b8bd28335f13e196b34cd87c0d7bd219
-
SHA1
367e89ad92c0eb577a71e7aca21b15cec344a912
-
SHA256
2287999aabbf4cf0d5776403de9417550d2d888a571b543432d3e4e003519cee
-
SHA512
395d211ad49bcd5e08f7e522413f82980285a848f3fd0d6a95c6cd619962268e849101bd0b5fa6611b28ce988ff33a121bf64f9cba700f3a82a68f80d32ef175
-
SSDEEP
12288:7MrIy90gwtk/SLkSTXgv8oID2mzIG2YbNvPurZXTtKj/QoqBi2iC5ax:rykdpTQeh2rpQDQDTiC5i
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/184-18-0x0000000004AE0000-0x0000000004AFA000-memory.dmp healer behavioral1/memory/184-20-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/184-48-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/184-46-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/184-44-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/184-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/184-40-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/184-38-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/184-36-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/184-34-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/184-32-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/184-30-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/184-28-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/184-26-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/184-24-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/184-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/184-21-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro9898.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9898.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9898.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4564-60-0x0000000004D30000-0x0000000004D76000-memory.dmp family_redline behavioral1/memory/4564-61-0x0000000007720000-0x0000000007764000-memory.dmp family_redline behavioral1/memory/4564-73-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-95-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-93-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-91-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-89-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-87-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-85-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-83-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-81-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-79-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-77-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-75-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-71-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-69-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-67-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-65-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-63-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/4564-62-0x0000000007720000-0x000000000775F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un301206.exepro9898.exequ1707.exepid process 2804 un301206.exe 184 pro9898.exe 4564 qu1707.exe -
Processes:
pro9898.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9898.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2287999aabbf4cf0d5776403de9417550d2d888a571b543432d3e4e003519cee.exeun301206.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2287999aabbf4cf0d5776403de9417550d2d888a571b543432d3e4e003519cee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un301206.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3288 184 WerFault.exe pro9898.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu1707.exe2287999aabbf4cf0d5776403de9417550d2d888a571b543432d3e4e003519cee.exeun301206.exepro9898.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2287999aabbf4cf0d5776403de9417550d2d888a571b543432d3e4e003519cee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un301206.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9898.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9898.exepid process 184 pro9898.exe 184 pro9898.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9898.exequ1707.exedescription pid process Token: SeDebugPrivilege 184 pro9898.exe Token: SeDebugPrivilege 4564 qu1707.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2287999aabbf4cf0d5776403de9417550d2d888a571b543432d3e4e003519cee.exeun301206.exedescription pid process target process PID 1828 wrote to memory of 2804 1828 2287999aabbf4cf0d5776403de9417550d2d888a571b543432d3e4e003519cee.exe un301206.exe PID 1828 wrote to memory of 2804 1828 2287999aabbf4cf0d5776403de9417550d2d888a571b543432d3e4e003519cee.exe un301206.exe PID 1828 wrote to memory of 2804 1828 2287999aabbf4cf0d5776403de9417550d2d888a571b543432d3e4e003519cee.exe un301206.exe PID 2804 wrote to memory of 184 2804 un301206.exe pro9898.exe PID 2804 wrote to memory of 184 2804 un301206.exe pro9898.exe PID 2804 wrote to memory of 184 2804 un301206.exe pro9898.exe PID 2804 wrote to memory of 4564 2804 un301206.exe qu1707.exe PID 2804 wrote to memory of 4564 2804 un301206.exe qu1707.exe PID 2804 wrote to memory of 4564 2804 un301206.exe qu1707.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2287999aabbf4cf0d5776403de9417550d2d888a571b543432d3e4e003519cee.exe"C:\Users\Admin\AppData\Local\Temp\2287999aabbf4cf0d5776403de9417550d2d888a571b543432d3e4e003519cee.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un301206.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un301206.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9898.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9898.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 184 -s 11044⤵
- Program crash
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1707.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1707.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 184 -ip 1841⤵PID:1932
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5e162f94a8f4d1e9a5835ed62c48ae4b1
SHA1ab846c739524951d5aeff34779071eb5c777e77d
SHA256e0159299902e22f11f64e710e4565aca3d23bdc9b0a43289681454a34630ce97
SHA512ee53e04cebaf45f7fab1bc697c1e6b71ec24fca76c0bd050c561a41a7e7f828a2d9ba164500ca0ae75d2278e45edd103075453f6b983d1714dbb2cef76559a4d
-
Filesize
295KB
MD53be52b9c26ec9530b15ab46563487f6b
SHA1f548d0dc78f667cd5394cac82cc2d99579935ac0
SHA256a98a05f227c2102149fb8011222fb520983248a3d489f7e1043936614f61c8cd
SHA51259eb1dd1ad852f2cbebe12e0acefa045976d9a3124e470fbb0ad505ee22dfcc048cd49d5694399f86d572f6552d675cc532f17c1a1301aad74f0a36aa6f69a9d
-
Filesize
354KB
MD50286872b533e16b0f7fb57fea03c4b7a
SHA14e228687f7570d1492b1d0e1fe7f9e9e5bbb5ac1
SHA25693ffdc049247c7d17c845af2bbc3ed9ef0835204e71141f320fab9cd2884c237
SHA512156bc3177be3e7ca703c9e97afed60f19e22e054d3438359453508b374dca6ff634452ebc1e5dd6f80759d946240f98adff268f2217e848d9a0ec491a41033d0