Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 15:00
Static task
static1
Behavioral task
behavioral1
Sample
1842520013d9dae57db5b6edeb67b80eace211a796b516669cb9c8aaabc1cddb.exe
Resource
win10v2004-20241007-en
General
-
Target
1842520013d9dae57db5b6edeb67b80eace211a796b516669cb9c8aaabc1cddb.exe
-
Size
659KB
-
MD5
9f873f2739c85185d7c67b87febb0218
-
SHA1
6e1e03de8e4c2d645ba047faa24a321d6f202c17
-
SHA256
1842520013d9dae57db5b6edeb67b80eace211a796b516669cb9c8aaabc1cddb
-
SHA512
bd6ec5c14b20082b951c6eb060e963cd383dcddcabd382791e07b9a8c7a3650c8c5019a4a5dec4de0eb1605c55cd2d2473617653223305288fb2dbac825058cb
-
SSDEEP
12288:6Mrey90ck/rd2RWGIqwPCtotDrxmBr/JdIwzu21Jof5K9a/5mRykPhQ:oyZwwYLqwhurBuEu21uAcmgkPhQ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3132-19-0x00000000024F0000-0x000000000250A000-memory.dmp healer behavioral1/memory/3132-21-0x0000000002800000-0x0000000002818000-memory.dmp healer behavioral1/memory/3132-49-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/3132-47-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/3132-45-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/3132-43-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/3132-42-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/3132-39-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/3132-37-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/3132-35-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/3132-33-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/3132-31-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/3132-30-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/3132-27-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/3132-25-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/3132-23-0x0000000002800000-0x0000000002812000-memory.dmp healer behavioral1/memory/3132-22-0x0000000002800000-0x0000000002812000-memory.dmp healer -
Healer family
-
Processes:
pro1539.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1539.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1539.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3404-61-0x00000000023A0000-0x00000000023E6000-memory.dmp family_redline behavioral1/memory/3404-62-0x0000000002670000-0x00000000026B4000-memory.dmp family_redline behavioral1/memory/3404-68-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-78-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-96-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-94-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-92-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-90-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-88-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-86-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-84-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-80-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-76-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-74-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-72-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-70-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-82-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-66-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-64-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/3404-63-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un989236.exepro1539.exequ7492.exepid process 2600 un989236.exe 3132 pro1539.exe 3404 qu7492.exe -
Processes:
pro1539.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1539.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1842520013d9dae57db5b6edeb67b80eace211a796b516669cb9c8aaabc1cddb.exeun989236.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1842520013d9dae57db5b6edeb67b80eace211a796b516669cb9c8aaabc1cddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un989236.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3424 3132 WerFault.exe pro1539.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu7492.exe1842520013d9dae57db5b6edeb67b80eace211a796b516669cb9c8aaabc1cddb.exeun989236.exepro1539.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7492.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1842520013d9dae57db5b6edeb67b80eace211a796b516669cb9c8aaabc1cddb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un989236.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1539.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1539.exepid process 3132 pro1539.exe 3132 pro1539.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1539.exequ7492.exedescription pid process Token: SeDebugPrivilege 3132 pro1539.exe Token: SeDebugPrivilege 3404 qu7492.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1842520013d9dae57db5b6edeb67b80eace211a796b516669cb9c8aaabc1cddb.exeun989236.exedescription pid process target process PID 1720 wrote to memory of 2600 1720 1842520013d9dae57db5b6edeb67b80eace211a796b516669cb9c8aaabc1cddb.exe un989236.exe PID 1720 wrote to memory of 2600 1720 1842520013d9dae57db5b6edeb67b80eace211a796b516669cb9c8aaabc1cddb.exe un989236.exe PID 1720 wrote to memory of 2600 1720 1842520013d9dae57db5b6edeb67b80eace211a796b516669cb9c8aaabc1cddb.exe un989236.exe PID 2600 wrote to memory of 3132 2600 un989236.exe pro1539.exe PID 2600 wrote to memory of 3132 2600 un989236.exe pro1539.exe PID 2600 wrote to memory of 3132 2600 un989236.exe pro1539.exe PID 2600 wrote to memory of 3404 2600 un989236.exe qu7492.exe PID 2600 wrote to memory of 3404 2600 un989236.exe qu7492.exe PID 2600 wrote to memory of 3404 2600 un989236.exe qu7492.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1842520013d9dae57db5b6edeb67b80eace211a796b516669cb9c8aaabc1cddb.exe"C:\Users\Admin\AppData\Local\Temp\1842520013d9dae57db5b6edeb67b80eace211a796b516669cb9c8aaabc1cddb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un989236.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un989236.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1539.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1539.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 10844⤵
- Program crash
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7492.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7492.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3132 -ip 31321⤵PID:1492
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD5beeb5be5232a7b54c5f0b31ca7220683
SHA11dd4f7beb69a40b3717235a5b8bd69811bd05d4d
SHA256cf38867371abfa4cea5d198dea4629712ea4bfadd20af5225e5110949193e33d
SHA5121d3963907d43c74b41485164bb2b132c300e5367eb2204e679edafe4fc84c262e67ba476f4b4b231aacc09b5f09d3f5f6faeccdf0f1a50a39cf590fa7719aaef
-
Filesize
376KB
MD527724736756d7dcc80ff1acd8e17a246
SHA1f40ef19a1b147e61fd9c9314911a3ed04dca4360
SHA256e61964fa3faf79466249f46b922ca3b1a1070d1c93d45bf630fa45bb9c78ffe0
SHA512df762abee8ee8c53d26e5b7735092b4f133da77234b4258c455131117b79946d7c4e288267001331fdd9c60fb5943ad308e37118c5b3996f13a2e53277895de0
-
Filesize
434KB
MD5775cc7b249d94fdc758d0c35cb0dba9b
SHA132dab650d8351acece509bffabe058f44561f2d6
SHA256097ffabdc69984dd1830d6071373ef2cf4faf3a5a78c2ad1eae57be75fa171af
SHA5128fc619f651f7818cfcdc6de2f6ca1f0dc67b2e90bbf3d0ad5c134c9419bb13cd4e495cfb354f515992196d4e6d4cad455999109975bd6ccbce01ca5510ce5789