Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:13
Static task
static1
Behavioral task
behavioral1
Sample
bef50777e3de21313847efa5f76f69a7415fbfac9a0125e5a7d37a23db2ed23f.exe
Resource
win10v2004-20241007-en
General
-
Target
bef50777e3de21313847efa5f76f69a7415fbfac9a0125e5a7d37a23db2ed23f.exe
-
Size
672KB
-
MD5
b9fbaa8f64280dd9d399d17adc71dd51
-
SHA1
a7d64a1a65529c2dcc0b33a887395940a38ad6b4
-
SHA256
bef50777e3de21313847efa5f76f69a7415fbfac9a0125e5a7d37a23db2ed23f
-
SHA512
3bf1878ee5abb5083926156c1bdb22153b1cee602c35f96e501357d49ef190c987a172eb4c2ad1520bddf5a32733f21fe7ba0a3dac2f0653bdaaef881c5ccef7
-
SSDEEP
12288:tMr+y90rmC8FRGLIo+vPAzzDtGkSRwOb7rSmaoy2Hj/:ryGp8H1omPAZGkSNbSDoyC/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4464-19-0x00000000023F0000-0x000000000240A000-memory.dmp healer behavioral1/memory/4464-21-0x0000000004BB0000-0x0000000004BC8000-memory.dmp healer behavioral1/memory/4464-49-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer behavioral1/memory/4464-48-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer behavioral1/memory/4464-45-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer behavioral1/memory/4464-43-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer behavioral1/memory/4464-41-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer behavioral1/memory/4464-39-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer behavioral1/memory/4464-37-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer behavioral1/memory/4464-35-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer behavioral1/memory/4464-33-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer behavioral1/memory/4464-31-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer behavioral1/memory/4464-29-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer behavioral1/memory/4464-27-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer behavioral1/memory/4464-25-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer behavioral1/memory/4464-23-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer behavioral1/memory/4464-22-0x0000000004BB0000-0x0000000004BC2000-memory.dmp healer -
Healer family
-
Processes:
pro5860.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5860.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1064-61-0x0000000004A20000-0x0000000004A66000-memory.dmp family_redline behavioral1/memory/1064-62-0x0000000004AA0000-0x0000000004AE4000-memory.dmp family_redline behavioral1/memory/1064-68-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-76-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-96-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-94-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-92-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-90-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-86-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-84-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-82-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-78-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-74-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-72-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-70-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-88-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-80-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-66-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-64-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/1064-63-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un975758.exepro5860.exequ0313.exepid process 2188 un975758.exe 4464 pro5860.exe 1064 qu0313.exe -
Processes:
pro5860.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5860.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
bef50777e3de21313847efa5f76f69a7415fbfac9a0125e5a7d37a23db2ed23f.exeun975758.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bef50777e3de21313847efa5f76f69a7415fbfac9a0125e5a7d37a23db2ed23f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un975758.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 932 4464 WerFault.exe pro5860.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bef50777e3de21313847efa5f76f69a7415fbfac9a0125e5a7d37a23db2ed23f.exeun975758.exepro5860.exequ0313.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bef50777e3de21313847efa5f76f69a7415fbfac9a0125e5a7d37a23db2ed23f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un975758.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0313.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro5860.exepid process 4464 pro5860.exe 4464 pro5860.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro5860.exequ0313.exedescription pid process Token: SeDebugPrivilege 4464 pro5860.exe Token: SeDebugPrivilege 1064 qu0313.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
bef50777e3de21313847efa5f76f69a7415fbfac9a0125e5a7d37a23db2ed23f.exeun975758.exedescription pid process target process PID 3624 wrote to memory of 2188 3624 bef50777e3de21313847efa5f76f69a7415fbfac9a0125e5a7d37a23db2ed23f.exe un975758.exe PID 3624 wrote to memory of 2188 3624 bef50777e3de21313847efa5f76f69a7415fbfac9a0125e5a7d37a23db2ed23f.exe un975758.exe PID 3624 wrote to memory of 2188 3624 bef50777e3de21313847efa5f76f69a7415fbfac9a0125e5a7d37a23db2ed23f.exe un975758.exe PID 2188 wrote to memory of 4464 2188 un975758.exe pro5860.exe PID 2188 wrote to memory of 4464 2188 un975758.exe pro5860.exe PID 2188 wrote to memory of 4464 2188 un975758.exe pro5860.exe PID 2188 wrote to memory of 1064 2188 un975758.exe qu0313.exe PID 2188 wrote to memory of 1064 2188 un975758.exe qu0313.exe PID 2188 wrote to memory of 1064 2188 un975758.exe qu0313.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bef50777e3de21313847efa5f76f69a7415fbfac9a0125e5a7d37a23db2ed23f.exe"C:\Users\Admin\AppData\Local\Temp\bef50777e3de21313847efa5f76f69a7415fbfac9a0125e5a7d37a23db2ed23f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un975758.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un975758.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5860.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5860.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 11004⤵
- Program crash
PID:932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0313.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0313.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4464 -ip 44641⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD54474b750b5057e64a4d7d916ad47d96a
SHA1daaf96b9b3d36b82faf10d9eb23328d0907dc4ba
SHA2560fe897a4f34c2768bc8c5044c97be5414f221bc58d920be615453fe5b24ec242
SHA5128e3fea57e0a5bb93934760c53c37d5ec3a3d5b08a762a384a3f4ea6f76a59b2d22c3b2f853d96b03d0635e7ad99e217938f1a4875f772f8d79edab2f8679b764
-
Filesize
260KB
MD5a78b13f73e07a977c81babb7679ca6aa
SHA1dae882829a8a7ade07e30b124f9ca26da2fe4c6f
SHA2560fe4bfe1d74790c8473230e24e3353b61302ed79e6c96e126bbaaf4fca16e8f9
SHA512154443ad0451e2ee8a6f9222a50c9586e310458b8e40711d42696142d9fe9a424a65219e57c6f65bd43995528094018b983a097a0940b6e849bd2564f75fe51f
-
Filesize
318KB
MD57d861c98365a6a0d72c69742d945fd2d
SHA1ce3ffa0aff834c470596974a7987387608fcba3a
SHA256c0115b50c90223a6bb2d3dc7e163dcd0c9b7f2a5c6ef2bd7344316eb375a1280
SHA5122fbc20c08647da57afa270d426369d9351b998ee1e204ddb7378b80e3cadca395f52086f6093b81e04c9cb0e6f80963ffcbf2196bb93c0b2a322cdb0058147d0