Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exe
Resource
win10v2004-20241007-en
General
-
Target
61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exe
-
Size
665KB
-
MD5
c28755bc09052f8a72497263c5560e91
-
SHA1
711f6027e2186aac1c3b00e446af575546b549fa
-
SHA256
61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a
-
SHA512
4e27558f0f090c2d51bb36461980c44c950228f98adc2a9ffb12334fb8c55cbafac2b292943cc7df85b0bccbe969387c1b2484247c81760a34ac45f6196de458
-
SSDEEP
12288:XMrgy90xi8r7Wb4p6EnpTa+wgAK5LzuUJ66N2bekL4LFK8:jyei8/SGvmkLCP6N2J4BN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3972-19-0x0000000002680000-0x000000000269A000-memory.dmp healer behavioral1/memory/3972-21-0x0000000002850000-0x0000000002868000-memory.dmp healer behavioral1/memory/3972-25-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3972-47-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3972-45-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3972-43-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3972-41-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3972-39-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3972-49-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3972-37-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3972-35-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3972-33-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3972-32-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3972-29-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3972-27-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3972-22-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/3972-23-0x0000000002850000-0x0000000002862000-memory.dmp healer -
Healer family
-
Processes:
pro9761.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9761.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9761.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1084-61-0x00000000028C0000-0x0000000002906000-memory.dmp family_redline behavioral1/memory/1084-62-0x0000000002AA0000-0x0000000002AE4000-memory.dmp family_redline behavioral1/memory/1084-64-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-96-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-94-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-93-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-90-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-88-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-86-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-84-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-82-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-80-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-78-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-76-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-74-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-72-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-70-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-68-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-66-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/1084-63-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un314883.exepro9761.exequ5543.exepid process 2436 un314883.exe 3972 pro9761.exe 1084 qu5543.exe -
Processes:
pro9761.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9761.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9761.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exeun314883.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un314883.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4088 3972 WerFault.exe pro9761.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu5543.exe61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exeun314883.exepro9761.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5543.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un314883.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9761.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9761.exepid process 3972 pro9761.exe 3972 pro9761.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9761.exequ5543.exedescription pid process Token: SeDebugPrivilege 3972 pro9761.exe Token: SeDebugPrivilege 1084 qu5543.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exeun314883.exedescription pid process target process PID 2288 wrote to memory of 2436 2288 61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exe un314883.exe PID 2288 wrote to memory of 2436 2288 61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exe un314883.exe PID 2288 wrote to memory of 2436 2288 61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exe un314883.exe PID 2436 wrote to memory of 3972 2436 un314883.exe pro9761.exe PID 2436 wrote to memory of 3972 2436 un314883.exe pro9761.exe PID 2436 wrote to memory of 3972 2436 un314883.exe pro9761.exe PID 2436 wrote to memory of 1084 2436 un314883.exe qu5543.exe PID 2436 wrote to memory of 1084 2436 un314883.exe qu5543.exe PID 2436 wrote to memory of 1084 2436 un314883.exe qu5543.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exe"C:\Users\Admin\AppData\Local\Temp\61e69360902999326fc2edc9ad98d0083dcc9d3dadf09f869cdef1994fa47b8a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un314883.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un314883.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9761.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9761.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 10804⤵
- Program crash
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5543.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5543.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3972 -ip 39721⤵PID:1648
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
523KB
MD529fc00e818d3b8aa454ada43131d4249
SHA11ebd658696d55a33dd7418e707ba84bc765ed819
SHA256a6c3e5ab173019f706bcd541e7d90df4b8390cced31edaa516c2eea8d572ddd5
SHA512269f4087e6ca1c89ed28f44ec6bd458e3ff1346c3d6eb5f759b885bc53b56e5c08f18d9eed9a6d1fb3b0f92e50a1a831de212da4d549376028ec8886038647fb
-
Filesize
294KB
MD55f1fe8ca4a19b7addd321828a705ba41
SHA1e26a8b9a3c467aee850badf4baf0a2eb7900aa30
SHA256c47625272ffd209ecb26852eb5068200711911c1b2f7176ffde96c9f3db536a9
SHA5126157830090b8da6d7ea75525aa7043d30887a56abb5265618f73835c232659e2a4e8aa3ec95fee4ef6b2ad3d1d8e63f90083b844f38a3b8e87a8cbe90b2a1fa1
-
Filesize
353KB
MD51877bb0e7d5be6e32283bd84a3278db0
SHA18e45e7c06534e51eb9682b1de6f66e9ece979ce5
SHA25603e581534b1365ebb78384bda7cc1fd36bed8634a62d544b64250f5d114ed067
SHA5120475a19a14046be20aaef3aaf16d3f687c47a1edd0e79e0579184c9f8df46026c3082f3871367de31562c5ceaef78ff2e30b397a570125d1ae4032839c14b01d