Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
24a6cd0262e56284692b9a049ba0c4533b5decf7380519890413fa55f2c17707.exe
Resource
win10v2004-20241007-en
General
-
Target
24a6cd0262e56284692b9a049ba0c4533b5decf7380519890413fa55f2c17707.exe
-
Size
671KB
-
MD5
32a529ad0e6bac64a55fb836efbb8d38
-
SHA1
2042403a43f6c63f0af215573a049d844d4dd790
-
SHA256
24a6cd0262e56284692b9a049ba0c4533b5decf7380519890413fa55f2c17707
-
SHA512
8a39c2fa0d4f4092d4daa34c0f8fa4f597adcc304b86e4968048f4002091bce6f2a5289a46fbed33e15310b5478f100964f2d8c773ea7c6b5087e8b171b6b6b6
-
SSDEEP
12288:gMrOy90lVafxVWS9xtfKj4h1TKuu5hbwjHzOgx+przMF8Otf47s5MENm:+yh9xtfHnBIb8HzOZprwFzfQr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4260-19-0x0000000002260000-0x000000000227A000-memory.dmp healer behavioral1/memory/4260-21-0x0000000002470000-0x0000000002488000-memory.dmp healer behavioral1/memory/4260-42-0x0000000002470000-0x0000000002482000-memory.dmp healer behavioral1/memory/4260-49-0x0000000002470000-0x0000000002482000-memory.dmp healer behavioral1/memory/4260-47-0x0000000002470000-0x0000000002482000-memory.dmp healer behavioral1/memory/4260-45-0x0000000002470000-0x0000000002482000-memory.dmp healer behavioral1/memory/4260-43-0x0000000002470000-0x0000000002482000-memory.dmp healer behavioral1/memory/4260-39-0x0000000002470000-0x0000000002482000-memory.dmp healer behavioral1/memory/4260-37-0x0000000002470000-0x0000000002482000-memory.dmp healer behavioral1/memory/4260-35-0x0000000002470000-0x0000000002482000-memory.dmp healer behavioral1/memory/4260-33-0x0000000002470000-0x0000000002482000-memory.dmp healer behavioral1/memory/4260-31-0x0000000002470000-0x0000000002482000-memory.dmp healer behavioral1/memory/4260-29-0x0000000002470000-0x0000000002482000-memory.dmp healer behavioral1/memory/4260-27-0x0000000002470000-0x0000000002482000-memory.dmp healer behavioral1/memory/4260-25-0x0000000002470000-0x0000000002482000-memory.dmp healer behavioral1/memory/4260-23-0x0000000002470000-0x0000000002482000-memory.dmp healer behavioral1/memory/4260-22-0x0000000002470000-0x0000000002482000-memory.dmp healer -
Healer family
-
Processes:
pro7725.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7725.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7725.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1080-61-0x00000000024C0000-0x0000000002506000-memory.dmp family_redline behavioral1/memory/1080-62-0x0000000002660000-0x00000000026A4000-memory.dmp family_redline behavioral1/memory/1080-76-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-78-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-96-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-93-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-90-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-88-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-86-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-84-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-82-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-80-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-74-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-72-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-70-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-68-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-94-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-66-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-64-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/1080-63-0x0000000002660000-0x000000000269F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un800660.exepro7725.exequ3489.exepid process 3560 un800660.exe 4260 pro7725.exe 1080 qu3489.exe -
Processes:
pro7725.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7725.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
24a6cd0262e56284692b9a049ba0c4533b5decf7380519890413fa55f2c17707.exeun800660.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 24a6cd0262e56284692b9a049ba0c4533b5decf7380519890413fa55f2c17707.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un800660.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3200 4260 WerFault.exe pro7725.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un800660.exepro7725.exequ3489.exe24a6cd0262e56284692b9a049ba0c4533b5decf7380519890413fa55f2c17707.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un800660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7725.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3489.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24a6cd0262e56284692b9a049ba0c4533b5decf7380519890413fa55f2c17707.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7725.exepid process 4260 pro7725.exe 4260 pro7725.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7725.exequ3489.exedescription pid process Token: SeDebugPrivilege 4260 pro7725.exe Token: SeDebugPrivilege 1080 qu3489.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
24a6cd0262e56284692b9a049ba0c4533b5decf7380519890413fa55f2c17707.exeun800660.exedescription pid process target process PID 4668 wrote to memory of 3560 4668 24a6cd0262e56284692b9a049ba0c4533b5decf7380519890413fa55f2c17707.exe un800660.exe PID 4668 wrote to memory of 3560 4668 24a6cd0262e56284692b9a049ba0c4533b5decf7380519890413fa55f2c17707.exe un800660.exe PID 4668 wrote to memory of 3560 4668 24a6cd0262e56284692b9a049ba0c4533b5decf7380519890413fa55f2c17707.exe un800660.exe PID 3560 wrote to memory of 4260 3560 un800660.exe pro7725.exe PID 3560 wrote to memory of 4260 3560 un800660.exe pro7725.exe PID 3560 wrote to memory of 4260 3560 un800660.exe pro7725.exe PID 3560 wrote to memory of 1080 3560 un800660.exe qu3489.exe PID 3560 wrote to memory of 1080 3560 un800660.exe qu3489.exe PID 3560 wrote to memory of 1080 3560 un800660.exe qu3489.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24a6cd0262e56284692b9a049ba0c4533b5decf7380519890413fa55f2c17707.exe"C:\Users\Admin\AppData\Local\Temp\24a6cd0262e56284692b9a049ba0c4533b5decf7380519890413fa55f2c17707.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un800660.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un800660.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7725.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7725.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 10284⤵
- Program crash
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3489.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3489.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4260 -ip 42601⤵PID:1180
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5ec29365c602cd685a824fa60d74bea76
SHA1105638a08176a16ea6dccc55045a32dbe484602a
SHA256df17a818b82af50de9a4d96c9d9206a26b266439cf3ee9e69abd8b5e4e53cfbf
SHA512c28e60a138a25011c8deaa3bcb944a1e6b272fe989d914bc9c6a2b8dc9e5a4a8934af8de0e9cd273f373c2328afea5fd99893c5219f9575270b085e2e990e63f
-
Filesize
237KB
MD52f31a129efac6ec2994f8f4cc4f025ad
SHA10fe846d3f343e66232f26f8cd7e2af982ec0c9de
SHA25633768e71fe8aa82ee72b1a00c2987aa63a431c360c3e535815a68993f1776541
SHA512310cfdc1403f999417a655dae154b423fb824a52aa2d6b5ddff14d8f3667c60d4a7d98b5622d604cc47bd5a2d974eec337bedb41f014afab000b1cda9de5c9f3
-
Filesize
295KB
MD570b6e137ed0cf6d98e58c06a0ef717ea
SHA194e7a77e93d55ecee0aaefff21de504124fcb9ae
SHA2568ef09177aed55514bdefadbd2001269461b17b97110bb0bbc0ba649006b5bea3
SHA5120ede3f58a5cbe3766ce4b479fd77ac28644659d1632a88dc327e5007051c2c328ad725997505e232c3781cb251f074a365bc51a652e84f5d926d603c2695d9c1