Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:24
Static task
static1
Behavioral task
behavioral1
Sample
0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exe
Resource
win10v2004-20241007-en
General
-
Target
0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exe
-
Size
988KB
-
MD5
88b43cbb705d6ff252035cd54e8f42d8
-
SHA1
8afd69d5d90eaf80488d929e059874c382040cdf
-
SHA256
0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c
-
SHA512
2cfe5fcc7e69a6345e9f537bceae5aa2e05a7a36c32d6f0f4709f1d276544d8b11e5ac798f108a3d7df5807ffbcdacdbba2fa29989cd2974dc35356b660c9c3c
-
SSDEEP
12288:zMrOy90++cbS15kJdr8+r+yzTae+QUCpbzAmNw1tnK7fFXp3+ulOlqztcBbk40AW:ByRrwGgo+OT3YmNwXGfF5uulaqztcdi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8966.exe healer behavioral1/memory/1084-28-0x0000000000930000-0x000000000093A000-memory.dmp healer behavioral1/memory/400-34-0x0000000002070000-0x000000000208A000-memory.dmp healer behavioral1/memory/400-36-0x0000000002390000-0x00000000023A8000-memory.dmp healer behavioral1/memory/400-37-0x0000000002390000-0x00000000023A2000-memory.dmp healer behavioral1/memory/400-46-0x0000000002390000-0x00000000023A2000-memory.dmp healer behavioral1/memory/400-64-0x0000000002390000-0x00000000023A2000-memory.dmp healer behavioral1/memory/400-62-0x0000000002390000-0x00000000023A2000-memory.dmp healer behavioral1/memory/400-60-0x0000000002390000-0x00000000023A2000-memory.dmp healer behavioral1/memory/400-58-0x0000000002390000-0x00000000023A2000-memory.dmp healer behavioral1/memory/400-56-0x0000000002390000-0x00000000023A2000-memory.dmp healer behavioral1/memory/400-54-0x0000000002390000-0x00000000023A2000-memory.dmp healer behavioral1/memory/400-52-0x0000000002390000-0x00000000023A2000-memory.dmp healer behavioral1/memory/400-50-0x0000000002390000-0x00000000023A2000-memory.dmp healer behavioral1/memory/400-48-0x0000000002390000-0x00000000023A2000-memory.dmp healer behavioral1/memory/400-44-0x0000000002390000-0x00000000023A2000-memory.dmp healer behavioral1/memory/400-42-0x0000000002390000-0x00000000023A2000-memory.dmp healer behavioral1/memory/400-40-0x0000000002390000-0x00000000023A2000-memory.dmp healer behavioral1/memory/400-38-0x0000000002390000-0x00000000023A2000-memory.dmp healer -
Healer family
-
Processes:
tz8966.exev0380XC.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz8966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz8966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz8966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz8966.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v0380XC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v0380XC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz8966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz8966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v0380XC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v0380XC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v0380XC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v0380XC.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/456-72-0x0000000002410000-0x0000000002456000-memory.dmp family_redline behavioral1/memory/456-73-0x0000000004AC0000-0x0000000004B04000-memory.dmp family_redline behavioral1/memory/456-77-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-83-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-108-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-105-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-103-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-101-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-99-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-97-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-95-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-93-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-91-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-89-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-87-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-81-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-79-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-85-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-75-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/456-74-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
Processes:
zap2242.exezap6432.exezap6618.exetz8966.exev0380XC.exew33Yc63.exepid process 3488 zap2242.exe 2640 zap6432.exe 1660 zap6618.exe 1084 tz8966.exe 400 v0380XC.exe 456 w33Yc63.exe -
Processes:
tz8966.exev0380XC.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz8966.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v0380XC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v0380XC.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exezap2242.exezap6432.exezap6618.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap2242.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap6432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap6618.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4068 400 WerFault.exe v0380XC.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exezap2242.exezap6432.exezap6618.exev0380XC.exew33Yc63.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap2242.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap6432.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap6618.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v0380XC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w33Yc63.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
tz8966.exev0380XC.exepid process 1084 tz8966.exe 1084 tz8966.exe 400 v0380XC.exe 400 v0380XC.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tz8966.exev0380XC.exew33Yc63.exedescription pid process Token: SeDebugPrivilege 1084 tz8966.exe Token: SeDebugPrivilege 400 v0380XC.exe Token: SeDebugPrivilege 456 w33Yc63.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exezap2242.exezap6432.exezap6618.exedescription pid process target process PID 4852 wrote to memory of 3488 4852 0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exe zap2242.exe PID 4852 wrote to memory of 3488 4852 0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exe zap2242.exe PID 4852 wrote to memory of 3488 4852 0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exe zap2242.exe PID 3488 wrote to memory of 2640 3488 zap2242.exe zap6432.exe PID 3488 wrote to memory of 2640 3488 zap2242.exe zap6432.exe PID 3488 wrote to memory of 2640 3488 zap2242.exe zap6432.exe PID 2640 wrote to memory of 1660 2640 zap6432.exe zap6618.exe PID 2640 wrote to memory of 1660 2640 zap6432.exe zap6618.exe PID 2640 wrote to memory of 1660 2640 zap6432.exe zap6618.exe PID 1660 wrote to memory of 1084 1660 zap6618.exe tz8966.exe PID 1660 wrote to memory of 1084 1660 zap6618.exe tz8966.exe PID 1660 wrote to memory of 400 1660 zap6618.exe v0380XC.exe PID 1660 wrote to memory of 400 1660 zap6618.exe v0380XC.exe PID 1660 wrote to memory of 400 1660 zap6618.exe v0380XC.exe PID 2640 wrote to memory of 456 2640 zap6432.exe w33Yc63.exe PID 2640 wrote to memory of 456 2640 zap6432.exe w33Yc63.exe PID 2640 wrote to memory of 456 2640 zap6432.exe w33Yc63.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exe"C:\Users\Admin\AppData\Local\Temp\0a27f24ecdb8d62b3c01d1d5ddda307d70c5d42a9fa07e571b347d435562ba2c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2242.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2242.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap6432.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap6432.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6618.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap6618.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8966.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8966.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0380XC.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0380XC.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 11006⤵
- Program crash
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w33Yc63.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w33Yc63.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 400 -ip 4001⤵PID:2408
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
805KB
MD5f4b585df2ed3ae8cf26de9f4e147302b
SHA165bab4177fcc81d230b38e6969db9b83a58cb325
SHA2564b2e699258187db7c38b6deea0d6826354514e3b3ae19e4fe973a44bc749d2d7
SHA512e91b0b9d45b69fdbea52973607378af7abe727a9e226dd2b2c3e990b74b9e2c58b5570264071ac588570c73425e5ea69aa3c59fc0aa8abc11864a138ea489eff
-
Filesize
651KB
MD531076539babf29b45a79d7c1136f7265
SHA1bb9cfd22f4299a04524b6049e88a78e331cd3856
SHA256eded3d402460796aeb233dbc106139f8ab11c0f37992bf34b6981352aefa3765
SHA5123029bc56114a91a03f2be10d91ceb8f443866b1f6c3e3e7de8dc201aacbc0173e5bd62aa7c5ef992d4f873b2124891d9511db25e771697289edc4ded9899398d
-
Filesize
292KB
MD5d0d4b5c91da839d302de1033a675bf9f
SHA162d6f1c17d54a01954ecc2b237f0aa16576d06b9
SHA256bb113dc81b4d80121a6f0e73054011239b72b2d4ebf72c9094485bbdc690e4b2
SHA512d013b1b6e24ecb1262d12f2460353a2492834a475af78ebe1d99433edc74e25cced1e8d72f2b2ac2fdf793ea1ad4ed8ad377fd68d65183d46d6d2659eed50759
-
Filesize
322KB
MD5aaf43bdf1fda96b70eafd30992f74e25
SHA129f1e4cd851eee09a9332bb5a14a11578c8f1354
SHA256720baaceb65c1a33d1324fb99b0fbeed1f67c4f173b4b0b4588cc555a45417b5
SHA512e25df0516fe18ab0f0ba0dd86dc0c201e92f59bbfd7c7315b1e0f6a62aa1fc2a26e6208617e97b3fb24e24717b735fcc269ca291130afca016aeff8d5dbc9a28
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
235KB
MD59bb71766e2acf95eb22cb508c69ec067
SHA1059ad053769eec21d066a4e691b810a0f5ba1192
SHA2568fa037999479fd8f45c2af19168199fc5d18408920a157c7433db976adfe15d2
SHA5125bfc4086a90ef6285bd0692768573e300aac39ce833471576c493683c8109e3c8440583481fee9b9a2f0d0a9976b7f71a2ee0f4b987123c94023ffd9712d0cf7