Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 17:37
Static task
static1
Behavioral task
behavioral1
Sample
4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029.exe
Resource
win10v2004-20241007-en
General
-
Target
4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029.exe
-
Size
674KB
-
MD5
e06fa233bc724d862e794dc764c69f56
-
SHA1
b792cd0b23e4ee6b18c6a471a4fd812c9a96aa45
-
SHA256
4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029
-
SHA512
e0c547bd6890d7a97163c99d56111ac3a9f28bc782c213a20991229503da1b9823ee8aae41d1e497aa2af7d5edd2ae74f4bd4da88deae50b7d5752c63a423398
-
SSDEEP
12288:LMrpy90A2vZWnem6rcN50US60QzdekuW7RQTx63ScI:2y5I8nerUmOzdduoi4icI
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4776-19-0x0000000002620000-0x000000000263A000-memory.dmp healer behavioral1/memory/4776-21-0x0000000004B90000-0x0000000004BA8000-memory.dmp healer behavioral1/memory/4776-22-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4776-27-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4776-47-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4776-45-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4776-43-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4776-41-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4776-39-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4776-49-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4776-37-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4776-33-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4776-31-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4776-29-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4776-25-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4776-23-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/4776-35-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer -
Healer family
-
Processes:
pro3202.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3202.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3202.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1560-61-0x00000000023F0000-0x0000000002436000-memory.dmp family_redline behavioral1/memory/1560-62-0x0000000005080000-0x00000000050C4000-memory.dmp family_redline behavioral1/memory/1560-66-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-72-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-96-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-94-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-92-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-90-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-86-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-84-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-82-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-80-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-78-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-76-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-74-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-70-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-68-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-88-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-64-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline behavioral1/memory/1560-63-0x0000000005080000-0x00000000050BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un901860.exepro3202.exequ3026.exepid process 1624 un901860.exe 4776 pro3202.exe 1560 qu3026.exe -
Processes:
pro3202.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3202.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029.exeun901860.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un901860.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 116 4776 WerFault.exe pro3202.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu3026.exe4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029.exeun901860.exepro3202.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un901860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3202.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro3202.exepid process 4776 pro3202.exe 4776 pro3202.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro3202.exequ3026.exedescription pid process Token: SeDebugPrivilege 4776 pro3202.exe Token: SeDebugPrivilege 1560 qu3026.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029.exeun901860.exedescription pid process target process PID 2228 wrote to memory of 1624 2228 4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029.exe un901860.exe PID 2228 wrote to memory of 1624 2228 4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029.exe un901860.exe PID 2228 wrote to memory of 1624 2228 4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029.exe un901860.exe PID 1624 wrote to memory of 4776 1624 un901860.exe pro3202.exe PID 1624 wrote to memory of 4776 1624 un901860.exe pro3202.exe PID 1624 wrote to memory of 4776 1624 un901860.exe pro3202.exe PID 1624 wrote to memory of 1560 1624 un901860.exe qu3026.exe PID 1624 wrote to memory of 1560 1624 un901860.exe qu3026.exe PID 1624 wrote to memory of 1560 1624 un901860.exe qu3026.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029.exe"C:\Users\Admin\AppData\Local\Temp\4244f65db1f3863d986aebabb2f295f70dc6ee6d05292eafa67d933d0ed33029.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901860.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901860.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3202.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3202.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 10844⤵
- Program crash
PID:116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3026.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3026.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4776 -ip 47761⤵PID:1632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD5545de53ae0fe8403f1970d13b83bb937
SHA11777c26107190faa10b86d0c3eb7f8f5cfffb774
SHA2568e813965dcd499caf8c8532a0f15a121bbc3f4045dce193e93876e560554dc95
SHA5124a7b25e3a9327bb41fd37d0c2c71cff940f5543457bb004c8bb9ee9bd9b50f0f5f6e031f688c8de03e04aec41c6aa0fba099bc6df04f0739d2110d8f67b189ab
-
Filesize
260KB
MD53f8f8107cd3c142a9c86fc9793cf7960
SHA13c368d2df4c0579eb6864c54ec72644ff00e059a
SHA2560da8373f81525698c5f9bee236b7bb3e0aeccf43f8181253731610c1d3e953a3
SHA512c89e704a46292303b5024babc89b6e9988349b47bc74b12d5b3e896e5a10b2d0d3d346c4073ff14bcb6dfcb625f64051bb1462328192e987c1949aef8a103afc
-
Filesize
319KB
MD5445b46eb59b82f99ffd93504d6a0fdb3
SHA1ae5e72006565ef8d0038391f674b39337dd11e54
SHA2565877de849c4837f7feca94ba258ebc1eaa40fb1a041a5c84ffae4a823453ed61
SHA512367e4206ec1e77a7f061cee31ffb0dc730a2ff2c8e502b80907df5f2fb952485180375a69f6151d358bf98c841fe448846b96221a5fffffb297e3b2de1d33a37