Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 18:23
Static task
static1
Behavioral task
behavioral1
Sample
11b68d5beac72220c79a7a6995078359d10b80b16d4b1e1ffc92ee1cc434cc18.exe
Resource
win10v2004-20241007-en
General
-
Target
11b68d5beac72220c79a7a6995078359d10b80b16d4b1e1ffc92ee1cc434cc18.exe
-
Size
699KB
-
MD5
c5d3090d5e467e16d547361eb8c0c505
-
SHA1
8b9ba4b30ad7a8adf9a6499c2aa27788eb8c4671
-
SHA256
11b68d5beac72220c79a7a6995078359d10b80b16d4b1e1ffc92ee1cc434cc18
-
SHA512
fd77a8b39961ccde375e2fa81bc7d6eb577b21e69c0a725c784b474c50fbadf5d7be23fabefe65a48b77ed4a674fce36e80b6ab924b4ecbede98039bfeaadd84
-
SSDEEP
12288:5MrTy90L1JUkIsnkY21tegtN5V67groGNrKN164AZTVYnJH5ARDrzbc/s4OL:qyOnkY2LtN5Egx42anJ5+DX+gL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3684-19-0x0000000002410000-0x000000000242A000-memory.dmp healer behavioral1/memory/3684-21-0x0000000002680000-0x0000000002698000-memory.dmp healer behavioral1/memory/3684-49-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/3684-47-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/3684-45-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/3684-43-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/3684-41-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/3684-39-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/3684-37-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/3684-35-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/3684-33-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/3684-31-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/3684-29-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/3684-27-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/3684-25-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/3684-23-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/3684-22-0x0000000002680000-0x0000000002692000-memory.dmp healer -
Healer family
-
Processes:
pro4485.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4485.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1276-61-0x0000000002500000-0x0000000002546000-memory.dmp family_redline behavioral1/memory/1276-62-0x0000000004A90000-0x0000000004AD4000-memory.dmp family_redline behavioral1/memory/1276-64-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-63-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-96-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-94-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-92-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-90-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-88-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-86-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-82-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-80-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-78-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-76-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-74-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-72-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-70-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-68-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-66-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/1276-84-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un491427.exepro4485.exequ9842.exepid process 2588 un491427.exe 3684 pro4485.exe 1276 qu9842.exe -
Processes:
pro4485.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4485.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
11b68d5beac72220c79a7a6995078359d10b80b16d4b1e1ffc92ee1cc434cc18.exeun491427.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 11b68d5beac72220c79a7a6995078359d10b80b16d4b1e1ffc92ee1cc434cc18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un491427.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3708 3684 WerFault.exe pro4485.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
11b68d5beac72220c79a7a6995078359d10b80b16d4b1e1ffc92ee1cc434cc18.exeun491427.exepro4485.exequ9842.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11b68d5beac72220c79a7a6995078359d10b80b16d4b1e1ffc92ee1cc434cc18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un491427.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4485.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9842.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4485.exepid process 3684 pro4485.exe 3684 pro4485.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4485.exequ9842.exedescription pid process Token: SeDebugPrivilege 3684 pro4485.exe Token: SeDebugPrivilege 1276 qu9842.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
11b68d5beac72220c79a7a6995078359d10b80b16d4b1e1ffc92ee1cc434cc18.exeun491427.exedescription pid process target process PID 3952 wrote to memory of 2588 3952 11b68d5beac72220c79a7a6995078359d10b80b16d4b1e1ffc92ee1cc434cc18.exe un491427.exe PID 3952 wrote to memory of 2588 3952 11b68d5beac72220c79a7a6995078359d10b80b16d4b1e1ffc92ee1cc434cc18.exe un491427.exe PID 3952 wrote to memory of 2588 3952 11b68d5beac72220c79a7a6995078359d10b80b16d4b1e1ffc92ee1cc434cc18.exe un491427.exe PID 2588 wrote to memory of 3684 2588 un491427.exe pro4485.exe PID 2588 wrote to memory of 3684 2588 un491427.exe pro4485.exe PID 2588 wrote to memory of 3684 2588 un491427.exe pro4485.exe PID 2588 wrote to memory of 1276 2588 un491427.exe qu9842.exe PID 2588 wrote to memory of 1276 2588 un491427.exe qu9842.exe PID 2588 wrote to memory of 1276 2588 un491427.exe qu9842.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11b68d5beac72220c79a7a6995078359d10b80b16d4b1e1ffc92ee1cc434cc18.exe"C:\Users\Admin\AppData\Local\Temp\11b68d5beac72220c79a7a6995078359d10b80b16d4b1e1ffc92ee1cc434cc18.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un491427.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un491427.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4485.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4485.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 11004⤵
- Program crash
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9842.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9842.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3684 -ip 36841⤵PID:3448
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD50d237fcb608667b3b782dae3e3c24ccb
SHA1d40eeec0f4559fb234c06e260e95088c5b1c5d61
SHA2566e20d2104be34568b89f5c6b8b03091440834812f24d30cc5922e83bee836b53
SHA5125b583b75b2b80171b6243c9ca3fe6843912b170a4bd38fc5b89f7394c96796612f58fda1ab15670c6bf064e4bfe2e5dd0d102226c859cba8f558f80b76d4ac3e
-
Filesize
294KB
MD5c3b30ea2721ea92994260715ae682370
SHA1624675e2cae6c05cadba6379d9f8488748c3795b
SHA25620205c342c9355306d21950e3a85032de8d3ac6649aab1ffe6c485ac05b4b4a7
SHA5129e8f709058d2b01c6088e36c8a5a9eac20589c933d15a5107ffb4e8906455638b9a26d0011b2725b186cb4f1db7213b185ce8d7af5f66e62ff7457a1d7fbe74d
-
Filesize
295KB
MD5167a7a19aca0284f1c3d084b5c7093ea
SHA1db1cecc29676812ba7fdc45a3a4fcd192445a9f2
SHA2563e9c4c16dc6394b8afc9ac7f520004846a1dcdeb0683a66ceddedc028bfa690f
SHA5121efacef34b27dab877fab58037d63d8ac3e20561a7039d0f073f7ae26bc0d06b4ab5b591f22fb00e2972b7805640723257860d876e7515fc3c30eb6e747762d7