Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 18:28
Static task
static1
Behavioral task
behavioral1
Sample
8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exe
Resource
win10v2004-20241007-en
General
-
Target
8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exe
-
Size
660KB
-
MD5
857e34f22dbe32e8f9046bda15a877c0
-
SHA1
4dfc57646d790022c83bd6bda1d927896d4fd321
-
SHA256
8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5
-
SHA512
910e09ae93b5279e5d4d7bd4da5d66e70828cf1de8e1f158498bcb2c0a03c78a6605aefa16b0721dbc385ed5026134ca908ba69cec9c5cfa9c1e34e79a5b2b97
-
SSDEEP
12288:6MrOy90eMaqSuy/rYKQhfCltnN8PnXzlIUlifyoQCFvAft/juH/+ySA:QyEa9uyUMtN4XinrdFIB+/+yD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/688-19-0x0000000004AF0000-0x0000000004B0A000-memory.dmp healer behavioral1/memory/688-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/688-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/688-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/688-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/688-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/688-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/688-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/688-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/688-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/688-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/688-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/688-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/688-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/688-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/688-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/688-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro6457.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6457.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6457.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6457.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/412-60-0x00000000025A0000-0x00000000025E6000-memory.dmp family_redline behavioral1/memory/412-61-0x0000000004AA0000-0x0000000004AE4000-memory.dmp family_redline behavioral1/memory/412-67-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-71-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-69-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-81-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-65-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-63-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-62-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-95-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-93-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-91-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-89-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-87-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-85-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-83-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-79-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-77-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-75-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/412-73-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un147691.exepro6457.exequ5958.exepid process 2348 un147691.exe 688 pro6457.exe 412 qu5958.exe -
Processes:
pro6457.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6457.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6457.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exeun147691.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un147691.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4396 688 WerFault.exe pro6457.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exeun147691.exepro6457.exequ5958.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un147691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6457.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5958.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6457.exepid process 688 pro6457.exe 688 pro6457.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6457.exequ5958.exedescription pid process Token: SeDebugPrivilege 688 pro6457.exe Token: SeDebugPrivilege 412 qu5958.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exeun147691.exedescription pid process target process PID 1212 wrote to memory of 2348 1212 8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exe un147691.exe PID 1212 wrote to memory of 2348 1212 8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exe un147691.exe PID 1212 wrote to memory of 2348 1212 8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exe un147691.exe PID 2348 wrote to memory of 688 2348 un147691.exe pro6457.exe PID 2348 wrote to memory of 688 2348 un147691.exe pro6457.exe PID 2348 wrote to memory of 688 2348 un147691.exe pro6457.exe PID 2348 wrote to memory of 412 2348 un147691.exe qu5958.exe PID 2348 wrote to memory of 412 2348 un147691.exe qu5958.exe PID 2348 wrote to memory of 412 2348 un147691.exe qu5958.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exe"C:\Users\Admin\AppData\Local\Temp\8bfa84d952ad70b90a3ac352c80949b83dc4af1ab5571ec9774f00ce41f965c5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un147691.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un147691.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6457.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6457.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 688 -s 10884⤵
- Program crash
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5958.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5958.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 688 -ip 6881⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5febcd113b20d59157f9b7fba64932fb8
SHA133fb29fc980360d847e57b5ec86235e8db2e3d7d
SHA25641433b498eae7254bc7971fb58183adaccf0a8cfdf64acc03c24dcff3a10e939
SHA5126a185515b5dc615a1e4e43db6fd11ae6b3aacf2e02797f5b320bddea17fc17df24089adbba8bb5f4d74a8c61d5e36ce82405578c932a00ff6ddb658d43bc03c4
-
Filesize
237KB
MD59fd656b7cb57b6c9cd5a1bb187663b32
SHA1e4b27789dfd2dd54280a5a7768de2b21fdcce357
SHA256b831c7895fbf2d6cbe98435cc75ec6cfa532d2e1dafe0a85db4c7c03a64d0ceb
SHA512c778ceba3578ded7cafab08427cb1bb62d8127062ddb40bcade6ee47e090083875f642440b74613a672db243f4df03ccadd9573e77ef4e2049451f9f95ea782a
-
Filesize
295KB
MD5d96b5d103a5c26afa358a46e68fe3996
SHA1e1f00a11b1265faf7684f062ebba858d85d56565
SHA256912d959605b529c35abf94813f5da5cb7c8d28378e251169c37650832afa2fce
SHA5121a433773e9fabb14faaa0a4ac8b5637d1fa17c1fcacc6f4ae9a97a2c76b213b9d56a7b16128eb004f4a1ecdde5b96b2623c4a614831fee55252a8de393ac4fe3