Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 18:44
Static task
static1
Behavioral task
behavioral1
Sample
2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1.exe
Resource
win10v2004-20241007-en
General
-
Target
2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1.exe
-
Size
659KB
-
MD5
66109d69f0c6330c7aa5d516691cab96
-
SHA1
cd5bbe16479f07bc6d4e691a045969286160039e
-
SHA256
2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1
-
SHA512
d1be22f40035d1a8e0530b85c52c09d346fc3149e82464e3d9b4b399d0440bed9c7b71e31216b7a40a3ed0f0d0ea61b540aa82ae6514b3dc8c1ee9c5d27e0b3a
-
SSDEEP
12288:UMr8y90qrxKFoxAJujM7h/NN4sQd+4OKjq1WNf5KBa/Tm0TQxLbn2FH:gy/rxKOYEM7h/NNO04hjq1YAOm0kN2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2144-19-0x0000000002780000-0x000000000279A000-memory.dmp healer behavioral1/memory/2144-21-0x00000000027F0000-0x0000000002808000-memory.dmp healer behavioral1/memory/2144-37-0x00000000027F0000-0x0000000002802000-memory.dmp healer behavioral1/memory/2144-47-0x00000000027F0000-0x0000000002802000-memory.dmp healer behavioral1/memory/2144-45-0x00000000027F0000-0x0000000002802000-memory.dmp healer behavioral1/memory/2144-43-0x00000000027F0000-0x0000000002802000-memory.dmp healer behavioral1/memory/2144-41-0x00000000027F0000-0x0000000002802000-memory.dmp healer behavioral1/memory/2144-39-0x00000000027F0000-0x0000000002802000-memory.dmp healer behavioral1/memory/2144-35-0x00000000027F0000-0x0000000002802000-memory.dmp healer behavioral1/memory/2144-49-0x00000000027F0000-0x0000000002802000-memory.dmp healer behavioral1/memory/2144-33-0x00000000027F0000-0x0000000002802000-memory.dmp healer behavioral1/memory/2144-31-0x00000000027F0000-0x0000000002802000-memory.dmp healer behavioral1/memory/2144-29-0x00000000027F0000-0x0000000002802000-memory.dmp healer behavioral1/memory/2144-27-0x00000000027F0000-0x0000000002802000-memory.dmp healer behavioral1/memory/2144-25-0x00000000027F0000-0x0000000002802000-memory.dmp healer behavioral1/memory/2144-23-0x00000000027F0000-0x0000000002802000-memory.dmp healer behavioral1/memory/2144-22-0x00000000027F0000-0x0000000002802000-memory.dmp healer -
Healer family
-
Processes:
pro7543.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7543.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4552-61-0x0000000004B00000-0x0000000004B46000-memory.dmp family_redline behavioral1/memory/4552-62-0x0000000005170000-0x00000000051B4000-memory.dmp family_redline behavioral1/memory/4552-76-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-82-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-96-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-94-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-90-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-88-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-86-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-84-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-80-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-78-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-74-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-72-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-70-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-92-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-68-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-66-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-64-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline behavioral1/memory/4552-63-0x0000000005170000-0x00000000051AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un916183.exepro7543.exequ0668.exepid process 4548 un916183.exe 2144 pro7543.exe 4552 qu0668.exe -
Processes:
pro7543.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7543.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1.exeun916183.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un916183.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2888 2144 WerFault.exe pro7543.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1.exeun916183.exepro7543.exequ0668.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un916183.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7543.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0668.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7543.exepid process 2144 pro7543.exe 2144 pro7543.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7543.exequ0668.exedescription pid process Token: SeDebugPrivilege 2144 pro7543.exe Token: SeDebugPrivilege 4552 qu0668.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1.exeun916183.exedescription pid process target process PID 2836 wrote to memory of 4548 2836 2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1.exe un916183.exe PID 2836 wrote to memory of 4548 2836 2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1.exe un916183.exe PID 2836 wrote to memory of 4548 2836 2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1.exe un916183.exe PID 4548 wrote to memory of 2144 4548 un916183.exe pro7543.exe PID 4548 wrote to memory of 2144 4548 un916183.exe pro7543.exe PID 4548 wrote to memory of 2144 4548 un916183.exe pro7543.exe PID 4548 wrote to memory of 4552 4548 un916183.exe qu0668.exe PID 4548 wrote to memory of 4552 4548 un916183.exe qu0668.exe PID 4548 wrote to memory of 4552 4548 un916183.exe qu0668.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1.exe"C:\Users\Admin\AppData\Local\Temp\2d6dfdff1fdfd2fd19d4dea3247ed2121c06cfaee3f6df54a5bc9c1c84b01df1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un916183.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un916183.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7543.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7543.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 10284⤵
- Program crash
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0668.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0668.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2144 -ip 21441⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD526520c4154f83272c98a220aabe391ad
SHA1a932efd6af2fffa5c13cd5e599bdd1dac0503f8e
SHA256c6a64c06e5cd84da731649f985e40eb9bbdc8e8328cefc076285fe4ef982355d
SHA512da41686e266f2a9c1c04b2c73ab58f3d28ce7a7329f938b51d568c9547940fcee9db515e408ab1155ad39d38f1e1047741fbfb5345dc8b1b24a837414a13f269
-
Filesize
376KB
MD54acf940d16b7952dbe567c8213f0f63e
SHA1d985d5ecdb67a7dcd098590776c2b39d6a9cde98
SHA256bb41cbb62159d0a2f9ade1c7ba70ac7c1decab3d6a67d9cd4597f1ad6b52bb20
SHA512b0fe102b231164031aa6b7891b75c729d73b948e63d657427218093522b4912867e257c19651463a5b42c619396f09d6f9cac6066ddad6aa9795da09e638a75e
-
Filesize
434KB
MD543862fd071d0c92ad79b38f3494934f3
SHA1da13071e87636e0ccae1f75fd6ec19fb897aaaf3
SHA2565e5848daf055707da938c2f44947c3f55fa3ffd9da514b66d7801dfef0397489
SHA512efb0975ddf2dffe7660b3633e943d3d11ae27b8560e514414548a40c65b7d288b523bff10e7e6e5831816eca7832392bfbbab48f621a1ec83c2e64784f4833b1