Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
a8d54a44774b48afb6f3d2311cf24e8c9bd2f07e68dac82fa5faeb47cea6d61d.exe
Resource
win10v2004-20241007-en
General
-
Target
a8d54a44774b48afb6f3d2311cf24e8c9bd2f07e68dac82fa5faeb47cea6d61d.exe
-
Size
677KB
-
MD5
23e5a1909d2f21d74951b727114c2885
-
SHA1
c6e25fa94764cc3ca67a61da8ef2201781db50f9
-
SHA256
a8d54a44774b48afb6f3d2311cf24e8c9bd2f07e68dac82fa5faeb47cea6d61d
-
SHA512
c614fb894d4daa3007ab4c3e1aed094980d4d57529438640fa67879ac72f6a2beab5b316eb7ce2a3ea2ee7ce34681d2773f0c24c3d9ecae421c6b00f572cd30e
-
SSDEEP
12288:KMrsy90qKFINNgiqIrjWt8wWjMlFvwpJLbH+4uz33EN/M6j:ayWiIqS8r6FINT+1z30Npj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/32-19-0x0000000002460000-0x000000000247A000-memory.dmp healer behavioral1/memory/32-21-0x00000000024E0000-0x00000000024F8000-memory.dmp healer behavioral1/memory/32-49-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/32-48-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/32-45-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/32-43-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/32-41-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/32-39-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/32-37-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/32-35-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/32-33-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/32-31-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/32-29-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/32-27-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/32-25-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/32-23-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/32-22-0x00000000024E0000-0x00000000024F2000-memory.dmp healer -
Healer family
-
Processes:
pro9227.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9227.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9227.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3048-61-0x00000000022A0000-0x00000000022E6000-memory.dmp family_redline behavioral1/memory/3048-62-0x00000000024A0000-0x00000000024E4000-memory.dmp family_redline behavioral1/memory/3048-78-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-96-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-94-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-92-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-91-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-88-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-86-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-84-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-82-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-80-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-76-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-74-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-72-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-70-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-68-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-66-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-64-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/3048-63-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un759379.exepro9227.exequ0987.exepid process 5064 un759379.exe 32 pro9227.exe 3048 qu0987.exe -
Processes:
pro9227.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9227.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a8d54a44774b48afb6f3d2311cf24e8c9bd2f07e68dac82fa5faeb47cea6d61d.exeun759379.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a8d54a44774b48afb6f3d2311cf24e8c9bd2f07e68dac82fa5faeb47cea6d61d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un759379.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1488 32 WerFault.exe pro9227.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a8d54a44774b48afb6f3d2311cf24e8c9bd2f07e68dac82fa5faeb47cea6d61d.exeun759379.exepro9227.exequ0987.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8d54a44774b48afb6f3d2311cf24e8c9bd2f07e68dac82fa5faeb47cea6d61d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un759379.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9227.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0987.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9227.exepid process 32 pro9227.exe 32 pro9227.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9227.exequ0987.exedescription pid process Token: SeDebugPrivilege 32 pro9227.exe Token: SeDebugPrivilege 3048 qu0987.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a8d54a44774b48afb6f3d2311cf24e8c9bd2f07e68dac82fa5faeb47cea6d61d.exeun759379.exedescription pid process target process PID 4804 wrote to memory of 5064 4804 a8d54a44774b48afb6f3d2311cf24e8c9bd2f07e68dac82fa5faeb47cea6d61d.exe un759379.exe PID 4804 wrote to memory of 5064 4804 a8d54a44774b48afb6f3d2311cf24e8c9bd2f07e68dac82fa5faeb47cea6d61d.exe un759379.exe PID 4804 wrote to memory of 5064 4804 a8d54a44774b48afb6f3d2311cf24e8c9bd2f07e68dac82fa5faeb47cea6d61d.exe un759379.exe PID 5064 wrote to memory of 32 5064 un759379.exe pro9227.exe PID 5064 wrote to memory of 32 5064 un759379.exe pro9227.exe PID 5064 wrote to memory of 32 5064 un759379.exe pro9227.exe PID 5064 wrote to memory of 3048 5064 un759379.exe qu0987.exe PID 5064 wrote to memory of 3048 5064 un759379.exe qu0987.exe PID 5064 wrote to memory of 3048 5064 un759379.exe qu0987.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8d54a44774b48afb6f3d2311cf24e8c9bd2f07e68dac82fa5faeb47cea6d61d.exe"C:\Users\Admin\AppData\Local\Temp\a8d54a44774b48afb6f3d2311cf24e8c9bd2f07e68dac82fa5faeb47cea6d61d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un759379.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un759379.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9227.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9227.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:32 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 32 -s 10844⤵
- Program crash
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0987.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0987.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 32 -ip 321⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
523KB
MD571397e731abf8fe3baa7d98ee9e98a71
SHA112ea8f5096ebecf225723e3a6fd6912c185c9a06
SHA25636b077a5b8062a3daaf6fadb8190aca8181f1495b504d160cc787885a9c8e34c
SHA512397fcd25899af00e7f7e06dfae31483ae0a5261da545786395856e72fcb7b33814dc2f540e1fec119ed884647703d98dc30d0ed13bb4c7dd6f554f08f0f00917
-
Filesize
253KB
MD55818f4eded02b822bfacf8f65e7bca12
SHA144ba47e02e57da84a4a2acbb5fbfedac49d3716d
SHA256838b971121e167d9834140fba63b01e21cf027bb1ca009b5b54c427ed624c81d
SHA5123d722783c1d0835fc41d7a538df95312a06d5534f98d1676a7d30c9f5920c81ea140fc03ddab25d200f8772282ef6a491bab3da432ac5f46b42b0414313f7df7
-
Filesize
311KB
MD5d6b5710b031b6e76204ef9a2385a4dff
SHA199c483f411b83c800c61ff001ec46d07b7c986ac
SHA2566f5c35e01015d56648649bfa92f02ed199c94a2995b3e7bfee804d702905e8f1
SHA5123ed2e54940566e883270527b0f769c572e2cdbce8f6cb4436c523d74f86ac4b084341462dfd76a9e1b296f54bbd009786d7820bdb07e8e49b380430c6f8b77a1