Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 19:44
Static task
static1
Behavioral task
behavioral1
Sample
e46a8b70ee3d6d77321c1b5e14300bb1d85ac598e25099fa797e60b6af622125.exe
Resource
win10v2004-20241007-en
General
-
Target
e46a8b70ee3d6d77321c1b5e14300bb1d85ac598e25099fa797e60b6af622125.exe
-
Size
661KB
-
MD5
304069afeff4b62a97a48065ea13f7d8
-
SHA1
39172d8b4cd2382e8869c2983d22839a14a70c1f
-
SHA256
e46a8b70ee3d6d77321c1b5e14300bb1d85ac598e25099fa797e60b6af622125
-
SHA512
f94db833aa0560bc7f66f7dcd3542667bf528e21db06b4cb720a2993d96f8cb0fb280dd39e0d534ce969c276e96ad08f55ecd93c703b4e82c10e7b189d3981d1
-
SSDEEP
12288:IMroy9091KPriB6feaMZraQpESCUvv85PKGUNhJe46nA6OGfmgyQM8MtPg:gynG6G5rJaav85CGUfJe46nA6OGftKq
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1144-18-0x0000000003A90000-0x0000000003AAA000-memory.dmp healer behavioral1/memory/1144-21-0x00000000061D0000-0x00000000061E8000-memory.dmp healer behavioral1/memory/1144-49-0x00000000061D0000-0x00000000061E2000-memory.dmp healer behavioral1/memory/1144-47-0x00000000061D0000-0x00000000061E2000-memory.dmp healer behavioral1/memory/1144-45-0x00000000061D0000-0x00000000061E2000-memory.dmp healer behavioral1/memory/1144-43-0x00000000061D0000-0x00000000061E2000-memory.dmp healer behavioral1/memory/1144-42-0x00000000061D0000-0x00000000061E2000-memory.dmp healer behavioral1/memory/1144-39-0x00000000061D0000-0x00000000061E2000-memory.dmp healer behavioral1/memory/1144-37-0x00000000061D0000-0x00000000061E2000-memory.dmp healer behavioral1/memory/1144-35-0x00000000061D0000-0x00000000061E2000-memory.dmp healer behavioral1/memory/1144-33-0x00000000061D0000-0x00000000061E2000-memory.dmp healer behavioral1/memory/1144-31-0x00000000061D0000-0x00000000061E2000-memory.dmp healer behavioral1/memory/1144-29-0x00000000061D0000-0x00000000061E2000-memory.dmp healer behavioral1/memory/1144-27-0x00000000061D0000-0x00000000061E2000-memory.dmp healer behavioral1/memory/1144-25-0x00000000061D0000-0x00000000061E2000-memory.dmp healer behavioral1/memory/1144-23-0x00000000061D0000-0x00000000061E2000-memory.dmp healer behavioral1/memory/1144-22-0x00000000061D0000-0x00000000061E2000-memory.dmp healer -
Healer family
-
Processes:
pro4336.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4336.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4336.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4320-62-0x0000000002310000-0x0000000002356000-memory.dmp family_redline behavioral1/memory/4320-63-0x0000000002660000-0x00000000026A4000-memory.dmp family_redline behavioral1/memory/4320-69-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-79-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-97-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-95-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-93-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-91-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-89-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-87-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-85-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-83-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-77-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-75-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-73-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-71-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-81-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-67-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-65-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/4320-64-0x0000000002660000-0x000000000269F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un734124.exepro4336.exequ3209.exepid process 732 un734124.exe 1144 pro4336.exe 4320 qu3209.exe -
Processes:
pro4336.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4336.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e46a8b70ee3d6d77321c1b5e14300bb1d85ac598e25099fa797e60b6af622125.exeun734124.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e46a8b70ee3d6d77321c1b5e14300bb1d85ac598e25099fa797e60b6af622125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un734124.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2608 1144 WerFault.exe pro4336.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro4336.exequ3209.exee46a8b70ee3d6d77321c1b5e14300bb1d85ac598e25099fa797e60b6af622125.exeun734124.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4336.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3209.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e46a8b70ee3d6d77321c1b5e14300bb1d85ac598e25099fa797e60b6af622125.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un734124.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4336.exepid process 1144 pro4336.exe 1144 pro4336.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4336.exequ3209.exedescription pid process Token: SeDebugPrivilege 1144 pro4336.exe Token: SeDebugPrivilege 4320 qu3209.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
e46a8b70ee3d6d77321c1b5e14300bb1d85ac598e25099fa797e60b6af622125.exeun734124.exedescription pid process target process PID 3440 wrote to memory of 732 3440 e46a8b70ee3d6d77321c1b5e14300bb1d85ac598e25099fa797e60b6af622125.exe un734124.exe PID 3440 wrote to memory of 732 3440 e46a8b70ee3d6d77321c1b5e14300bb1d85ac598e25099fa797e60b6af622125.exe un734124.exe PID 3440 wrote to memory of 732 3440 e46a8b70ee3d6d77321c1b5e14300bb1d85ac598e25099fa797e60b6af622125.exe un734124.exe PID 732 wrote to memory of 1144 732 un734124.exe pro4336.exe PID 732 wrote to memory of 1144 732 un734124.exe pro4336.exe PID 732 wrote to memory of 1144 732 un734124.exe pro4336.exe PID 732 wrote to memory of 4320 732 un734124.exe qu3209.exe PID 732 wrote to memory of 4320 732 un734124.exe qu3209.exe PID 732 wrote to memory of 4320 732 un734124.exe qu3209.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e46a8b70ee3d6d77321c1b5e14300bb1d85ac598e25099fa797e60b6af622125.exe"C:\Users\Admin\AppData\Local\Temp\e46a8b70ee3d6d77321c1b5e14300bb1d85ac598e25099fa797e60b6af622125.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un734124.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un734124.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4336.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4336.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 10804⤵
- Program crash
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3209.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3209.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1144 -ip 11441⤵PID:3524
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD5504cb7d66f9431491fa9dfee6f25d4f4
SHA1604d21bed8b827a8b85b6a5cd449fd2ab239cb27
SHA2566ec45e681b7312c89cdb2af3a14c00a4d1ad3b4f040576c134d482125101a575
SHA5129c3ce2dda67051c065cce3319a9f6c7fb122f4b4548890c954548af98db2feae31ee4a401cfc4934e83e9553152c973d8f891c7a32cb15fbf400b87ae61e7572
-
Filesize
276KB
MD5a10bebf4412f1f776d2c441dcf63f3e6
SHA17c248f0d7937ccbd4eda1d1ed96ae44f6ed8529b
SHA256ac88737e671b87c38a595810d76006f2c6af5e6f2f94756e0eabd3d7e25ced0d
SHA512c1c26da1d3eccd6aad7d0f69e1242a07d710aab2952f581af50f1975f9b7b3d6c3e1b771ac64f03a950eb4e000dde8eade7ef40e49e1268a424dca5ee86b8b03
-
Filesize
295KB
MD55240a71ac1e653f67aa3d218f4ac54f8
SHA179324cf9e227e25f6e7db75fc2d31b5ff6565ae5
SHA256c44ca224231f1d5b21ca41210652e5e20cad1af664164ce823dabdab9222e288
SHA5126bb313b736187b688c566e6cde0e7090d3ce9e7c44c8cd1845b1f702f3029bba2b010c7e6984daa3b48fab7e78ad595601f9f3845b61b5abb83891b31d5d9266