Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52.exe
Resource
win10v2004-20241007-en
General
-
Target
ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52.exe
-
Size
667KB
-
MD5
3a1a9e39424b756ef3277dacfcea1edb
-
SHA1
67bedbb597039553c8cfb670300acf62351f5736
-
SHA256
ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52
-
SHA512
367372c3d55bfc85e7c4227f0460dc32e4eab4c8b752bbe8f83ae4446b0f8450454a0b9384a4dbd71c9c3b3c6672f00cf47a38549413a1b65c2749b43778655f
-
SSDEEP
12288:WMrJy90Vlvnj176RD10PkOmCNJXr0FLxmIYZ22ZmzrUjMH/w6sZYouGMDj:Lym5GZsmgoFoIYI20r5fw6sZYolo
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4284-19-0x0000000002790000-0x00000000027AA000-memory.dmp healer behavioral1/memory/4284-21-0x0000000004D90000-0x0000000004DA8000-memory.dmp healer behavioral1/memory/4284-22-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/4284-47-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/4284-49-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/4284-45-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/4284-43-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/4284-41-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/4284-39-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/4284-37-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/4284-35-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/4284-33-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/4284-31-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/4284-29-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/4284-27-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/4284-25-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/4284-23-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer -
Healer family
-
Processes:
pro0321.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0321.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4588-60-0x0000000002770000-0x00000000027B6000-memory.dmp family_redline behavioral1/memory/4588-61-0x0000000002880000-0x00000000028C4000-memory.dmp family_redline behavioral1/memory/4588-65-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-75-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-95-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-93-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-91-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-89-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-87-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-85-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-81-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-79-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-77-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-73-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-71-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-69-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-67-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-83-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-63-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/4588-62-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un406603.exepro0321.exequ5651.exepid process 4916 un406603.exe 4284 pro0321.exe 4588 qu5651.exe -
Processes:
pro0321.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0321.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un406603.exeea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un406603.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4048 4284 WerFault.exe pro0321.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52.exeun406603.exepro0321.exequ5651.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un406603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0321.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5651.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0321.exepid process 4284 pro0321.exe 4284 pro0321.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0321.exequ5651.exedescription pid process Token: SeDebugPrivilege 4284 pro0321.exe Token: SeDebugPrivilege 4588 qu5651.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52.exeun406603.exedescription pid process target process PID 5116 wrote to memory of 4916 5116 ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52.exe un406603.exe PID 5116 wrote to memory of 4916 5116 ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52.exe un406603.exe PID 5116 wrote to memory of 4916 5116 ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52.exe un406603.exe PID 4916 wrote to memory of 4284 4916 un406603.exe pro0321.exe PID 4916 wrote to memory of 4284 4916 un406603.exe pro0321.exe PID 4916 wrote to memory of 4284 4916 un406603.exe pro0321.exe PID 4916 wrote to memory of 4588 4916 un406603.exe qu5651.exe PID 4916 wrote to memory of 4588 4916 un406603.exe qu5651.exe PID 4916 wrote to memory of 4588 4916 un406603.exe qu5651.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52.exe"C:\Users\Admin\AppData\Local\Temp\ea3e19b4f87e50b5c87f12958b1cf7d6a707d324b36e9d67cea58f80ecc01e52.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un406603.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un406603.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0321.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0321.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 10844⤵
- Program crash
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5651.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5651.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4284 -ip 42841⤵PID:704
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
525KB
MD58a43f1a2b91fa14b5584f695efe12ad4
SHA10b6160f27558ec971a4dfae5c87ab344e21f4b0a
SHA256d34bb92f4b2967151b847010240e885e7667717d999b664aa3d33c67127ae01a
SHA512b995b7eec581ee71bd3ae470f0770f22ce3ad56c55a0e0dcdeb3a5d3889ba8bac6941c2c519a0c2830435093e3b85de602a3285a08e0f335c25fd972ca609a69
-
Filesize
294KB
MD5e29c3516f325e60998bc1577f936b796
SHA1df348a6ce3d3f08b2ed9c99dda9ff8b5232607d1
SHA256785bd950203ebab11155ded65d624df669c66cf8dd5b683c9b2d4a3f6e8df206
SHA512cbd7ce69adfe6bcc8a9928a85ce00801cbcb9c5552a1bff8ed05a739db3bf4f1af8de65a32f8f2d8816360674c1ee75330d1859fe1b700975b3601e672b39ff0
-
Filesize
352KB
MD50ccb354ff1af1ac1dcc2adaf8bbf8ac4
SHA1b782b9882df2ec0dcd7e4533f91dcf4bbb2f0496
SHA2568badca3a40d2947842a98e23a664edc1c0eae65866b9164cb3bdb19713a72640
SHA512f14958d9b5ee92abc22695e3a1a34518515cc1e722df007cbfd005e9f6628a00550e38be5fc53616ff5e16e9889f1249c1bf0fd94bc719072d0ca341d8783c72