Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
f8ba8a7df2c4857881057a3ada685733acf458032b52848fce1fcd674c213f1c.exe
Resource
win10v2004-20241007-en
General
-
Target
f8ba8a7df2c4857881057a3ada685733acf458032b52848fce1fcd674c213f1c.exe
-
Size
988KB
-
MD5
15dd1666acc309e0474f434c2781683c
-
SHA1
fd29fd7194554cf2a8b7f3f3dfb8fb6e22c74345
-
SHA256
f8ba8a7df2c4857881057a3ada685733acf458032b52848fce1fcd674c213f1c
-
SHA512
44ac371113644313e1f023f4bb0ab4ef998fd1beaa99f722587b66f52860a30bda77d0e61be8e097926e3921234df77552cf18b77ab5d99d018d277d40dbd4ff
-
SSDEEP
24576:Jyv7/25MxeplzYG1D2TejgpulIyJKFKSZ4IN0X:8T+megW2yj6uRKFKS1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0473.exe healer behavioral1/memory/4176-28-0x0000000000570000-0x000000000057A000-memory.dmp healer behavioral1/memory/1668-34-0x00000000021C0000-0x00000000021DA000-memory.dmp healer behavioral1/memory/1668-36-0x0000000004A30000-0x0000000004A48000-memory.dmp healer behavioral1/memory/1668-44-0x0000000004A30000-0x0000000004A42000-memory.dmp healer behavioral1/memory/1668-64-0x0000000004A30000-0x0000000004A42000-memory.dmp healer behavioral1/memory/1668-56-0x0000000004A30000-0x0000000004A42000-memory.dmp healer behavioral1/memory/1668-54-0x0000000004A30000-0x0000000004A42000-memory.dmp healer behavioral1/memory/1668-52-0x0000000004A30000-0x0000000004A42000-memory.dmp healer behavioral1/memory/1668-50-0x0000000004A30000-0x0000000004A42000-memory.dmp healer behavioral1/memory/1668-48-0x0000000004A30000-0x0000000004A42000-memory.dmp healer behavioral1/memory/1668-46-0x0000000004A30000-0x0000000004A42000-memory.dmp healer behavioral1/memory/1668-42-0x0000000004A30000-0x0000000004A42000-memory.dmp healer behavioral1/memory/1668-62-0x0000000004A30000-0x0000000004A42000-memory.dmp healer behavioral1/memory/1668-60-0x0000000004A30000-0x0000000004A42000-memory.dmp healer behavioral1/memory/1668-58-0x0000000004A30000-0x0000000004A42000-memory.dmp healer behavioral1/memory/1668-40-0x0000000004A30000-0x0000000004A42000-memory.dmp healer behavioral1/memory/1668-38-0x0000000004A30000-0x0000000004A42000-memory.dmp healer behavioral1/memory/1668-37-0x0000000004A30000-0x0000000004A42000-memory.dmp healer -
Healer family
-
Processes:
v8201UC.exetz0473.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v8201UC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v8201UC.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v8201UC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v8201UC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v8201UC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v8201UC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz0473.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz0473.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz0473.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz0473.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz0473.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz0473.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3020-72-0x00000000021D0000-0x0000000002216000-memory.dmp family_redline behavioral1/memory/3020-73-0x00000000023A0000-0x00000000023E4000-memory.dmp family_redline behavioral1/memory/3020-85-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-87-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-107-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-105-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-103-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-101-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-97-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-96-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-93-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-91-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-89-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-83-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-81-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-79-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-99-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-77-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-75-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline behavioral1/memory/3020-74-0x00000000023A0000-0x00000000023DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
Processes:
zap0378.exezap0461.exezap2491.exetz0473.exev8201UC.exew18aJ48.exepid process 1204 zap0378.exe 1872 zap0461.exe 5028 zap2491.exe 4176 tz0473.exe 1668 v8201UC.exe 3020 w18aJ48.exe -
Processes:
v8201UC.exetz0473.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v8201UC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz0473.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v8201UC.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
zap0461.exezap2491.exef8ba8a7df2c4857881057a3ada685733acf458032b52848fce1fcd674c213f1c.exezap0378.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap0461.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap2491.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8ba8a7df2c4857881057a3ada685733acf458032b52848fce1fcd674c213f1c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap0378.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2916 1668 WerFault.exe v8201UC.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
zap0378.exezap0461.exezap2491.exev8201UC.exew18aJ48.exef8ba8a7df2c4857881057a3ada685733acf458032b52848fce1fcd674c213f1c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap0378.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap0461.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap2491.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v8201UC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w18aJ48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8ba8a7df2c4857881057a3ada685733acf458032b52848fce1fcd674c213f1c.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
tz0473.exev8201UC.exepid process 4176 tz0473.exe 4176 tz0473.exe 1668 v8201UC.exe 1668 v8201UC.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tz0473.exev8201UC.exew18aJ48.exedescription pid process Token: SeDebugPrivilege 4176 tz0473.exe Token: SeDebugPrivilege 1668 v8201UC.exe Token: SeDebugPrivilege 3020 w18aJ48.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
f8ba8a7df2c4857881057a3ada685733acf458032b52848fce1fcd674c213f1c.exezap0378.exezap0461.exezap2491.exedescription pid process target process PID 3412 wrote to memory of 1204 3412 f8ba8a7df2c4857881057a3ada685733acf458032b52848fce1fcd674c213f1c.exe zap0378.exe PID 3412 wrote to memory of 1204 3412 f8ba8a7df2c4857881057a3ada685733acf458032b52848fce1fcd674c213f1c.exe zap0378.exe PID 3412 wrote to memory of 1204 3412 f8ba8a7df2c4857881057a3ada685733acf458032b52848fce1fcd674c213f1c.exe zap0378.exe PID 1204 wrote to memory of 1872 1204 zap0378.exe zap0461.exe PID 1204 wrote to memory of 1872 1204 zap0378.exe zap0461.exe PID 1204 wrote to memory of 1872 1204 zap0378.exe zap0461.exe PID 1872 wrote to memory of 5028 1872 zap0461.exe zap2491.exe PID 1872 wrote to memory of 5028 1872 zap0461.exe zap2491.exe PID 1872 wrote to memory of 5028 1872 zap0461.exe zap2491.exe PID 5028 wrote to memory of 4176 5028 zap2491.exe tz0473.exe PID 5028 wrote to memory of 4176 5028 zap2491.exe tz0473.exe PID 5028 wrote to memory of 1668 5028 zap2491.exe v8201UC.exe PID 5028 wrote to memory of 1668 5028 zap2491.exe v8201UC.exe PID 5028 wrote to memory of 1668 5028 zap2491.exe v8201UC.exe PID 1872 wrote to memory of 3020 1872 zap0461.exe w18aJ48.exe PID 1872 wrote to memory of 3020 1872 zap0461.exe w18aJ48.exe PID 1872 wrote to memory of 3020 1872 zap0461.exe w18aJ48.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8ba8a7df2c4857881057a3ada685733acf458032b52848fce1fcd674c213f1c.exe"C:\Users\Admin\AppData\Local\Temp\f8ba8a7df2c4857881057a3ada685733acf458032b52848fce1fcd674c213f1c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0378.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0378.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0461.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0461.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2491.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2491.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0473.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0473.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8201UC.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8201UC.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 10846⤵
- Program crash
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w18aJ48.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w18aJ48.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1668 -ip 16681⤵PID:2248
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
805KB
MD5645a6bcee042edc68d777d6eb9f79d2e
SHA12af14226ec5d69b8b7482b4e53adf2a82438c3d1
SHA25620146dda97dbd91be3fb0d4f810cbc877dc833c48388e8075c2998248609134f
SHA51278c7807744e1af3ebd12594d57c14b0b072156df1e186968ccfc45b92d3c3067d5bd0b2a6893065bf7f00367ab2ac93fe515cf40db8dd6cf2d6c4e2b198ac308
-
Filesize
650KB
MD56e933fac96043347feca96db031329c8
SHA1a73d2bb0bbc7b0a0258f1683f70626d4a18259df
SHA2566773d1baf6c507379728cb80d2fe30ed19692eca5d4cab9d82a8a4054d9a7efd
SHA5121f0da4402413c5e88424117b1c81d589900ae0a2d8fb190307a155ced782432b3dee2787a234402e3a9b995a493e132a2dcd62807ecee957485b399fcc0eebb0
-
Filesize
292KB
MD503aad15105d68d1c594c2af36d29d7f4
SHA10153ddd12289cc2da97920b3d5f85de7aee9c315
SHA256b4531a78a3360a150a187afc0d2edff1c3d8491766cabaf1369731982b2e58a1
SHA5129ff4b615e63782914c143f400d05c7b25da4c98212a51e03ee334fb469e8992f4203cd60f9c925e4a23279b1256b227e22de1881149b4f2aaa57be3b96e68ef2
-
Filesize
322KB
MD5491b75acd725148969ef7e2708d3b979
SHA153933c46f6f2f1d8aef25a329f4c355c497269af
SHA25686c3da0321fcc56f3821e393c65df5d6902919960a46e20b45c916db7126c0c7
SHA512c6113c3f245f2109ee5719a1d0d69794f239e2a9b37c19be97c0899dac7a3fe9ef70064c9a361ca9ee2989224ad5f2bf8df3b0f2cfc4b75a1c43d3cdcf77a084
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
235KB
MD5e73d07ac35e58f6dbf8c6d3d8f9302de
SHA160a1c0485dbfb06a54653aea2beb4d25776ccf06
SHA2562d68213419d7552ca6e8d4d959c167c5fac73901aae5cc9d0a6ef73f7021beb8
SHA512366ae9a9faf70bb49185b706b5b4e16215229504effd61310a2641dc06e2ad39e80b53b296e5796c3be3e259dedfcf53a1bcfa9a6abfbd13d4b29e28cc5dbb3e