Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe
Resource
win10v2004-20241007-en
General
-
Target
d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe
-
Size
657KB
-
MD5
53aeb57a80297336b726fe0a5233b348
-
SHA1
de49f7dc5bbd8ff6d2c2413638b161ad3da09cf8
-
SHA256
d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4
-
SHA512
6a9327672e6daf3284d27fa36780fec6b083012167ce510305c30b87147c30e7e41950b144dcf8b203e627cfe9a393d1e194ba752a32627970d6536b60e95463
-
SSDEEP
12288:dMrby90F8GP+laF7Azs/iIp9+16lcbsnGDH0RvkpUZo:eyi8GPCaF7Azu3PcbKeHgcpUm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/868-17-0x0000000004BF0000-0x0000000004C0A000-memory.dmp healer behavioral1/memory/868-20-0x0000000007120000-0x0000000007138000-memory.dmp healer behavioral1/memory/868-48-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/868-46-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/868-44-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/868-43-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/868-40-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/868-38-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/868-36-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/868-34-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/868-32-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/868-30-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/868-28-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/868-26-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/868-24-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/868-22-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/868-21-0x0000000007120000-0x0000000007132000-memory.dmp healer -
Healer family
-
Processes:
pro6424.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6424.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6424.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2880-60-0x0000000004950000-0x0000000004996000-memory.dmp family_redline behavioral1/memory/2880-61-0x00000000071C0000-0x0000000007204000-memory.dmp family_redline behavioral1/memory/2880-63-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-77-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-95-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-91-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-89-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-87-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-86-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-83-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-81-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-79-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-75-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-73-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-71-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-69-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-67-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-65-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-93-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline behavioral1/memory/2880-62-0x00000000071C0000-0x00000000071FF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un002349.exepro6424.exequ8444.exepid process 1068 un002349.exe 868 pro6424.exe 2880 qu8444.exe -
Processes:
pro6424.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6424.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6424.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un002349.exed74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un002349.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4748 868 WerFault.exe pro6424.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exeun002349.exepro6424.exequ8444.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un002349.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6424.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8444.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6424.exepid process 868 pro6424.exe 868 pro6424.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6424.exequ8444.exedescription pid process Token: SeDebugPrivilege 868 pro6424.exe Token: SeDebugPrivilege 2880 qu8444.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exeun002349.exedescription pid process target process PID 1084 wrote to memory of 1068 1084 d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe un002349.exe PID 1084 wrote to memory of 1068 1084 d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe un002349.exe PID 1084 wrote to memory of 1068 1084 d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe un002349.exe PID 1068 wrote to memory of 868 1068 un002349.exe pro6424.exe PID 1068 wrote to memory of 868 1068 un002349.exe pro6424.exe PID 1068 wrote to memory of 868 1068 un002349.exe pro6424.exe PID 1068 wrote to memory of 2880 1068 un002349.exe qu8444.exe PID 1068 wrote to memory of 2880 1068 un002349.exe qu8444.exe PID 1068 wrote to memory of 2880 1068 un002349.exe qu8444.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe"C:\Users\Admin\AppData\Local\Temp\d74a505641a425d7e19eb3ed4e2c51051c205b9cb5cd3896fcc7c2937416eec4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un002349.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un002349.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6424.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6424.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 10764⤵
- Program crash
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8444.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8444.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 868 -ip 8681⤵PID:1600
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
515KB
MD5e8eec27b7578cea31f4d8e6253ebb187
SHA1de3fc1b1946e424c5265f8e1571a6fd973f82b54
SHA25657647ac4e0f86f5b4125ef268ba15e7d3aef12b8eb4b3a48cf09fdaba7add04d
SHA5126ee6156bfa8d67492de45eed6abb206af0d1aea22e703a3dd57879e1e5e1977bff5b737ab7dfef2e9768264a270388b4d955ab46ca65dc12659035cb95baf058
-
Filesize
284KB
MD50185cd41be13dc3cdf93788b8129e461
SHA163d3a631769ebcaba0ecd0c921096ce844c469da
SHA256e232d62df785bb6a6e21fd04fec4ad22ebb4004c1efde418fcf0251938e4c883
SHA51221b0c1a8105ff8f513aae5019cba28d492278c08b246834780daad0d8be6fd87916954afaf3480995c320d8b7ca5c253a5f2afc07991f01697e490504f3e14da
-
Filesize
342KB
MD56925f6b4ca4bbf2bfa17851e64ce0da7
SHA146b1875729a64d70aa1d9313ccd68e82fdb00e61
SHA25675960e3b365355cabf15babbb893e74e3633b4eb36f933998d1106f78b93ef81
SHA512fa15d45168070cf2a397fa087ec82427d2fd73ab9056d44e5c96dc5ddfbf391fe329c1514464b04fa215b718073a36fb61fc95e040d140e8cfb49bcbe1595500